News

Thursday, June 12, 2008

SecurityFocus Newsletter #457

SecurityFocus Newsletter #457
----------------------------------------

This issue is sponsored by IBM® Rational® AppScan

Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities.
Download a free trial of AppScan and see how it can help prevent against the threat of attack.
https://www.watchfire.com/securearea/appscan.aspx?id=701700000009T0r


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.Racing Against Reversers
2.Anti-Social Networking
II. BUGTRAQ SUMMARY
1. Net-SNMP Remote Authentication Bypass Vulnerability
2. X.Org X server RENDER Extension Multiple Integer Overflow Vulnerabilities
3. Pooya Site Builder Multiple SQL Injection Vulnerabilities
4. Xigla Software Multiple Scripts SQL Injection and Cross-Site Scripting Vulnerabilities
5. MycroCMS 'entry_id' Parameter SQL Injection Vulnerability
6. net2ftp FTP Client Request Handling Unspecified Security Vulnerability
7. IPTBB User Control Panel Privilege Escalation Vulnerability
8. Flat Calendar Multiple Administrative Scripts Authentication Bypass Vulnerabilities
9. uTorrent and BitTorrent HTTP 'Range' Header Remote Denial of Service Vulnerability
10. IBM OS/400 'BrSmRcvAndCheck()' Buffer Overflow Vulnerability
11. PHPEasyData Multiple SQL Injection and Cross-Site Scripting Vulnerabilities
12. eFiction 'toplist.php' SQL Injection Vulnerability
13. TYPO3 Cross-Site Scripting Vulnerability and File Upload Vulnerability
14. FOG Forum Multiple Local File Include Vulnerabilities
15. BackWeb 'LiteInstActivator.dll' ActiveX Control Buffer Overflow Vulnerability
16. Rapid-Source Rapid-Recipe Joomla! Component 'recipe_id' Parameter SQL Injection Vulnerability
17. Creative Labs AutoUpdate Eng 'CTSUEng.ocx' ActiveX Control Remote Buffer Overflow Vulnerability
18. Achievo 'config.php' Arbitrary File Upload Vulnerability
19. Microsoft Internet Explorer HTML Objects 'substringData()' Remote Code Execution Vulnerability
20. Microsoft Windows PGM Invalid Fragment Remote Denial Of Service Vulnerability
21. Microsoft Windows PGM Invalid Length Remote Denial Of Service Vulnerability
22. Microsoft Windows Bluetooth Stack Remote Code Execution Vulnerability
23. Microsoft Windows Media Format Runtime ASF File Remote Code Execution Vulnerability
24. Microsoft Internet Explorer 'setRequestHeader()' Multiple Vulnerabilities
25. Mozilla Firefox Action Prompt Delay Security Mechanism Bypass Vulnerability
26. Flux CMS 'loadsave.php' Arbitrary File Overwrite Vulnerability
27. X.Org X Server MIT-SHM Extension Information Disclosure Vulnerability
28. Horde Webmail 'addevent.php' Cross-Site Scripting Vulnerability
29. OpenOffice 'rtl_allocateMemory()' Heap Based Buffer Overflow Vulnerability
30. X.Org X Server RENDER Extension 'ProcRenderCreateCursor()' Denial of Service Vulnerability
31. Linux Kernel BER Decoding Remote Buffer Overflow Vulnerability
32. Net-SNMP Perl Module Buffer Overflow Vulnerability
33. Microsoft Windows WINS Server Local Privilege Escalation Vulnerability
34. Opera Web Browser 9.27 Multiple Security Vulnerabilities
35. Gallery 2.2.4 and Prior Versions Multiple Vulnerabilities
36. dotProject Security Bypass Vulnerability
37. Microsoft Windows Intelligent Input/Output (I2O) Multiple Local Privilege Escalation Vulnerabilities
38. Apple Safari and Microsoft Windows Client-side Code Execution Vulnerability
39. Microsoft DirectX MJPEG Video Streaming Stack Based Buffer Overflow Vulnerability
40. Microsoft DirectX SAMI File Parsing Stack Based Buffer Overflow Vulnerability
41. Microsoft Windows Active Directory LDAP Request Validation Remote Denial Of Service Vulnerability
42. SkyPortal Multiple SQL Injection Vulnerabilities
43. 'imlib2' Library Multiple Buffer Overflow Vulnerabilities
44. Perl Unicode '\Q...\E' Quoting Construct Regular Expression Buffer Overflow Vulnerability
45. Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability
46. Multiple Vendors BIND 'inet_network()' Off-by-One Buffer Overflow Vulnerability
47. CitectSCADA ODBC Server Remote Stack Based Buffer Overflow Vulnerability
48. Apple QuickTime 'AAC-encoded' Media Memory Corruption Vulnerability
49. Apple QuickTime Indo Video Codec Buffer Overflow Vulnerability
50. Apple QuickTime 'file:' URI File Execution Vulnerability
51. Apple QuickTime 'PICT' Image 'PixData' Structures Handling Heap Overflow Vulnerability
52. Apple QuickTime 'PICT' Image Buffer Overflow Vulnerability
53. Experts 'answer.php' SQL Injection Vulnerability
54. FreeType2 Printer Font Binary Remote Code Exeuction Vulnerability
55. FreeType2 Printer Font Binary Private Dictionary Table Integer Overflow Vulnerability
56. FreeType TrueType Font 'SHC' Heap Buffer Overflow Vulnerability
57. FreeType Printer Font Binary Heap Buffer Overflow Vulnerability
58. Motion 'read_client()' Off-By-One Buffer Overflow Vulnerability
59. Black Ice 'BiAnno.ocx' Annotation SDK/ActiveX Control Remote Buffer Overflow Vulnerability
60. Hot Links SQL-PHP Multiple Cross Site Scripting Vulnerabilities
61. ASPPortal 'reply.asp' SQL Injection Vulnerability
62. Insanely Simple Blog 'index.php' Multiple SQL Injection Vulnerabilities
63. yblog Multiple SQL Injection and Cross-Site Scripting Vulnerabilities
64. ErfurtWiki Multiple Local File Include Vulnerabilities
65. DCFM Blog 'comments.php' SQL Injection Vulnerability
66. Tornado Knowledge Retrieval System 'p' Parameter Cross Site Scripting Vulnerability
67. IBM Workplace Unspecified Cross Site Scripting Vulnerability
68. Fujitsu Interstage Management Console Unspecified Arbitrary File Access Vulnerability
69. PHP 5.2.5 and Prior Versions Multiple Vulnerabilities
70. RETIRED: Microsoft June 2008 Advance Notification Multiple Vulnerabilities
71. RETIRED: Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities
72. Linux Kernel Multiple Local MOXA Serial Driver Buffer Overflow Vulnerabilities
73. Linux Kernel 2.6.22.16 and Prior Multiple Memory Corruption Vulnerabilities
74. Linux Kernel 'dnotify.c' Local Race Condition Vulnerability
75. Linux Kernel x86_64 ptrace Denial Of Service Vulnerability
76. Linux Kernel 'fcntl_setlk()' SMP Ordering Local Denial of Service Vulnerability
77. Linux Kernel Driver Fault Handler 'mmap.c' Local Denial of Service Vulnerability
78. Linux Kernel IPSec Fragmented ESP Packet Remote Denial of Service Vulnerability
79. Gnome Evolution iCalendar Multiple Buffer Overflow Vulnerabilities
80. Windows Media Player ASX PlayList File Heap Overflow Vulnerability
81. Windows Media Player Remote ASF File Buffer Overflow Vulnerability
82. Adobe Acrobat and Reader Multiple Arbitrary Code Execution and Security Vulnerabilities
83. Multiple Web Browser BMP Partial Palette Information Disclosure and Denial Of Service Vulnerability
84. Mozilla Thunderbird/Seamonkey/Firefox 2.0.0.12 Multiple Remote Vulnerabilities
85. Mozilla Firefox chrome:// URI JavaScript File Request Information Disclosure Vulnerability
86. Mozilla Firefox/SeaMonkey JavaScript Garbage Collector Memory Corruption Vulnerability
87. Mozilla Thunderbird/Seamonkey/Firefox 2.0.0.11 Multiple Remote Vulnerabilities
88. Mozilla Firefox/Thunderbird/SeaMonkey Character Encoding Cross-Site Scripting Vulnerabilities
89. Linux Kernel CIFS Transport.C Remote Buffer Overflow Vulnerability
90. ASUS Remote Console DPC Proxy Buffer Overflow Vulnerability
91. HP-UX 'useradd' Security Bypass Vulnerability
92. HP FTP Unspecified Remote Denial of Service Vulnerability
93. Drupal Taxonomy Image Module Multiple Unspecified Cross Site Scripting Vulnerabilities
94. Drupal Magic Tabs Module PHP Code Execution Vulnerability
95. Sun Solaris 10 Event Port Denial of Service Vulnerability
96. Sun Solaris 10 and OpenSolaris Unspecified Kernel Denial of Service Vulnerability
97. Drupal Aggregation Module Multiple Vulnerabilities
98. Sun Java System Access Manager Authentication Bypass Vulnerability
99. Drupal Node Hierarchy Module Security Bypass Vulnerability
100. JAMM CMS 'id' Parameter SQL Injection Vulnerability
III. SECURITYFOCUS NEWS
1. Boycott spotlights antivirus testing issues
2. Hired gun blamed for business outage
3. Legal experts wary of MySpace hacking charges
4. Admins warned of brute-force SSH attacks
IV. SECURITY JOBS LIST SUMMARY
1. [SJ-JOB] Sales Engineer, San Francisco
2. [SJ-JOB] Security System Administrator, San Mateo
3. [SJ-JOB] Sales Engineer, San Francisco
4. [SJ-JOB] Sales Engineer, Alpharetta
V. INCIDENTS LIST SUMMARY
VI. VULN-DEV RESEARCH LIST SUMMARY
VII. MICROSOFT FOCUS LIST SUMMARY
1. default for requiring authentication 2003
VIII. SUN FOCUS LIST SUMMARY
IX. LINUX FOCUS LIST SUMMARY
1. sshd log analyzer
X. UNSUBSCRIBE INSTRUCTIONS
XI. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.Racing Against Reversers
By Federico Biancuzzi
Each time a new digital rights management (DRM) system is released, hackers are not far behind in cracking it. Reverse engineers have taken down the security protecting content encoded for Windows Media, iTunes, DVDs, and HD-DVDs.

