News

Wednesday, April 16, 2008

SecurityFocus Newsletter #449

SecurityFocus Newsletter #449
----------------------------------------

This issue is sponsored by Blackhat

Attend Black Hat USA, August 2-7 in Las Vegas, the world's premier technical event for ICT security experts.
Featuring 40 hands-on training courses and 80 Briefings presentations with lots of new content and new tools.
Network with 4,000 delegates from 50 nations.
Visit product displays by 30 top sponsors in a relaxed setting.

www.blackhat.com


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.On the Border
2.Catch Them if You can
II. BUGTRAQ SUMMARY
1. Linux Kernel DO_COREDUMP Local Information Disclosure Vulnerability
2. Microsoft Windows Workstation Service NetpManageIPCConnect Remote Code Execution Vulnerability
3. Rsync 'xattr' Support Integer Overflow Vulnerability
4. HP OpenView Network Node Manager 'ovalarmsrv.exe' Multiple Remote Vulnerabilities
5. Microsoft Windows GDI Stack Overflow Vulnerability
6. Ruby WEBrick Remote Directory Traversal and Information Disclosure Vulnerabilities
7. Joomla! and Mambo eXtplorer Component 'dir' Parameter Directory Traversal Vulnerability
8. Business Objects Infoview 'jsessionid' Parameter Cross-Site Scripting Vulnerability
9. XT-News Multiple Administrative Scripts Authentication Bypass Vulnerabilities
10. HP OpenView Network Node Manager Directory Traversal and Multiple Denial Of Service Vulnerabilities
11. PHPKB 'comment.php' SQL Injection Vulnerability
12. Omnistar Article Manager Article.PHP SQL Injection Vulnerability
13. IBM WebSphere MQ Security Bypass Vulnerability
14. Adobe Flash Player SWF File 'DeclareFunction2' ActionScript Tag Remote Code Execution Vulnerability
15. Coppermine Photo Gallery 'bridge/coppermine.inc.php' SQL Injection Vulnerability
16. Coppermine Photo Gallery 'upload.php' SQL Injection Vulnerability
17. XM Easy Personal FTP Server 'PORT and 'XCWD' Multiple Remote Denial of Service Vulnerabilities
18. Mumbo Jumbo Media OP4 'id' Parameter SQL Injection Vulnerability
19. Microsoft Windows GDI 'CreateDIBPatternBrushPt' Function Heap Overflow Vulnerability
20. NagiosQL Prepend_Adm.PHP Remote File Include Vulnerability
21. OmniPCX Office Unspecified Information Disclosure Vulnerability
22. Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability
23. phpAddressBook 'view.php' SQL Injection Vulnerability
24. CcMail Cookie Security Bypass Vulnerability
25. NewsOffice 'news_show.php' Remote File Include Vulnerability
26. Trillian DTD File XML Parser Buffer Overflow Vulnerability
27. Koobi Pro 'galid' Parameter Multiple SQL Injection Vulnerabilities
28. Linux Kernel 'tmpfs' filesystem Local Security Vulnerability
29. Koobi 'categ' Parameter SQL Injection Vulnerability
30. Linux Kernel 'isdn_common.c' Local Buffer Overflow Vulnerability
31. Koobi Pro 'categ' Parameter SQL Injection Vulnerability
32. Gallarific Cross Site Scripting, HTML Injection and Backdoor Vulnerabilities
33. Omnistar OSI Affiliate 'login.php' Multiple Cross-Site Scripting Vulnerabilities
34. Amfphp Multiple Cross-Site Scripting Vulnerabilities
35. phpBB Memberlist Search And Private Message Attachment Mutliple Security Bypass Vulnerabilities
36. phpHotResources 'cat.php' SQL Injection Vulnerability
37. Dotclear 'ecrire/images.php' Arbitrary File Upload Vulnerability
38. BosDev BosNews '/admin/index.php' Authentication Bypass Vulnerability
39. Microsoft Office File Memory Corruption Vulnerability
40. KwsPHP Eskuel Module Arbitrary File Upload Vulnerability
41. WORK system e-commerce 'main.php' Multiple Cross-Site Scripting Vulnerabilities
42. CUPS PNG Filter Multiple Integer Overflow Vulnerabilities
43. BosDev BosNews 'news.php' SQL Injection Vulnerability
44. DevWorx BlogWorx 'view.asp' SQL Injection Vulnerability
45. Nero MediaHome NMMediaServer.EXE Remote Denial of Service Vulnerability
46. Libpng Library Unknown Chunk Handler Vulnerability
47. MirBSD Korn Shell Local Privilege Escalation Vulnerability
48. BosClassifieds 'index.php' SQL Injection Vulnerability
49. Autonomy KeyView Module Multiple Buffer Overflow Vulnerabilities
50. FishSound Library Remote Speex Decoding Code Execution Vulnerability
51. Python zlib Module Remote Buffer Overflow Vulnerability
52. Opera Web Browser 9.26 Multiple Security Vulnerabilities
53. Asterisk Host-Based Authentication Security Bypass Vulnerability
54. Asterisk CDR_PGSQL SQL Injection Vulnerability
55. Asterisk Call Authentication Security Bypass Vulnerability
56. ClamAV 0.92.1 Multiple Vulnerabilities
57. ClamAV ARJ File Denial Of Service Vulnerability
58. ClamAV 'libclamav/pe.c' UPACK File Heap Based Buffer Overflow Vulnerability
59. RETIRED: ClamAV 'libclamav/pe.c' UPACK File Heap Based Buffer Overflow Vulnerability
60. Cezanne Software 'FUNID' Parameter Multiple SQL Injection Vulnerabilities
61. Cezanne Software 'CFLogon.asp' Cross-Site Scripting Vulnerability
62. Cezanne Software Multiple Cross-Site Scripting Vulnerabilities
63. Mambo and Joomla! Jom Comment Component User Credential SQL Injection Vulnerability
64. Retired: PHPSlideShow Toonchapter8.php Cross Site Scripting Vulnerability
65. Oracle April 2008 Critical Patch Update Multiple Vulnerabilities
66. Sun Java Runtime Environment Image Parsing Heap Buffer Overflow Vulnerability
67. Sun Java SE Multiple Security Vulnerabilities
68. Sun Java RunTime Environment Read and Write Permission Multiple Privilege Escalation Vulnerabilities
69. Sun Java RunTime Environment XML Parsing Unspecified Vulnerability
70. BS.Player SRT File Remote Buffer Overflow Vulnerability
71. Blogator-script 'bs_auth.php' Cross Site Scripting Vulnerability
72. Computer Associates DSM 'gui_cm_ctrls.ocx' ActiveX Control Remote Code Execution Vulnerability
73. XplodPHP AutoTutorials 'id' Parameter SQL Injection Vulnerability
74. Carbon Communities Multiple SQL Injection and Cross-Site Scripting Vulnerabilities
75. Cisco Network Admission Control Shared Secret Information Disclosure Vulnerability
76. Squid Web Proxy Cache 'arrayShrink()' Remote Denial of Service Vulnerability
77. IBM Informix Dynamic Server Multiple Remote Vulnerabilities
78. OpenSSH X connections Session Hijacking Vulnerability
79. ICQ 'Personal Status Manager' Remote Buffer Overflow Vulnerability
80. Cecilia Insecure Temporary File Creation Vulnerability
81. Apache Tomcat Cookie Quote Handling Remote Information Disclosure Vulnerability
82. SmallBiz 4 Seasons 'content.php' SQL Injection Vulnerability
83. LASERnet CMS 'new' Parameter SQL Injection Vulnerability
84. Classifieds Caffe 'cat_id' Parameter SQL Injection Vulnerability
85. Red Hat 'redhat-ds-admin' Shell Command Injection and Security Bypass Vulnerabilities
86. eShop CMS 'index.php' SQL Injection Vulnerability
87. BigAnt IM Server HTTP GET Request Remote Buffer Overflow Vulnerability
88. Adobe Flash Player Multimedia File Remote Buffer Overflow Vulnerability
89. LightNEasy Multiple Input Validation Vulnerabilities
90. Xpdf Multiple Remote Stream.CC Vulnerabilities
91. PCRE Regular Expression Library Multiple Security Vulnerabilities
92. Net-SNMP GETBULK Remote Denial of Service Vulnerability
93. PCRE Regular Expression Library Multiple Integer and Buffer Overflow Vulnerabilities
94. OpenPegasus WBEM CIM Management Server 'PAMBasicAuthenticatorUnix.cpp' Buffer Overflow Vulnerability
95. IBM DB2 Universal Database Multiple Vulnerabilities
96. DivX Player .SRT 'subtitle' Remote Buffer Overflow Vulnerability
97. Istant-Replay 'read.php' Remote File Include Vulnerability
98. W2B Online Banking 'ilang' Parameter Remote File Include Vulnerability
99. Lighttpd SSL Error Denial of Service Vulnerability
100. Koobi Pro 'poll_id' Parameter SQL Injection Vulnerability
III. SECURITYFOCUS NEWS
1. U.S. gov't pushes cybersecurity at con
2. Web developers, fix thy Flash
3. Hacking contest highlights value of vulnerabilities
4. House aims to scrutinize warrantless taps
IV. SECURITY JOBS LIST SUMMARY
1. [SJ-JOB] Security Architect, Arlington
2. [SJ-JOB] Director, Information Security, Washington DC
3. [SJ-JOB] Sales Engineer, Washington
4. [SJ-JOB] Sales Engineer, St Paul
5. [SJ-JOB] Application Security Architect, Arlington
6. [SJ-JOB] Sales Engineer, Blue Bell
7. [SJ-JOB] Sr. Security Analyst, New York
8. [SJ-JOB] Account Manager, Chicago
9. [SJ-JOB] Security Consultant, Boston
10. [SJ-JOB] Account Manager, New York
11. [SJ-JOB] Sales Engineer, San Mateo
12. [SJ-JOB] Security Consultant, Basingstoke
13. [SJ-JOB] Sales Engineer, Philadelphia
14. [SJ-JOB] Sales Engineer, Rockville
15. [SJ-JOB] Security Architect, Roseland
16. [SJ-JOB] Security Consultant, London
17. [SJ-JOB] Sales Engineer, Multiple USA locations
18. [SJ-JOB] Security Consultant, Toronto
19. [SJ-JOB] Security Engineer, Irvine
20. [SJ-JOB] Security Engineer, Jersey City
21. [SJ-JOB] Sales Engineer, Boston
V. INCIDENTS LIST SUMMARY
1. Mysterious JavaScript appearance in website database
VI. VULN-DEV RESEARCH LIST SUMMARY
1. Foxit Reader 2.2 two potentially exploitable bugs
2. Potential OOo security problem
3. EUSecWest CFP Closes April 14th (conf May 21/22 2008)
VII. MICROSOFT FOCUS LIST SUMMARY
VIII. SUN FOCUS LIST SUMMARY
IX. LINUX FOCUS LIST SUMMARY
1. DEF CON 16 Retro Announcement! Back to Bang!
2. EUSecWest CFP Closes April 14th (conf May 21/22 2008)
X. UNSUBSCRIBE INSTRUCTIONS
XI. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.On the Border
By Mark Rasch
Recently, I was going through an airport with my shoes, coat, jacket, and belt off as well as with my carry-on bag, briefcase, and laptop all separated for easy inspection. I was heading through security at the Washington D.C., Ronald Reagan National Airport in Arlington, Virginia, or "National" as we locals call it. As I passed through the new magnetometer which gently puffed air all over my body -- which to me seems to be a cross between a glaucoma test and Marilyn Monroe in Gentlemen Prefer Blondes -- a TSA employee absent-mindedly asked if he could "inspect" my laptop computer. While the inspection was cursory, the situation immediately gave me pause: What was in my laptop anyway?
http://www.securityfocus.com/columnists/469

2.Catch Them if You Can
By Don Parker
High-profile network security breaches have proliferated over the past few years. While many "breaches" consist of lost data or a stolen laptop, true breaches -- where a online attacker compromises a network and removes data -- have become very common
http://www.securityfocus.com/columnists/468


II. BUGTRAQ SUMMARY
--------------------
1. Linux Kernel DO_COREDUMP Local Information Disclosure Vulnerability
BugTraq ID: 26701
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26701
Summary:
The Linux kernel is prone to an information-disclosure vulnerability.

Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks.

Versions of the Linux kernel prior to 2.6.24-rc4 are vulnerable.

2. Microsoft Windows Workstation Service NetpManageIPCConnect Remote Code Execution Vulnerability
BugTraq ID: 20985
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/20985
Summary:
Microsoft Windows Workstation service is prone to a remote code-execution vulnerability.

Exploiting this issue allows remote, anonymous attackers to execute arbitrary machine code on affected computers with SYSTEM-level privileges. This facilitates the complete compromise of affected computers.

Attackers require administrative privileges to exploit this issue on Windows XP SP2 computers. Anonymous attackers may exploit this issue on Windows 2000 computers.

3. Rsync 'xattr' Support Integer Overflow Vulnerability
BugTraq ID: 28726
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28726
Summary:
The rsync utility is prone to a remote integer-overflow vulnerability because the application fails to properly ensure that user-supplied input doesn't overflow integer values. This may result in user-supplied data being copied past the end of a memory buffer.

Attackers may exploit this issue to execute arbitrary machine code in the context of the affected application, facilitating in the compromise of affected computers.

Versions of rsync between 2.6.9 and 3.0.1 that have 'xattr' support enabled are vulnerable.

4. HP OpenView Network Node Manager 'ovalarmsrv.exe' Multiple Remote Vulnerabilities
BugTraq ID: 28668
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28668
Summary:
HP OpenView Network Node Manager is prone to multiple vulnerabilities affecting the 'ovalarmsrv.exe' process. These issues include a format-string vulnerability, multiple buffer-overflow vulnerabilities, and a denial-of-service vulnerability.