http://www.securityfocus.com/columnists/474

2.Anti-Social Networking
By Mark Rasch
On May 15, 2008, a federal grand jury Los Angeles indicted 49-year-old Lori Drew of O.Fallon, Missouri, on charges of unauthorized access to a computer, typically used in hacking cases. Yet, Drew's alleged actions had little to do with computer intrusions.

http://www.securityfocus.com/columnists/473


II. BUGTRAQ SUMMARY
--------------------
1. Net-SNMP Remote Authentication Bypass Vulnerability
BugTraq ID: 29623
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29623
Summary:
Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error.

Successfully exploiting this issue will allow attackers to gain unauthorized access to the affected application.

Net-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable.

2. X.Org X server RENDER Extension Multiple Integer Overflow Vulnerabilities
BugTraq ID: 29670
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29670
Summary:
The RENDER component for X Server is prone to multiple integer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data.

Successful exploits may allow attackers to execute arbitrary code with the privileges of a user running the software. Failed exploit attempts likely cause denial-of-service conditions.

3. Pooya Site Builder Multiple SQL Injection Vulnerabilities
BugTraq ID: 29673
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29673
Summary:
Pooya Site Builder is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Pooya Site Builder 6.0 is vulnerable; other versions may also be affected.

4. Xigla Software Multiple Scripts SQL Injection and Cross-Site Scripting Vulnerabilities
BugTraq ID: 29672
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29672
Summary:
Multiple Xigla Software products are prone to cross-site scripting vulnerabilities and SQL-injection vulnerabilities because the applications fail to sufficiently sanitize user-supplied input.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

These issues affect the following Xigla Software products:

Absolute Live Support XE 5.1
Absolute News Manager XE 3.2
Absolute Banner Manager XE
Absolute Form Processor XE 4.0
Absolute Image Gallery XE
Absolute Poll Manager XE
Absolute Control Panel XE

5. MycroCMS 'entry_id' Parameter SQL Injection Vulnerability
BugTraq ID: 29671
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29671
Summary:
MycroCMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

MycroCMS 0.5 is vulnerable; other versions may also be affected.