Attackers can exploit these issues to execute arbitrary code with the privileges of the affected application or to consume excessive system resources. Successful exploits will compromise affected computers or cause denial-of-service conditions.

HP OpenView Network Node Manager 7.50 is vulnerable; the denial-of-service issue also affects version 7.53; other versions may also be affected.

5. Microsoft Windows GDI Stack Overflow Vulnerability
BugTraq ID: 28570
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28570
Summary:
Microsoft Windows is prone to a stack-based overflow vulnerability that resides in the GDI graphics library and can be triggered by a malformed EMF image file.

A successful exploit of this vulnerability can allow a remote attacker to completely compromise the affected computer.

6. Ruby WEBrick Remote Directory Traversal and Information Disclosure Vulnerabilities
BugTraq ID: 28123
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28123
Summary:
Ruby's WEBrick server is prone to remote directory-traversal and information-disclosure vulnerabilities.

Successfully exploiting these issues allows remote attackers to access the contents of arbitrary files. Information harvested may aid in further attacks.

These issues affect only operating systems that allow backslash (\) characters as path separators and operating systems that use case-insensitive filenames. This exposes Microsoft Windows and Apple Mac OS X operating systems to attack.

7. Joomla! and Mambo eXtplorer Component 'dir' Parameter Directory Traversal Vulnerability
BugTraq ID: 28764
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28764
Summary:
The Joomla! and Mambo eXtplorer component is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.

Exploiting the issue may allow an attacker to access sensitive information that could aid in further attacks.

eXtplorer 2.0.0 RC2 is vulnerable; other versions may also be affected.

8. Business Objects Infoview 'jsessionid' Parameter Cross-Site Scripting Vulnerability
BugTraq ID: 28762
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28762
Summary:
Business Objects is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input via the Infoview web portal.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

This issue affects Java versions of Business Objects XI R2; other versions may also be affected.

NOTE: .Net versions are unaffected.

9. XT-News Multiple Administrative Scripts Authentication Bypass Vulnerabilities
BugTraq ID: 28761
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28761
Summary:
XT-News is prone to multiple authentication-bypass vulnerabilities because it fails to perform adequate authentication checks.

An attacker can exploit these issues to gain unauthorized access to the application and make arbitrary changes to its configuration. This may lead to further attacks.

XT-News 0.1 is vulnerable; other versions may also be affected.

10. HP OpenView Network Node Manager Directory Traversal and Multiple Denial Of Service Vulnerabilities
BugTraq ID: 28745
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28745
Summary:
HP OpenView Network Node Manager is prone to multiple vulnerabilities affecting the 'ovalarmsrv.exe' and 'ovtopmd.exe' processes. These issues include a directory-traversal issue and multiple denial-of-service issues.

UPDATE (April 14, 2008): Secunia Research discovered, independently, that the 'OpenView5.exe' process is also prone to the directory-traversal issue; this affects Network Node Manager 7.51. Note that 'ovalarmsrv.exe' may also be named 'OpenView5.exe'.

Attackers can exploit these issues to access potentially sensitive data on the affected computer or to deny service to legitimate users.

HP OpenView Network Node Manager 7.53 is vulnerable; other versions may also be affected.

11. PHPKB 'comment.php' SQL Injection Vulnerability
BugTraq ID: 28739
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28739
Summary:
PHPKB is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects PHPKB 1.5 and 2.0; other versions may also be affected.

12. Omnistar Article Manager Article.PHP SQL Injection Vulnerability
BugTraq ID: 25692
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/25692
Summary:
Omnistar Article Manager is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

13. IBM WebSphere MQ Security Bypass Vulnerability
BugTraq ID: 28046
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28046
Summary:
IBM WebSphere MQ is prone to a security-bypass vulnerability because the application fails to properly restrict access to certain functionality.

Attackers can exploit this issue to bypass certain security restrictions, connect to a queue manager in an unauthorized manner, and obtain potentially sensitive information; other attacks are also possible.

This issue affects versions prior to:

5.3 Fix Pack 14
6.0 Fix Pack 6.0.2.2

14. Adobe Flash Player SWF File 'DeclareFunction2' ActionScript Tag Remote Code Execution Vulnerability
BugTraq ID: 28694
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28694
Summary:
Adobe Flash Player is prone to a remote code-execution vulnerability when handling certain embedded ActionScript objects.

An attacker may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Adobe Flash Player 9.0.115.0 and earlier versions are affected.

15. Coppermine Photo Gallery 'bridge/coppermine.inc.php' SQL Injection Vulnerability
BugTraq ID: 28767
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28767
Summary:
Coppermine Photo Gallery is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects versions prior to Coppermine Photo Gallery 1.4.18.

16. Coppermine Photo Gallery 'upload.php' SQL Injection Vulnerability
BugTraq ID: 28766
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28766
Summary:
Coppermine Photo Gallery is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects versions prior to Coppermine Photo Gallery 1.4.17.

17. XM Easy Personal FTP Server 'PORT and 'XCWD' Multiple Remote Denial of Service Vulnerabilities
BugTraq ID: 28759
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28759
Summary:
XM Easy Personal FTP Server is prone to multiple remote denial-of-service vulnerabilities.

These issues allow remote attackers to crash affected FTP servers, denying service to legitimate users. Given the nature of these issues, attackers may also be able to execute arbitrary code, but this has not been confirmed.

XM Easy Personal FTP Server 5.4.0 is vulnerable; other versions may also be affected.

18. Mumbo Jumbo Media OP4 'id' Parameter SQL Injection Vulnerability
BugTraq ID: 28763
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28763
Summary:
Mumbo Jumbo Media OP4 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

19. Microsoft Windows GDI 'CreateDIBPatternBrushPt' Function Heap Overflow Vulnerability
BugTraq ID: 28571
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28571
Summary:
Microsoft Windows is prone to a heap-based overflow vulnerability that resides in the GDI graphics library and can be triggered by a malformed EMF or WMF image file.

A successful exploit of this vulnerability can allow a remote attacker to completely compromise the affected computer.

20. NagiosQL Prepend_Adm.PHP Remote File Include Vulnerability
BugTraq ID: 23966
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/23966
Summary:
NagiosQL is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

This issue affects NagiosQL 2.0; other versions may also be vulnerable.

21. OmniPCX Office Unspecified Information Disclosure Vulnerability
BugTraq ID: 28758
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28758
Summary:
OmniPCX Office with Internet Access services is prone to an information-disclosure vulnerability.

Attackers can exploit this issue to obtain sensitive information and potentially compromise the affected server.

The issue affects OmniPCX Office since release 210/061.1.

22. Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability
BugTraq ID: 28552
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28552
Summary:
Microsoft Internet Explorer is prone to a remote code-execution vulnerability because it fails to adequately handle certain user-supplied data.

Attackers can leverage this issue to execute arbitrary code with the privileges of the application. Successful exploits will compromise affected computers. Failed attacks may cause denial-of-service conditions.

23. phpAddressBook 'view.php' SQL Injection Vulnerability
BugTraq ID: 28750
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28750
Summary:
phpAddressBook is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

phpAddressBook 2.11 is vulnerable; other versions may also be affected.

24. CcMail Cookie Security Bypass Vulnerability
BugTraq ID: 28751
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28751
Summary:
CcMail is prone to a security-bypass vulnerability because it fails to properly validate user credentials before performing certain actions.

Exploiting this issue may allow an attacker to bypass certain security restrictions and gain administrative access to the application. This will compromise the application and may aid in further attacks.

This issue affects CcMail 1.0.1 and prior versions.

25. NewsOffice 'news_show.php' Remote File Include Vulnerability
BugTraq ID: 28748
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28748
Summary:
NewsOffice is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue can allow an attacker to compromise the application and the underlying system; other attacks are also possible.

NewsOffice 1.1 is vulnerable; other versions may also be affected.

26. Trillian DTD File XML Parser Buffer Overflow Vulnerability
BugTraq ID: 28747
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28747
Summary:
Trillian is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

To exploit this issue, an attacker must entice an unsuspecting user to load a malicious '.dtd' file. Successfully exploiting this issue may allow remote attackers to execute arbitrary code with SYSTEM-level privileges. Failed exploit attempts will cause denial-of-service conditions.

Trillian 3.1.9.0 Basic is vulnerable; other versions may also be affected.

27. Koobi Pro 'galid' Parameter Multiple SQL Injection Vulnerabilities
BugTraq ID: 28710
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28710
Summary:
Koobi Pro is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

These issues affect Koobi Pro 6.25 and Koobi CMS 4.3.0; other versions may also be vulnerable.

28. Linux Kernel 'tmpfs' filesystem Local Security Vulnerability
BugTraq ID: 27694
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/27694
Summary:
Linux Kernel is prone to a vulnerability that allows attackers to obtain sensitive information or to cause a denial-of-service condition.

29. Koobi 'categ' Parameter SQL Injection Vulnerability
BugTraq ID: 28059
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28059
Summary:
Koobi is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects Koobi 4.2.3 to 4.3.0; other versions may also be vulnerable.

30. Linux Kernel 'isdn_common.c' Local Buffer Overflow Vulnerability
BugTraq ID: 27497
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/27497
Summary:
The Linux kernel is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to cause denial-of-service conditions. Given the nature of this issue, the attacker may also be able to execute arbitrary code, but this has not been confirmed.

This issue affects versions prior to Linux kernel 2.6.25.

31. Koobi Pro 'categ' Parameter SQL Injection Vulnerability
BugTraq ID: 28031
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28031
Summary:
Koobi Pro is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects Koobi Pro 5.7 and Koobi CMS 4.2.4 - 4.3.0; other versions may also be vulnerable.

32. Gallarific Cross Site Scripting, HTML Injection and Backdoor Vulnerabilities
BugTraq ID: 28794
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28794
Summary:
Gallarific is prone to multiple security vulnerabilities, including multiple HTML-injection issues and multiple cross-site scripting issues. In addition, the source code for the application's free version may have been compromised to include a malicious backdoor; this has not been confirmed.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, or control how the site is rendered to the user. Other attacks are also possible.

These issues affect the free versions of Gallarific; the paid version may also be vulnerable.

33. Omnistar OSI Affiliate 'login.php' Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 28793
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28793
Summary:
Omnistar OSI Affiliate is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

Attackers may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow attackers to steal cookie-based authentication credentials and to launch other attacks.

34. Amfphp Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 28789
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28789
Summary:
Amfphp is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

Attackers may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow attackers to steal cookie-based authentication credentials and to launch other attacks.

Amfphp 1.2 is vulnerable; other versions may also be affected.

35. phpBB Memberlist Search And Private Message Attachment Mutliple Security Bypass Vulnerabilities
BugTraq ID: 28790
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28790
Summary:
phpBB is prone to two vulnerabilities that attackers can leverage to bypass security restrictions. These issues affect the memberlist search and the private-message attachment features.

Authenticated attackers can exploit these issues to determine the private email addresses of arbitrary users and to view files that are attached to private messages between arbitrary users. Information harvested in successful exploits will aid in further attacks.

phpBB 3.0.0 is vulnerable; prior versions may also be affected.

36. phpHotResources 'cat.php' SQL Injection Vulnerability
BugTraq ID: 28791
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28791
Summary:
phpHotResources is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

37. Dotclear 'ecrire/images.php' Arbitrary File Upload Vulnerability
BugTraq ID: 28787
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28787
Summary:
Dotclear is prone to a vulnerability that lets an attacker upload and execute arbitrary script code in the context of the affected webserver process. The issue occurs because the application fails to sufficiently sanitize user-supplied input.

Dotclear 1.2.7.1 is vulnerable; other versions may also be affected.

38. BosDev BosNews '/admin/index.php' Authentication Bypass Vulnerability
BugTraq ID: 28792
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28792
Summary:
BosDev BosNews is prone to an authentication-bypass vulnerability because it fails to restrict access to certain scripts.

Attackers can leverage this issue to create arbitrary administrative user accounts and gain unauthorized access to the application. Successful attacks will compromise the application and possibly the underlying webserver.

BosNews 4.0 and 2002 through 2006 are vulnerable; other versions may also be affected.

39. Microsoft Office File Memory Corruption Vulnerability
BugTraq ID: 28146
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28146
Summary:
Microsoft Office is prone to a remote memory-corruption vulnerability.

An attacker could exploit this issue by enticing a victim to open a malicious Office file.

Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user.

40. KwsPHP Eskuel Module Arbitrary File Upload Vulnerability
BugTraq ID: 28788
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28788
Summary:
The Eskuel module for KwsPHP is prone to a vulnerability that lets remote attackers upload and execute arbitrary code because the application fails to sanitize user-supplied input.

An attacker can leverage this issue to execute arbitrary code on an affected computer with the privileges of the webserver process.

Note that to exploit this issue, the attacker may require valid login credentials.

This issue affects KwsPHP 1.3.456; prior versions may also be affected.

41. WORK system e-commerce 'main.php' Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 28785
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28785
Summary:
WORK system e-commerce is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

Authenticated attackers may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow attackers to steal cookie-based authentication credentials and to launch other attacks.

WORK system e-commerce 4.0.9 is vulnerable; other versions may also be affected.

42. CUPS PNG Filter Multiple Integer Overflow Vulnerabilities
BugTraq ID: 28781
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28781
Summary:
CUPS is prone to multiple integer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied PNG image sizes before using them to allocate memory buffers.

Successful exploits may allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions.

CUPS 1.3.7 is vulnerable; other versions may also be affected.

43. BosDev BosNews 'news.php' SQL Injection Vulnerability
BugTraq ID: 28778
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28778
Summary:
BosDev BosNews is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects BosNews 4.0; other versions may also be vulnerable.