6. net2ftp FTP Client Request Handling Unspecified Security Vulnerability
BugTraq ID: 29664
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29664
Summary:
net2ftp is prone to a vulnerability that can allow remote attackers to retrieve or delete files, or execute arbitrary PHP code.

A successful exploit can allow an attacker to upload arbitrary PHP scripts and execute them in the context of the application, obtain sensitive information, or delete files. Other attacks may also be possible.

net2ftp 0.96 (stable) and 0.97 (beta) are vulnerable; other versions may also be affected.

7. IPTBB User Control Panel Privilege Escalation Vulnerability
BugTraq ID: 29663
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29663
Summary:
IPTBB is prone to a privilege-escalation because it fails to sufficiently sanitize user-supplied input.

An attacker can exploit this vulnerability to gain unauthorized administrative access to the application; other attacks are also possible.

IPTBB 0.5.6 is vulnerable; other versions may also be affected.

8. Flat Calendar Multiple Administrative Scripts Authentication Bypass Vulnerabilities
BugTraq ID: 29662
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29662
Summary:
Flat Calendar is prone to multiple authentication-bypass vulnerabilities because it fails to perform adequate authentication checks.

An attacker can exploit these issues to gain unauthorized access to the application and make arbitrary changes to its configuration. This may lead to further attacks.

Flat Calendar 1.1 is vulnerable; other versions may also be affected.

9. uTorrent and BitTorrent HTTP 'Range' Header Remote Denial of Service Vulnerability
BugTraq ID: 29661
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29661
Summary:
The WebUI for uTorrent and BitTorrent is prone to a remote denial-of-service vulnerability.

Successful exploits result in application crashes, denying service to legitimate users.

uTorrent version 1.7.7 and BitTorrent version 6.0.1 are vulnerable to this issue; other versions may also be affected.

10. IBM OS/400 'BrSmRcvAndCheck()' Buffer Overflow Vulnerability
BugTraq ID: 29660
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29660
Summary:
IBM OS/400 is prone to a remote buffer-overflow vulnerability because it fails to properly perform size checks on user-supplied input.

An attacker can exploit this issue to halt the IPL (Initial Program Load) bootstrap process, denying service to legitimate users. Due to the nature of this issue, code execution may also be possible, but that has not been confirmed.

11. PHPEasyData Multiple SQL Injection and Cross-Site Scripting Vulnerabilities
BugTraq ID: 29659
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29659
Summary:
PHPEasyData is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker may leverage the cross-site scripting issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Attackers may exploit the SQL-injection issues to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

PHPEasyData 1.5.4 is vulnerable; other versions may also be affected.

12. eFiction 'toplist.php' SQL Injection Vulnerability
BugTraq ID: 29658
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29658
Summary:
eFiction is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

eFiction 3.0 is vulnerable; other versions may also be affected.

13. TYPO3 Cross-Site Scripting Vulnerability and File Upload Vulnerability
BugTraq ID: 29657
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29657
Summary:
TYPO3 is prone to a cross-site scripting vulnerability and a file-upload vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The attackers can exploit the file upload issue to execute arbitrary code in the context of the webserver.

TYPO3 versions 3.x, 4.0 to 4.0.8, 4.1 to 4.1.6, 4.2.0 are vulnerable.

14. FOG Forum Multiple Local File Include Vulnerabilities
BugTraq ID: 29651
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29651
Summary:
FOG Forum is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker can exploit these vulnerabilities using directory-traversal strings to view files and execute local scripts in the context of the webserver process. This may aid in further attacks.

FOG Forum 0.8.1 is vulnerable; other versions may also be affected.

15. BackWeb 'LiteInstActivator.dll' ActiveX Control Buffer Overflow Vulnerability
BugTraq ID: 29558
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29558
Summary:
BackWeb is prone to a remote buffer-overflow vulnerability because of a flaw in one of its ActiveX control components. The issue occurs because the component fails to perform adequate boundary checks on user-supplied input before copying it to a buffer.

An attacker can exploit this issue to run arbitrary attacker-supplied code in the context of the currently logged-in user. Failed exploits attempts will trigger denial-of-service conditions.

This issue affects versions prior to BackWeb 8.1.1.87.

16. Rapid-Source Rapid-Recipe Joomla! Component 'recipe_id' Parameter SQL Injection Vulnerability
BugTraq ID: 29593
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29593
Summary:
The Rapid-Recipe component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

17. Creative Labs AutoUpdate Eng 'CTSUEng.ocx' ActiveX Control Remote Buffer Overflow Vulnerability
BugTraq ID: 29391
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29391
Summary:
Creative Software AutoUpdate Engine is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

An attacker can exploit this issue to execute arbitrary code in the context of an application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

18. Achievo 'config.php' Arbitrary File Upload Vulnerability
BugTraq ID: 29621
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29621
Summary:
Achievo is prone to a vulnerability that lets remote attackers upload and execute arbitrary script code on an affected computer with the privileges of the webserver process. The issue occurs because the application fails to sanitize user-supplied input.

Achievo 1.3.2 is vulnerable; other versions may also be affected.

19. Microsoft Internet Explorer HTML Objects 'substringData()' Remote Code Execution Vulnerability
BugTraq ID: 29556
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29556
Summary:
Microsoft Internet Explorer is prone to a remote code-execution vulnerability because it fails to perform adequate boundary checks when handling certain HTML object data.

Attackers can leverage this issue to execute arbitrary code with the privileges of the user running the application. Successful exploits will compromise affected computers. Failed attacks may cause denial-of-service conditions.

20. Microsoft Windows PGM Invalid Fragment Remote Denial Of Service Vulnerability
BugTraq ID: 29509
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29509
Summary:
Microsoft Windows is prone to a remote denial-of-service vulnerability because it fails to adequately handle specially crafted PGM (Pragmatic General Multicast) network traffic.

Attackers can exploit this issue to cause affected computers to stop responding until all the malformed packets have been processed. Successful attacks will deny service to legitimate users.

On computers running Windows XP and Windows Server 2003, PGM is enabled only when Microsoft Message Queuing (MSMQ) 3.0 is installed. The MSMQ service is not installed by default.

On computers running Windows Vista or Windows Server 2008, PGM is enabled only when Microsoft Message Queuing (MSMQ) 4.0 is installed and when PGM is specifically enabled. The MSMQ service is not installed by default. When MSMQ is installed, PGM processing is not enabled by default.

21. Microsoft Windows PGM Invalid Length Remote Denial Of Service Vulnerability
BugTraq ID: 29508
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29508
Summary:
Microsoft Windows is prone to a remote denial-of-service vulnerability because it fails to adequately handle specially crafted PGM (Pragmatic General Multicast) network traffic.

Attackers can exploit this issue to cause an affected computer to stop responding until it is manually restarted. Successful attacks will deny service to legitimate users.

NOTE: PGM is enabled only when Microsoft Message Queuing (MSMQ) 3.0 is installed on computers running Windows XP and Windows Server 2003. The MSMQ service is not installed by default. Supported editions of Windows Server 2008 are not affected if installed using the Server Core installation option.

22. Microsoft Windows Bluetooth Stack Remote Code Execution Vulnerability
BugTraq ID: 29522
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29522
Summary:
Microsoft Windows is prone to a remote code-execution vulnerability because its implementation of the Bluetooth stack fails to adequately handle a flood of specially crafted SDP (Service Discovery Protocol) requests.

To exploit this issue, an attacker must be within close physical proximity of the affected computer.

Attackers can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise affected computers.

This issue affects only computers with Bluetooth capability.

23. Microsoft Windows Media Format Runtime ASF File Remote Code Execution Vulnerability
BugTraq ID: 26776
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/26776
Summary:
Windows Media Player is prone to a remote code-execution vulnerability because it fails to properly handle malformed media files.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.

24. Microsoft Internet Explorer 'setRequestHeader()' Multiple Vulnerabilities
BugTraq ID: 28379
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/28379
Summary:
Microsoft Internet Explorer is prone to multiple vulnerabilities that allow for referer-spoofing, HTTP-request-splitting, and HTTP-request-smuggling attacks.

A remote attacker may leverage these classes of attacks to poison web caches, steal credentials, evade IDS signatures, and launch cross-site scripting, HTML-injection, and session-hijacking attacks. Other attacks are also possible.

25. Mozilla Firefox Action Prompt Delay Security Mechanism Bypass Vulnerability
BugTraq ID: 24293
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/24293
Summary:
Mozilla Firefox is prone to a security-mechanism-bypass vulnerability because it fails to adequately prevent action prompt options from being selected before a delay timer has finished counting down.

Attackers can exploit this issue to initiate downloads or run files on a user's computer without their knowledge or consent. Successful attacks can allow arbitrary code to run with the privileges of the user running the application.

This issue is reportedly being tracked by Bugzilla Bug 376473.

Firefox 2.0.0.11 and prior versions are vulnerable.

26. Flux CMS 'loadsave.php' Arbitrary File Overwrite Vulnerability
BugTraq ID: 29618
Remote: Yes
Last Updated: 2008-06-10
Relevant URL: http://www.securityfocus.com/bid/29618
Summary:
Flux CMS is prone to a vulnerability that could permit an attacker to overwrite arbitrary files within the context of the webserver process. This issue occurs because the software fails to verify user-supplied input.

Flux CMS 1.5.0 is vulnerable; other versions may also be affected.

27. X.Org X Server MIT-SHM Extension Information Disclosure Vulnerability
BugTraq ID: 29669
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29669
Summary:
X.Org X Server is prone to an information-disclosure vulnerability that lets X clients read arbitrary X server memory.

Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.

28. Horde Webmail 'addevent.php' Cross-Site Scripting Vulnerability
BugTraq ID: 28898
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/28898
Summary:
Horde Webmail is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials.

This issue affects Kronolith 2.1.7. The vulnerable Kronolith versions are included in Horde Groupware 1.0.5 and Horde Groupware Webmail Edition 1.0.6.

29. OpenOffice 'rtl_allocateMemory()' Heap Based Buffer Overflow Vulnerability
BugTraq ID: 29622
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29622
Summary:
OpenOffice is prone to a remote heap-based buffer-overflow vulnerability because of errors in processing certain files.

Remote attackers can exploit this issue by enticing victims into opening maliciously crafted OpenOffice.org document files.

Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely result in a denial of service.

The issue affects OpenOffice 2 up to and including 2.4.

30. X.Org X Server RENDER Extension 'ProcRenderCreateCursor()' Denial of Service Vulnerability
BugTraq ID: 29665
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29665
Summary:
X.Org X Server is prone to a denial-of-service vulnerability because the software fails to properly handle exceptional conditions.

Attackers who can connect to a vulnerable X Server may exploit this issue to crash the targeted server, denying further service to legitimate users.

31. Linux Kernel BER Decoding Remote Buffer Overflow Vulnerability
BugTraq ID: 29589
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29589
Summary:
The Linux Kernel is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code with kernel-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.

32. Net-SNMP Perl Module Buffer Overflow Vulnerability
BugTraq ID: 29212
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29212
Summary:
Net-SNMP is prone a remote buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer.

Exploiting this issue may allow attackers to execute arbitrary machine code in the context of applications using the affected Net-SNMP Perl module. Failed exploit attempts will likely cause denial-of-service conditions.

This issue affects Net-SNMP 5.4.1, 5.2.4, and 5.1.4; other versions may also be vulnerable.

33. Microsoft Windows WINS Server Local Privilege Escalation Vulnerability
BugTraq ID: 29588
Remote: No
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29588
Summary:
Microsoft Windows WINS server is prone to a local privilege-escalation vulnerability that may be triggered by malicious WINS network packets.

Successful exploits allow local attackers to execute arbitrary code with SYSTEM-level privileges, completely compromising the affected computer.

34. Opera Web Browser 9.27 Multiple Security Vulnerabilities
BugTraq ID: 29684
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29684
Summary:
Opera Web Browser is prone to multiple security vulnerabilities.