44. DevWorx BlogWorx 'view.asp' SQL Injection Vulnerability
BugTraq ID: 28776
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28776
Summary:
BlogWorx is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

BlogWorx 1.0 is vulnerable; other versions may also be affected.

45. Nero MediaHome NMMediaServer.EXE Remote Denial of Service Vulnerability
BugTraq ID: 28775
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28775
Summary:
Nero MediaHome is prone to a remote denial-of-service vulnerability because the application fails to handle exceptional conditions.

An attacker can exploit this issue to crash the affected application, denying further service to legitimate users.

This issue affects Nero MediaHome 3.3.3.0. Other versions may also be affected.

46. Libpng Library Unknown Chunk Handler Vulnerability
BugTraq ID: 28770
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28770
Summary:
The 'libpng' library is prone to a vulnerability that causes denial-of-service conditions or may allow code to run. The issue occurs because the software fails to properly handle unexpected chunk data in PNG files.

Successfully exploiting this issue allows remote attackers to trigger denial-of-service conditions or to possibly execute arbitrary machine code in the context of applications that use the library.

The following versions are affected:

- libpng 1.0.6 through 1.0.32
- libpng 1.2.0 through 1.2.26
- libpng 1.4.0beta01 through 1.4.0beta19

47. MirBSD Korn Shell Local Privilege Escalation Vulnerability
BugTraq ID: 28768
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28768
Summary:
MirBSD Korn Shell (mksh) is prone to a local privilege-escalation vulnerability because the application fails to properly ensure that the origin of terminal input is secure.

Successfully exploiting this issue allows local attackers to execute arbitrary shell commands with the privileges of other users running the affected shell.

Versions prior to mksh R33d are vulnerable.

48. BosClassifieds 'index.php' SQL Injection Vulnerability
BugTraq ID: 28760
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28760
Summary:
BosClassifieds is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects BosClassifieds 3.0; other versions may also be vulnerable.

49. Autonomy KeyView Module Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 28454
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28454
Summary:
Autonomy KeyView module is prone to multiple stack- and heap-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers.

Exploiting these issues will allow an attacker to corrupt memory and to cause denial-of-service conditions or potentially to execute arbitrary code in the context of the application using the module.

Multiple products using the KeyView module are affected.

50. FishSound Library Remote Speex Decoding Code Execution Vulnerability
BugTraq ID: 28665
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28665
Summary:
The FishSound 'libfishsound' library is prone to a remote code-execution vulnerability because the software fails to properly bounds-check user-supplied data.

Successfully exploiting this issue allows attackers to execute arbitrary machine code in the context of applications that use the library. Failed exploit attempts likely result in denial-of-service conditions.

Versions prior to FishSound 0.9.1 are vulnerable.

The following applications use the library and are also vulnerable:

- Speex
- Annodex plugin for Firefox
- Illiminable DirectShow Filters

Other applications may also be affected.

51. Python zlib Module Remote Buffer Overflow Vulnerability
BugTraq ID: 28715
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28715
Summary:
Python zlib module is prone to a remote buffer-overflow vulnerability because the library fails to properly sanitize user-supplied data.

An attacker can exploit this issue to execute arbitrary code with the privileges of the user running an application that relies on the affected library. Failed exploit attempts will result in a denial-of-service condition.

This issue affects Python 2.5.2; other versions may also be vulnerable.

52. Opera Web Browser 9.26 Multiple Security Vulnerabilities
BugTraq ID: 28585
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28585
Summary:
Opera Web Browser is prone to multiple security vulnerabilities that may allow remote attackers to execute code.

These issues lead to memory corruption and may result in remote unauthorized access and denial-of-service attacks.

Versions prior to Opera 9.27 are vulnerable.

53. Asterisk Host-Based Authentication Security Bypass Vulnerability
BugTraq ID: 26928
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26928
Summary:
Asterisk is prone to a security-bypass vulnerability that affects the SIP and IAX protocols.

An attacker can exploit this issue to bypass the host-based authentication mechanism. Successfully exploiting this issue will allow an attacker to impersonate any user. This may lead to false sense of security.

This issue affects versions prior to:

Asterisk Open Source 1.2.26
Asterisk Open Source 1.4.16
Asterisk Business Edition B.2.3.6
Asterisk Business Edition C.1.0-beta8

54. Asterisk CDR_PGSQL SQL Injection Vulnerability
BugTraq ID: 26647
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26647
Summary:
Asterisk is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects versions prior to:

Asterisk Open Source 1.2.25 and 1.4.15
Asterisk Business Edition B.2.3.4.

NOTE: This issue occurs only when the 'cdr_pgsql' module is enabled. This module is disabled by default.

55. Asterisk Call Authentication Security Bypass Vulnerability
BugTraq ID: 28310
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28310
Summary:
Asterisk is prone to a security-bypass vulnerability that allows attackers to make unauthenticated calls through the SIP channel driver.

Exploiting this issue may also aid in other attacks.

This issue affects the following versions:

Asterisk Open Source prior to 1.2.27
Asterisk Open Source prior to 1.4.18.1 and 1.4.19-rc3.
Asterisk Open Source prior to 1.6.0-beta6
Asterisk Business Edition all A versions
Asterisk Business Edition prior to B.2.5.1
Asterisk Business Edition prior to C.1.6.2
AsteriskNOW prior to 1.0.2
Asterisk Appliance Developer Kit prior to Asterisk 1.4 revision 109393
s800i (Asterisk Appliance) prior to 1.1.0.2

56. ClamAV 0.92.1 Multiple Vulnerabilities
BugTraq ID: 28784
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28784
Summary:
ClamAV is prone to multiple vulnerabilities, including buffer-overflow and denial-of-service issues.

Successful exploits allow remote attackers to cause denial-of-service conditions or potentially to execute arbitrary machine code in the context of applications that use the vulnerable library.

Versions prior to ClamAV 0.93 are vulnerable.

57. ClamAV ARJ File Denial Of Service Vulnerability
BugTraq ID: 28782
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28782
Summary:
ClamAV is prone to a denial-of-service vulnerability because it fails to handle exceptional conditions.

Attackers can exploit this issue to cause denial-of-service conditions.

Versions prior to ClamAV 0.93 are vulnerable.

58. ClamAV 'libclamav/pe.c' UPACK File Heap Based Buffer Overflow Vulnerability
BugTraq ID: 28756
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28756
Summary:
ClamAV is prone to a heap-based buffer-overflow vulnerability because it fails to properly verify user-supplied data.

Successful exploits of this vulnerability can allow remote attackers to execute arbitrary machine code in the context of applications using the vulnerable 'libclamav' library. Failed exploit attempts will likely cause denial-of-service conditions.

ClamAV 0.92 and 0.92.1 are vulnerable to this issue; other versions may also be affected.

59. RETIRED: ClamAV 'libclamav/pe.c' UPACK File Heap Based Buffer Overflow Vulnerability
BugTraq ID: 28783
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28783
Summary:
ClamAV is prone to a heap-based buffer-overflow vulnerability because it fails to properly verify user-supplied data.