Exploiting these issues can allow attackers to access cross-domain image information, carry out phishing attacks and maliciously replace contents of trusted frames on webpages.

Versions prior to Opera 9.5 are vulnerable.

35. Gallery 2.2.4 and Prior Versions Multiple Vulnerabilities
BugTraq ID: 29681
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29681
Summary:
Gallery is prone to multiple vulnerabilities, including a cross-site scripting vulnerability, and multiple information disclosure and security bypass vulnerabilities.

An attacker could exploit the cross-site scripting vulnerability to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. The attacker could also exploit the vulnerabilities to access restricted resources or escalate privileges.

These issues affect Gallery 2.2.4 and prior versions.

36. dotProject Security Bypass Vulnerability
BugTraq ID: 29679
Remote: Yes
Last Updated: 2008-06-12
Relevant URL: http://www.securityfocus.com/bid/29679
Summary:
dotProject is prone to a vulnerability that may allow users to bypass authentication and gain administrative access.

This issue affects dotProject 2.1.1.

37. Microsoft Windows Intelligent Input/Output (I2O) Multiple Local Privilege Escalation Vulnerabilities
BugTraq ID: 29171
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29171
Summary:
Microsoft Windows is prone to multiple local privilege-escalation vulnerabilities.

An attacker can exploit these issues to execute arbitrary code with kernel-level privileges. Successfully exploiting these issues will completely compromise affected computers.

These issues affect Windows XP prior to SP3.

38. Apple Safari and Microsoft Windows Client-side Code Execution Vulnerability
BugTraq ID: 29445
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29445
Summary:
A vulnerability in Apple Safari on the Microsoft Windows operating system stems from a combination of security issues in Safari and all versions of Windows XP and Vista that will allow executables to be downloaded to a user's computer and run without prompting.

A vulnerability in Safari, known as the 'carpet-bombing' issue reported by Nitesh Dhanjani, allows an attacker to silently place malicious DLL files on a victim's computer. A problem in Internet Explorer, reported in December of 2006 by Aviv Raff, can then be used to run those malicious DLLs.

An attacker can exploit this issue by tricking a victim into visiting a malicious page with Safari; the malicious files will run when the victim starts Internet Explorer.

39. Microsoft DirectX MJPEG Video Streaming Stack Based Buffer Overflow Vulnerability
BugTraq ID: 29581
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29581
Summary:
Microsoft DirectX is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

NOTE: Supported editions of Windows Server 2008 are not affected if installed using the Server Core installation option.

40. Microsoft DirectX SAMI File Parsing Stack Based Buffer Overflow Vulnerability
BugTraq ID: 29578
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29578
Summary:
Microsoft DirectX is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The vulnerability occurs when handling malformed SAMI files.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application that uses DirectX. Failed exploit attempts will result in a denial-of-service condition.

NOTE: Supported editions of Windows Server 2008 are not affected if installed using the Server Core installation option.

41. Microsoft Windows Active Directory LDAP Request Validation Remote Denial Of Service Vulnerability
BugTraq ID: 29584
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29584
Summary:
Microsoft Windows is prone to a remote denial-of-service vulnerability because Microsoft Active Directory, ADAM (Active Directory Application Mode), and AD LDS (Active Directory Lightweight Directory Service) fail to handle specially crafted Lightweight Directory Access Protocol (LDAP) requests.

An attacker can exploit this issue by sending a specially crafted LDAP request to the affected computer. This would cause the affected system to temporarily stop responding to LDAP requests, thus denying further service to legitimate users.

Note that the attacker requires valid logon credentials to exploit this issue on Windows Server 2003 and on any system that has ADAM installed.

This issue affects these components:

- Active Directory on Microsoft Windows 2000, Windows Server 2003, and Windows Server 2008
- ADAM on Windows XP Professional and Windows Server 2003
- AD LDS on Windows Server 2008

Supported editions of Windows Server 2008 are not affected if installed using the Server Core installation option.

42. SkyPortal Multiple SQL Injection Vulnerabilities
BugTraq ID: 26504
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/26504
Summary:
SkyPortal is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

SkyPortal RC6 is vulnerable; other versions may also be affected.

43. 'imlib2' Library Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 29417
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29417
Summary:
The 'imlib2' library is prone to multiple buffer-overflow vulnerabilities because the software fails to properly bounds-check user-supplied data.

An attacker can exploit these issues to execute arbitrary machine code in the context of applications using the vulnerable library. Failed exploit attempts will likely cause denial-of-service conditions.

The issues affect imlib2 1.4.0; other versions may also be affected.

44. Perl Unicode '\Q...\E' Quoting Construct Regular Expression Buffer Overflow Vulnerability
BugTraq ID: 28928
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/28928
Summary:
Perl is prone to a buffer-overflow vulnerability because it fails to sufficiently bounds-check user-supplied input.

Successfully exploiting this issue may allow attackers to execute arbitrary machine code in the context of Perl applications using regular expressions in a vulnerable manner. This facilitates the remote compromise of affected computers. Failed exploits can cause denial-of-service conditions.

Perl 5.8.8 is vulnerable to this issue; other versions may also be affected.

NOTE: This issue may be related to BID 26350 ('Perl Unicode Regular Expression Buffer Overflow Vulnerability').

45. Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability
BugTraq ID: 22359
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/22359
Summary:
Microsoft Windows is prone to a command-execution vulnerability because of its Speech Components built-in voice-recognition capability.

An attacker can exploit this issue to execute commands on a victim user's computer.

NOTE: Given the nature of this vulnerability, victim users will notice exactly what is occurring as it happens.

46. Multiple Vendors BIND 'inet_network()' Off-by-One Buffer Overflow Vulnerability
BugTraq ID: 27283
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/27283
Summary:
Multiple applications that use the 'libbind' BIND library are prone to an off-by-one buffer-overflow vulnerability because the 'inet_network()' function fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Successfully exploiting this issue may allow attackers to execute arbitrary machine code in the context of applications that use the affected library. Failed exploit attempts may crash applications, denying service to legitimate users.

47. CitectSCADA ODBC Server Remote Stack Based Buffer Overflow Vulnerability
BugTraq ID: 29634
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29634
Summary:
CitectSCADA is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.

Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed attacks will likely cause denial-of-service conditions.