Successful exploits of this vulnerability can allow remote attackers to execute arbitrary machine code in the context of applications using the vulnerable 'libclamav' library. Failed exploit attempts will likely cause denial-of-service conditions.

ClamAV 0.92 and 0.92.1 are vulnerable to this issue; other versions may also be affected.

NOTE: This BID is being retired because it is a duplicate of BID 28756.

60. Cezanne Software 'FUNID' Parameter Multiple SQL Injection Vulnerabilities
BugTraq ID: 28773
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28773
Summary:
Cezanne Software is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Cezanne 7 is vulnerable; other versions may also be affected.

61. Cezanne Software 'CFLogon.asp' Cross-Site Scripting Vulnerability
BugTraq ID: 28774
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28774
Summary:
Cezanne Software is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Cezanne 6.5.1 and 7 are vulnerable; other versions may also be affected.

62. Cezanne Software Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 28772
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28772
Summary:
Cezanne Software is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

Authenticated attackers may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow attackers to steal cookie-based authentication credentials and to launch other attacks.

Cezanne 6.5.1 and 7 are vulnerable; other versions may also be affected.

63. Mambo and Joomla! Jom Comment Component User Credential SQL Injection Vulnerability
BugTraq ID: 28812
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28812
Summary:
Jom Comment component for Mambo! and Joomla is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects Jom Comment 2.0 build 345; other versions may also be affected.

64. Retired: PHPSlideShow Toonchapter8.php Cross Site Scripting Vulnerability
BugTraq ID: 26576
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26576
Summary:
PHPSlideShow is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue allows attackers to execute arbitrary HTML or script code in a user's browser session in the context of an affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

NOTE: Reports indicate that the vulnerable script does not exist in the affected application. Therefore, this BID is being retired.

65. Oracle April 2008 Critical Patch Update Multiple Vulnerabilities
BugTraq ID: 28725
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28725
Summary:
Oracle has released its critical patch update for April 2008. The advisory addresses 41 vulnerabilities affecting Oracle Database, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business Suite and Applications, Oracle Enterprise Manager, Oracle PeopleSoft Enterprise, and Oracle Siebel SimBuilder.

The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. Various levels of authorization are needed to leverage some of the issues, but other issues do not require any authorization. The most severe of the vulnerabilities could possibly compromise affected computers.

66. Sun Java Runtime Environment Image Parsing Heap Buffer Overflow Vulnerability
BugTraq ID: 28125
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28125
Summary:
Sun Java Runtime Environment is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application.

This issue affects the following products and versions:

JDK and JRE 6 prior to Update 5
JDK and JRE 5.0 prior to Update 15
SDK and JRE prior to 1.4.2_17
SDK and JRE prior to 1.3.1_22

This vulnerability was previously covered in BID 28083 (Sun Java SE Multiple Security Vulnerabilities), but has been given its own record to better document the issue.

67. Sun Java SE Multiple Security Vulnerabilities
BugTraq ID: 28083
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28083
Summary:
Sun has released advisories addressing multiple vulnerabilities affecting the following software:

JDK and JRE 6 Update 5
JDK and JRE 5.0 Update 15
SDK and JRE 1.4.2_17
SDK and JRE 1.3.1_22

68. Sun Java RunTime Environment Read and Write Permission Multiple Privilege Escalation Vulnerabilities
BugTraq ID: 27650
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/27650
Summary:
Sun Java Runtime Environment is prone to multiple privilege-escalation vulnerabilities when running untrusted applications or applets.

Successful exploits will compromise arbitrary data and possibly the underlying computer.

These issues affect the following versions:

JDK and JRE 6 Update 1 and earlier
JDK and JRE 5.0 Update 13 and earlier.

69. Sun Java RunTime Environment XML Parsing Unspecified Vulnerability
BugTraq ID: 27553
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/27553
Summary:
Sun Java Runtime Environment (JRE) is prone to an unspecified vulnerability that can occur when parsing malicious XML content.

Exploiting this issue will allow JRE to process external references even if it has been configured not to do so. Attackers can leverage this issue to launch further attacks or to cause denial-of-service conditions.

This issue affects JDK and JRE 6 Update 3 and earlier.

70. BS.Player SRT File Remote Buffer Overflow Vulnerability
BugTraq ID: 28811
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28811
Summary:
BS.Player is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

BS.Player 2.27.959 is vulnerable; other versions may also be affected.

71. Blogator-script 'bs_auth.php' Cross Site Scripting Vulnerability
BugTraq ID: 28810
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28810
Summary:
Blogator-script is prone to a cross-site scripting vulnerability because it fails to adequately sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Blogator-script 0.95 is affected; other versions may also be vulnerable.

72. Computer Associates DSM 'gui_cm_ctrls.ocx' ActiveX Control Remote Code Execution Vulnerability
BugTraq ID: 28809
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28809
Summary:
Computer Associates DSM 'gui_cm_ctrls.ocx' ActiveX control is prone to a remote code-execution vulnerability.

Remote attackers can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Successful exploits will compromise the application and possibly the underlying computer. Failed attacks will cause denial-of-service conditions.

73. XplodPHP AutoTutorials 'id' Parameter SQL Injection Vulnerability
BugTraq ID: 28808
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28808
Summary:
XplodPHP AutoTutorials is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

AutoTutorials 2.1 is vulnerable; other versions may also be affected.

74. Carbon Communities Multiple SQL Injection and Cross-Site Scripting Vulnerabilities
BugTraq ID: 28806
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28806
Summary:
Carbon Communities is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Carbon Communities 2.4 is vulnerable; prior versions may also be affected.

75. Cisco Network Admission Control Shared Secret Information Disclosure Vulnerability
BugTraq ID: 28807
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28807
Summary:
Cisco Network Admission Control (NAC) appliance is prone to a remote information-disclosure vulnerability because it fails to securely transmit potentially sensitive data over the network.

Attackers can exploit this issue to harvest the shared secret used between the Cisco Clean Access Server (CAS) and the Cisco Clean Access Manager (CAM) to gain unauthorized access to the appliance. This may facilitate the complete compromise of the device and may lead to further attacks. This issue is documented in Cisco Bug ID CSCsj33976.

This issue affects the following versions of the NAC appliance software:

- all 3.5 versions
- all 3.6 versions prior to 3.6.4.4
- all 4.0 versions prior to 4.0.6
- all 4.1 versions prior to 4.1.2

76. Squid Web Proxy Cache 'arrayShrink()' Remote Denial of Service Vulnerability
BugTraq ID: 28693
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28693
Summary:
Squid is prone to a remote denial-of-service vulnerability because of a flaw when processing HTTP headers for cached objects.

Successfully exploiting this issue allows remote attackers to crash the affected application, denying further service to legitimate users.

NOTE: This vulnerability was caused by an incorrect fix for the issue described in BID 26687 (Squid Proxy Cache Update Reply Processing Remote Denial of Service Vulnerability; CVE-2007-6239).