48. Apple QuickTime 'AAC-encoded' Media Memory Corruption Vulnerability
BugTraq ID: 29654
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29654
Summary:
Apple QuickTime is prone to a memory-corruption vulnerability that arises when the application handles specially crafted 'AAC-encoded' media files.

Successful exploits may allow remote attackers to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 29619 (Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities) but has been given its own record to better document the vulnerability.

Versions prior to QuickTime 7.5 are affected.

49. Apple QuickTime Indo Video Codec Buffer Overflow Vulnerability
BugTraq ID: 29652
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29652
Summary:
Apple QuickTime is prone to a buffer-overflow vulnerability that may allow remote attackers to execute arbitrary code.

Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user; failed exploits will cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 29619 (Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities) but has been given its own record to better document the vulnerability.

Versions prior to QuickTime 7.5 are affected.

50. Apple QuickTime 'file:' URI File Execution Vulnerability
BugTraq ID: 29650
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29650
Summary:
QuickTime is prone to a vulnerability that allows remote attackers to launch arbitrary applications and files. This issue may lead to a remote compromise.

The issue arises because of improper handling of the 'file:' URI.

If an attacker can execute arbitrary malicious code on the computer, they may gain unauthorized remote access in the context of the vulnerable user.

Versions prior to QuickTime 7.5 running on Apple Mac OS X 10.3.9, Mac OS X 10.4.9 to v10.4.11, Mac OS X 10.5 or later, Windows Vista, and Windows XP SP2 are affected.

NOTE: This issue was previously covered in BID 29619 (Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities) but has been given its own record to better document the vulnerability.

51. Apple QuickTime 'PICT' Image 'PixData' Structures Handling Heap Overflow Vulnerability
BugTraq ID: 29649
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29649
Summary:
QuickTime is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks when handling 'PixData' structures in a 'PICT' image file.

An attacker can exploit this issue to execute arbitrary within the context of the affected application. Failed exploit attempts will result in a denial-of-service vulnerability.

Versions prior to QuickTime 7.5 for Windows XP and Vista are vulnerable.

NOTE: This issue was previously covered in BID 29619 (Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities) but has been given its own record to better document the vulnerability.

52. Apple QuickTime 'PICT' Image Buffer Overflow Vulnerability
BugTraq ID: 29648
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29648
Summary:
Apple QuickTime is prone to a buffer-overflow vulnerability that may allow remote attackers to execute arbitrary code.

Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user; failed exploits will cause denial-of-service conditions.

NOTE: This issue was previously covered in BID 29619 (Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities) but has been given its own record to better document the vulnerability.

Versions prior to QuickTime 7.5 are affected.

53. Experts 'answer.php' SQL Injection Vulnerability
BugTraq ID: 29642
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29642
Summary:
Experts is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Experts 1.0.0 is vulnerable; other versions may also be affected.

54. FreeType2 Printer Font Binary Remote Code Exeuction Vulnerability
BugTraq ID: 29641
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29641
Summary:
FreeType2 is prone to a remote code-execution vulnerability because of an error when freeing memory.

An attacker can exploit this issue to execute arbitrary within the context of an application using the affected library. Failed exploit attempts will result in a denial-of-service vulnerability.

NOTE: This issue may allow a local attacker using X.Org X server to gain elevated privileges on an affected computer.

FreeType2 2.3.5 is vulnerable; other versions may also be affected.

55. FreeType2 Printer Font Binary Private Dictionary Table Integer Overflow Vulnerability
BugTraq ID: 29640
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29640
Summary:
FreeType2 is prone to an integer-overflow vulnerability because it fails to perform adequate checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code within the context of applications using the FreeType2 library. Failed exploit attempts will result in a denial-of-service condition.

NOTE: This issue can allow a local attacker using X.Org Xserver to gain elevated privileges on the affected computer.

FreeType2 2.3.5 is vulnerable; other versions may also be affected.

56. FreeType TrueType Font 'SHC' Heap Buffer Overflow Vulnerability
BugTraq ID: 29639
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29639
Summary:
FreeType is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary within the context of the application using the FreeType library. Failed exploit attempts will result in a denial-of-service vulnerability.

NOTE: This issue may allow a local attacker using X.Org X server to gain elevated privileges on the affected computer.

FreeType 2.3.5 is vulnerable; other versions may also be affected.

57. FreeType Printer Font Binary Heap Buffer Overflow Vulnerability
BugTraq ID: 29637
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29637
Summary:
FreeType is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code within the context of the application using the FreeType library. Failed exploit attempts will result in a denial-of-service vulnerability.

NOTE: This issue may allow a local attacker using X.Org Xserver to gain elevated privileges on the affected computer.

Successfully exploiting this issue will result in the complete compromise of affected computers.

FreeType 2.3.5 is vulnerable; other versions may also be affected.

58. Motion 'read_client()' Off-By-One Buffer Overflow Vulnerability
BugTraq ID: 29636
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29636
Summary:
Motion is prone to an off-by-one buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Successfully exploiting this issue may compromise the affected application and possibly the underlying computer. Failed exploit attempts will result in a denial-of-service condition.

Motion 3.2.10 and prior versions are vulnerable.

59. Black Ice 'BiAnno.ocx' Annotation SDK/ActiveX Control Remote Buffer Overflow Vulnerability
BugTraq ID: 29635
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29635
Summary:
Black Ice Annotation SDK/ActiveX Control is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate size checks on user-supplied input.

An attacker can exploit this issue to execute arbitrary code in the context of an application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.

This issue affects Annotation SDK/ActiveX Control provided by 'BiAnno.ocx' 10.9.5; other versions may also be affected.

60. Hot Links SQL-PHP Multiple Cross Site Scripting Vulnerabilities
BugTraq ID: 29632
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29632
Summary:
Hot Links SQL-PHP is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

61. ASPPortal 'reply.asp' SQL Injection Vulnerability
BugTraq ID: 29631
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29631
Summary:
ASPPortal is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

ASPPortal Free Version is vulnerable; other versions may also be affected.

62. Insanely Simple Blog 'index.php' Multiple SQL Injection Vulnerabilities
BugTraq ID: 29630
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29630
Summary:
Insanely Simple Blog is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Insanely Simple Blog 0.5 is vulnerable; other versions may also be affected.

63. yblog Multiple SQL Injection and Cross-Site Scripting Vulnerabilities
BugTraq ID: 29629
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29629
Summary:
The 'yblog' program is prone to multiple cross-site scripting and SQL-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied input.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

These issues affect yblog 0.2.2.2; other versions may also be affected.

64. ErfurtWiki Multiple Local File Include Vulnerabilities
BugTraq ID: 29628
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29628
Summary:
ErfurtWiki is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker can exploit these issues using directory-traversal strings to view local files in the context of the webserver process. This may aid in further attacks.

ErfurtWiki R1.02b is vulnerable; other versions may also be affected.

65. DCFM Blog 'comments.php' SQL Injection Vulnerability
BugTraq ID: 29627
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29627
Summary:
DCFM Blog is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

DCFM Blog 0.9.4 is vulnerable; other versions may also be affected.

66. Tornado Knowledge Retrieval System 'p' Parameter Cross Site Scripting Vulnerability
BugTraq ID: 29626
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29626
Summary:
Tornado Knowledge Retrieval System is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Tornado Knowledge Retrieval System 4.2 is vulnerable; prior versions may also be affected.

67. IBM Workplace Unspecified Cross Site Scripting Vulnerability
BugTraq ID: 29625
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29625
Summary:
IBM Workplace products are prone to an unspecified cross-site scripting vulnerability because the applications fail to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

The issue affects the following:

IBM Workplace for Business Controls and Reporting
IBM Workplace Web Content Management

68. Fujitsu Interstage Management Console Unspecified Arbitrary File Access Vulnerability
BugTraq ID: 29624
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29624
Summary:
Fujitsu Interstage Management Console is prone to an unspecified arbitrary-file-access vulnerability.

Attackers can leverage this vulnerability to obtain or delete arbitrary files on the server.

Very few technical details are currently available. We will update this BID as more information emerges.

69. PHP 5.2.5 and Prior Versions Multiple Vulnerabilities
BugTraq ID: 29009
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29009
Summary:
PHP 5.2.5 and prior versions are prone to multiple security vulnerabilities.

Successful exploits could allow an attacker to bypass security restrictions, cause a denial-of-service condition, and potentially execute code.

These issues are reported to affect PHP 5.2.5 and prior versions.

70. RETIRED: Microsoft June 2008 Advance Notification Multiple Vulnerabilities
BugTraq ID: 29576
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29576
Summary:
Microsoft has released advance notification that the vendor will be releasing seven security bulletins on June 10, 2008. The highest severity rating for these issues is 'Critical'.

Successfully exploiting these issues may allow remote or local attackers to compromise affected computers.

NOTE: The following individual records have been created to document these vulnerabilities:

29522 Microsoft Windows Bluetooth Stack Remote Code Execution Vulnerability
29556 Microsoft Internet Explorer HTML Objects 'substringData()' Remote Code Execution Vulnerability
28379 Microsoft Internet Explorer 'setRequestHeader()' Multiple Vulnerabilities
22359 Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability
29558 Backweb 'LiteInstActivator.dll' ActiveX Control Remote Code Execution Vulnerability
29581 Microsoft DirectX MJPEG Video Streaming Remote Code Execution Vulnerability
29578 Microsoft DirectX SAMI File Parsing Remote Code Execution Vulnerability
29588 Microsoft Windows WINS Server Local Privilege Escalation Vulnerability
29584 Microsoft Windows Active Directory LDAP Request Validation Remote Denial Of Service Vulnerability
29508 Microsoft Windows PGM Invalid Length Remote Denial of Service Vulnerability
29509 Microsoft Windows PGM Invalid Fragment Remote Denial of Service Vulnerability

71. RETIRED: Apple QuickTime Multiple Arbitrary Code Execution Vulnerabilities
BugTraq ID: 29619
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29619
Summary:
Apple QuickTime is prone to multiple remote vulnerabilities that may allow remote attackers to execute arbitrary code.

These issues arise when the application handles specially crafted PICT image files, Indeo video content, movie files, 'file:' URIs, and AAC-encoded media. Successful exploits may allow attackers to gain remote unauthorized access in the context of a vulnerable user; failed exploits will cause denial-of-service conditions.

Versions prior to QuickTime 7.5 are affected.

NOTE: This BID is being retired; the following individual records have been created to better document the issues:

29649 Apple QuickTime 'PICT' Image 'PixData' Structures Handling Heap Overflow Vulnerability
29650 Apple QuickTime 'file:' URI File Execution Vulnerability
29654 Apple QuickTime 'AAC-encoded' Media Memory Corruption Vulnerability
29648 Apple QuickTime 'PICT' Image Buffer Overflow Vulnerability
29652 Apple QuickTime Indo Video Codec Buffer Overflow Vulnerability

72. Linux Kernel Multiple Local MOXA Serial Driver Buffer Overflow Vulnerabilities
BugTraq ID: 12195
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/12195
Summary:
The MOXA serial driver in the Linux kernel is reported prone to multiple buffer-overflow vulnerabilities. The driver fails to perform proper bounds checks before copying user-supplied data to fixed-size memory buffers.

These vulnerabilities reside in the 'drivers/char/moxa.c' file.

The vulnerable functions perform a 'copy_from_user()' call to copy user-supplied, user-space data to a fixed-size, static kernel memory buffer (moxaBuff) of 10240 bytes in length while using the user-supplied length argument as passed from 'MoxaDriverIoctl()'. This reportedly results in improperly bounded operations, potentially causing locally exploitable buffer overflows.

Linux kernels from 2.2 through 2.4 and 2.6 are all reported prone to these vulnerabilities.

73. Linux Kernel 2.6.22.16 and Prior Multiple Memory Corruption Vulnerabilities
BugTraq ID: 27686
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/27686
Summary:
The Linux kernel is prone to multiple memory-corruption vulnerabilities due to insufficient range checking in certain fault handlers.

Local attackers could exploit these issues to cause denial-of-service conditions, bypass certain security restrictions, and potentially access sensitive information or gain elevated privileges.

These issues affect versions prior to 2.6.22.17.