This issue affects Squid 2.6 prior to 2.6.STABLE18.

77. IBM Informix Dynamic Server Multiple Remote Vulnerabilities
BugTraq ID: 28198
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28198
Summary:
IBM Informix Dynamic Server is prone to multiple remote vulnerabilities:

- Two buffer-overflow vulnerabilities.
- An unspecified vulnerability when handling malformed packets.

An attacker can exploit these issues to execute arbitrary code with superuser privileges. Successfully exploiting these issues will result in the complete compromise of affected computers. Failed exploit attempts will cause denial-of-service conditions.

78. OpenSSH X connections Session Hijacking Vulnerability
BugTraq ID: 28444
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28444
Summary:
OpenSSH is prone to a vulnerability that allows attackers to hijack forwarded X connections.

Successfully exploiting this issue may allow an attacker run arbitrary shell commands with the privileges of the user running the affected application.

This issue affects OpenSSH 4.3p2; other versions may also be affected.

NOTE: This issue affects the portable version of OpenSSH and may not affect OpenSSH running on OpenBSD.

79. ICQ 'Personal Status Manager' Remote Buffer Overflow Vulnerability
BugTraq ID: 28803
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28803
Summary:
ICQ is prone to a remote buffer-overflow vulnerability because the application fails to perform boundary checks before copying user-supplied data into sensitive process buffers.

A remote attacker may execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial of service.

This issue affects ICQ 6 build 6043; other versions may also be vulnerable.

80. Cecilia Insecure Temporary File Creation Vulnerability
BugTraq ID: 28805
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28805
Summary:
Cecilia creates temporary files in an insecure manner.

An attacker with local access could potentially exploit this issue to perform symbolic-link attacks, overwriting arbitrary files in the context of the affected application.

Successfully mounting a symlink attack may allow the attacker to delete or corrupt sensitive files, which may result in a denial of service. Other attacks may also be possible.

This issue affects Cecilia 2.0.5; other versions may also be affected.

81. Apache Tomcat Cookie Quote Handling Remote Information Disclosure Vulnerability
BugTraq ID: 27706
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/27706
Summary:
Apache Tomcat is prone to an information-disclosure vulnerability because it fails to adequately sanitize user-supplied data.

Attackers can exploit this issue to access potentially sensitive data that may aid in further attacks.

Versions prior to Apache Tomcat 6.0.16 and 5.5.26 are vulnerable.

NOTE: This vulnerability is caused by an incomplete fix for BID 25316 - Apache Tomcat Multiple Remote Information Disclosure Vulnerabilities (CVE-2007-3385).

82. SmallBiz 4 Seasons 'content.php' SQL Injection Vulnerability
BugTraq ID: 28769
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28769
Summary:
SmallBiz 4 Seasons is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

83. LASERnet CMS 'new' Parameter SQL Injection Vulnerability
BugTraq ID: 28804
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28804
Summary:
LASERnet CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects LASERnet CMS 1.5; other versions may also be vulnerable.

84. Classifieds Caffe 'cat_id' Parameter SQL Injection Vulnerability
BugTraq ID: 28800
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28800
Summary:
Classifieds Caffe is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

85. Red Hat 'redhat-ds-admin' Shell Command Injection and Security Bypass Vulnerabilities
BugTraq ID: 28802
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28802
Summary:
The 'redhat-ds-admin' application is prone to a command-injection issue and security-bypass issues that affect the Administration Server.

Attackers with access to the replication monitor web page can exploit the command-injection issue to execute arbitrary shell commands with the privileges of the Administration Server. Remote unauthenticated attackers can use the security-bypass vulnerabilities to access potentially sensitive information or perform certain unauthorized actions.

Note that combining the vulnerabilities would allow remote unauthorized attackers to execute arbitrary code with the privileges of the Administration Server.

NOTE: In default configurations, the Administration Server runs as unprivileged user 'nobody'.

These issues affect 'redhat-ds-admin' used with Red Hat Directory Server 8.

86. eShop CMS 'index.php' SQL Injection Vulnerability
BugTraq ID: 28771
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28771
Summary:
eShop CMS is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.

An attacker may be able to exploit this issue to modify the logic of SQL queries. Successful exploits may allow the attacker to compromise the software, retrieve information, or modify data; other consequences are possible as well.

87. BigAnt IM Server HTTP GET Request Remote Buffer Overflow Vulnerability
BugTraq ID: 28795
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28795
Summary:
BigAnt IM Server is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the server. Failed exploit attempts will result in a denial-of-service condition.

BigAnt IM Server 2.2 is vulnerable; other versions may also be affected.

88. Adobe Flash Player Multimedia File Remote Buffer Overflow Vulnerability
BugTraq ID: 28695
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28695
Summary:
Adobe Flash Player is prone to a remote buffer-overflow vulnerability when handling multimedia files with certain tags.

An attacker may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Adobe Flash Player 9.0.115.0 and earlier versions are affected.

89. LightNEasy Multiple Input Validation Vulnerabilities
BugTraq ID: 28801
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28801
Summary:
LightNEasy is prone to multiple vulnerabilities, including SQL-injection, security-bypass, and information-disclosure issues, because it fails to sufficiently sanitize user-supplied data.

Successful exploits of these vulnerabilities may allow attackers to:

- compromise the application
- access or modify data
- exploit latent vulnerabilities in the underlying database
- view files and execute local scripts in the context of the webserver process
- execute arbitrary PHP script code in the context of the webserver process

These issues affect LightNEasy 1.2.2 and prior versions.

90. Xpdf Multiple Remote Stream.CC Vulnerabilities
BugTraq ID: 26367
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26367
Summary:
Xpdf is prone to multiple remote vulnerabilities because of flaws in various functions in the 'Stream.cc' source file.

Attackers exploit these issues by coercing users to view specially crafted PDF files with the affected application.

Successfully exploiting these issues allows attackers to execute arbitrary machine code in the context of the vulnerable application. This facilitates the remote compromise of affected computers.

Xpdf 3.02pl1 is vulnerable to these issues; other versions may also be affected.

91. PCRE Regular Expression Library Multiple Security Vulnerabilities
BugTraq ID: 26346
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26346
Summary:
PCRE regular-expression library is prone to multiple security vulnerabilities.

Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or launch other attacks in the context of the application using the affected library.

92. Net-SNMP GETBULK Remote Denial of Service Vulnerability
BugTraq ID: 26378
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26378
Summary:
Net-SNMP is prone to a remote denial-of-service vulnerability.

Successfully exploiting this issue allows remote attackers to cause denial-of-service conditions.

This issue affects versions prior to Net-SNMP 5.4.1.

93. PCRE Regular Expression Library Multiple Integer and Buffer Overflow Vulnerabilities
BugTraq ID: 26462
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/26462
Summary:
PCRE regular-expression library is prone to multiple integer- and buffer-overflow vulnerabilities.

Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, or launch other attacks in the context of the application using the affected library.

94. OpenPegasus WBEM CIM Management Server 'PAMBasicAuthenticatorUnix.cpp' Buffer Overflow Vulnerability
BugTraq ID: 27172
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/27172
Summary:
OpenPegasus is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

This issue occurs in the PAM (Pluggable Authentication Module) authentication code.

Attackers can leverage this issue to execute arbitrary code with superuser privileges. Successful exploits will completely compromise affected computers. Failed attacks will likely cause denial-of-service conditions.

Versions in the OpenPegasus 2.6 series are vulnerable.

95. IBM DB2 Universal Database Multiple Vulnerabilities
BugTraq ID: 27870
Remote: No
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/27870
Summary:
IBM DB2 Universal Database is prone to multiple vulnerabilities, including a denial-of-service issue and multiple local privilege-escalation issues.

An attacker can exploit these issues to execute arbitrary code with superuser privileges or crash the affected application, denying service to legitimate users.

96. DivX Player .SRT 'subtitle' Remote Buffer Overflow Vulnerability
BugTraq ID: 28799
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28799
Summary:
DivX Player is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

DivX Player 6.7.0 is vulnerable; other versions may also be affected.

97. Istant-Replay 'read.php' Remote File Include Vulnerability
BugTraq ID: 28797
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28797
Summary:
Istant-Replay is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue can allow an attacker to compromise the application and the underlying system; other attacks are also possible.

98. W2B Online Banking 'ilang' Parameter Remote File Include Vulnerability
BugTraq ID: 28796
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28796
Summary:
W2B Online Banking is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue can allow an attacker to compromise the application and the underlying system; other attacks are also possible.

99. Lighttpd SSL Error Denial of Service Vulnerability
BugTraq ID: 28489
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28489
Summary:
The 'lighttpd' program is prone to a remote denial-of-service vulnerability because it fails to handle exceptional conditions.

Successfully exploiting this issue allows remote attackers to close foreign SSL connections, denying service to legitimate users.

The issue affects lighttpd 1.4.19 and prior versions.

100. Koobi Pro 'poll_id' Parameter SQL Injection Vulnerability
BugTraq ID: 28779
Remote: Yes
Last Updated: 2008-04-16
Relevant URL: http://www.securityfocus.com/bid/28779
Summary:
Koobi Pro is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects Koobi Pro 6.25; other versions may also be vulnerable.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. U.S. gov't pushes cybersecurity at con
By: Robert Lemos
Top Bush Administration officials descend on the RSA Security Conference laying out their plans for protecting critical networks and giving a small taste of the latest national cyber exercise, Cyber Storm II.
http://www.securityfocus.com/news/11513

2. Web developers, fix thy Flash
By: Robert Lemos
Flaws that allow cross-site scripting attacks through Adobe Flash files could let attackers compromise online accounts and local networks. Yet, Web publishers have been slow to fix their sites, a security researcher says.
http://www.securityfocus.com/news/11511

3. Hacking contest highlights value of vulnerabilities
By: Robert Lemos
After a handful of critics slammed the modest cash prizes, larger bounties will be offered to the security pros that successfully compromise any of three laptops at a coming conference.
http://www.securityfocus.com/news/11510

4. House aims to scrutinize warrantless taps
By: Robert Lemos
The fight over a law to grant the U.S. government greater surveillance capabilities intensifies as House Democrats refuse to give telcos immunity for allowing past wiretaps without warrants.
http://www.securityfocus.com/news/11509

IV. SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Security Architect, Arlington
http://www.securityfocus.com/archive/77/490893

2. [SJ-JOB] Director, Information Security, Washington DC
http://www.securityfocus.com/archive/77/490911

3. [SJ-JOB] Sales Engineer, Washington
http://www.securityfocus.com/archive/77/490913

4. [SJ-JOB] Sales Engineer, St Paul
http://www.securityfocus.com/archive/77/490890

5. [SJ-JOB] Application Security Architect, Arlington
http://www.securityfocus.com/archive/77/490891

6. [SJ-JOB] Sales Engineer, Blue Bell
http://www.securityfocus.com/archive/77/490892

7. [SJ-JOB] Sr. Security Analyst, New York
http://www.securityfocus.com/archive/77/490894

8. [SJ-JOB] Account Manager, Chicago
http://www.securityfocus.com/archive/77/490897

9. [SJ-JOB] Security Consultant, Boston
http://www.securityfocus.com/archive/77/490895

10. [SJ-JOB] Account Manager, New York
http://www.securityfocus.com/archive/77/490896

11. [SJ-JOB] Sales Engineer, San Mateo
http://www.securityfocus.com/archive/77/490882

12. [SJ-JOB] Security Consultant, Basingstoke
http://www.securityfocus.com/archive/77/490884

13. [SJ-JOB] Sales Engineer, Philadelphia
http://www.securityfocus.com/archive/77/490726

14. [SJ-JOB] Sales Engineer, Rockville
http://www.securityfocus.com/archive/77/490727

15. [SJ-JOB] Security Architect, Roseland
http://www.securityfocus.com/archive/77/490728

16. [SJ-JOB] Security Consultant, London
http://www.securityfocus.com/archive/77/490721

17. [SJ-JOB] Sales Engineer, Multiple USA locations
http://www.securityfocus.com/archive/77/490722

18. [SJ-JOB] Security Consultant, Toronto
http://www.securityfocus.com/archive/77/490723

19. [SJ-JOB] Security Engineer, Irvine
http://www.securityfocus.com/archive/77/490724

20. [SJ-JOB] Security Engineer, Jersey City
http://www.securityfocus.com/archive/77/490725

21. [SJ-JOB] Sales Engineer, Boston
http://www.securityfocus.com/archive/77/490720

V. INCIDENTS LIST SUMMARY
---------------------------
1. Mysterious JavaScript appearance in website database
http://www.securityfocus.com/archive/75/490848

VI. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. Foxit Reader 2.2 two potentially exploitable bugs
http://www.securityfocus.com/archive/82/490931

2. Potential OOo security problem
http://www.securityfocus.com/archive/82/490864

3. EUSecWest CFP Closes April 14th (conf May 21/22 2008)
http://www.securityfocus.com/archive/82/490841

VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
VIII. SUN FOCUS LIST SUMMARY
----------------------------
IX. LINUX FOCUS LIST SUMMARY
----------------------------
1. DEF CON 16 Retro Announcement! Back to Bang!
http://www.securityfocus.com/archive/91/490836

2. EUSecWest CFP Closes April 14th (conf May 21/22 2008)
http://www.securityfocus.com/archive/91/490754

X. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to sf-news-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

XI. SPONSOR INFORMATION
------------------------
This issue is sponsored by Blackhat

Attend Black Hat USA, August 2-7 in Las Vegas, the world's premier technical event for ICT security experts.
Featuring 40 hands-on training courses and 80 Briefings presentations with lots of new content and new tools.
Network with 4,000 delegates from 50 nations.
Visit product displays by 30 top sponsors in a relaxed setting.

www.blackhat.com

No comments:

Blog Archive