74. Linux Kernel 'dnotify.c' Local Race Condition Vulnerability
BugTraq ID: 29003
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29003
Summary:
The Linux kernel is prone to a local race-condition vulnerability.

A local attacker may exploit this issue to crash the computer or to gain elevated privileges on the affected computer.

75. Linux Kernel x86_64 ptrace Denial Of Service Vulnerability
BugTraq ID: 29086
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29086
Summary:
The Linux kernel is prone to a denial-of-service vulnerability when process traces are performed on 64-bit computers.

Local attackers can leverage the issue to crash the kernel and deny service to legitimate users.

76. Linux Kernel 'fcntl_setlk()' SMP Ordering Local Denial of Service Vulnerability
BugTraq ID: 29076
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29076
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability.

Attackers can exploit this issue to trigger kernel crashes, denying service to legitimate users.

Versions prior to Linux kernel 2.6.25.2 and 2.4.36.4 are vulnerable.

77. Linux Kernel Driver Fault Handler 'mmap.c' Local Denial of Service Vulnerability
BugTraq ID: 27705
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/27705
Summary:
The Linux kernel is prone to a local denial-of-service vulnerability because it fails to properly bounds-check certain fault handlers for device drivers.

Attackers can exploit this issue to trigger kernel crashes, denying service to legitimate users. Given the nature of this issue, attackers may also be able to execute arbitrary code, but this has not been confirmed.

Versions prior to Linux kernel 2.6.24.1 are vulnerable.

78. Linux Kernel IPSec Fragmented ESP Packet Remote Denial of Service Vulnerability
BugTraq ID: 29081
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29081
Summary:
The Linux Kernel is prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to crash the affected computer, denying service to legitimate users.

NOTE: This issue occurs on computers that have NetScreen firewalls or Cisco PIX installed.

79. Gnome Evolution iCalendar Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 29527
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29527
Summary:
Gnome Evolution is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to insufficiently sized buffers. The issues arise when the application handles iCalendar attachments.

Successfully exploiting these issues will allow an attacker to execute arbitrary code in the context of the application. Failed exploit attempts will likely crash the application.

Gnome Evolution 2.21.1 is vulnerable to these issues; other versions may also be affected.

80. Windows Media Player ASX PlayList File Heap Overflow Vulnerability
BugTraq ID: 21247
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/21247
Summary:
Windows Media Player is prone to a heap-overflow issue.

Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the affected user. Failed exploit attempts likely result in application crashes.

81. Windows Media Player Remote ASF File Buffer Overflow Vulnerability
BugTraq ID: 21505
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/21505
Summary:
Windows Media Player is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data.

Attackers may attempt to exploit this issue by coercing users to visit a malicious website or to access malicious ASF files.

Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the user running the affected application. This facilitates the remote compromise of affected computers.

82. Adobe Acrobat and Reader Multiple Arbitrary Code Execution and Security Vulnerabilities
BugTraq ID: 27641
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/27641
Summary:
Adobe Acrobat and Reader are prone to multiple arbitrary remote code-execution and security vulnerabilities.

Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application. Other attacks are also possible.

Versions prior to Adobe Acrobat and Adobe Reader 8.1.2 are vulnerable to these issues.

83. Multiple Web Browser BMP Partial Palette Information Disclosure and Denial Of Service Vulnerability
BugTraq ID: 27826
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/27826
Summary:
Firefox and Opera browsers are prone to a vulnerability that can result in information disclosure or a denial of service.

An attacker can exploit this issue to harvest sensitive information that may be used to launch further attacks or to crash the affected application, denying service to legitimate users.

Mozilla Firefox 2.0.0.11 and Opera 9.50 Beta are affected.

84. Mozilla Thunderbird/Seamonkey/Firefox 2.0.0.12 Multiple Remote Vulnerabilities
BugTraq ID: 28448
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/28448
Summary:
The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Firefox 2.0.0.12 and prior versions.

Exploiting these issues can allow attackers to:

- steal authentication credentials
- obtain potentially sensitive information
- violate the same-origin policy
- execute scripts with elevated privileges
- cause denial-of-service conditions
- potentially execute arbitrary code
- perform cross-site request-forgery attacks

Other attacks are possible.

These issues are present in Firefox 2.0.0.12 and prior versions. Many of these issues are present in Mozilla Thunderbird 2.0.0.12 and prior versions as well as SeaMonkey 1.1.8 and prior versions.

UPDATE: Versions of Mozilla Thunderbird prior to 2.0.0.14 are affected by issues described in MFSA 2008-14 and MFSA 2008-15.

85. Mozilla Firefox chrome:// URI JavaScript File Request Information Disclosure Vulnerability
BugTraq ID: 27406
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/27406
Summary:
Mozilla Firefox is prone to an information-disclosure vulnerability because it fails to restrict access to local JavaScript, images and stylesheets files.

Attackers can exploit this issue to gain access to potentially sensitive information that could aid in further attacks.

Firefox 2.0.0.11 is vulnerable; other versions may also be affected.

NOTE: For an exploit to succeed, a user must have an addon installed that does not store its contents in a '.jar' file. The attacker would have to target a specific addon that uses "flat" packaging.

86. Mozilla Firefox/SeaMonkey JavaScript Garbage Collector Memory Corruption Vulnerability
BugTraq ID: 28818
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/28818
Summary:
The Mozilla Foundation has released a security advisory disclosing a memory-corruption vulnerability that affects Mozilla Firefox, SeaMonkey, and potentially Thunderbird.

The vulnerability stems from an unspecified error in the JavaScript garbage collector.

Attackers may exploit this issue to crash a vulnerable application or potentially execute arbitrary code in the context of the application.

The issue affects Mozilla Firefox 2.0.0.13 and Mozilla SeaMonkey 1.1.9. Note that Mozilla Thunderbird shares the browser engine with Firefox and may also be vulnerable when JavaScript is enabled in emails.

87. Mozilla Thunderbird/Seamonkey/Firefox 2.0.0.11 Multiple Remote Vulnerabilities
BugTraq ID: 27683
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/27683
Summary:
The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Firefox 2.0.0.11 and prior versions.

Exploiting these issues can allow attackers to:

- remotely execute arbitrary code
- cause denial-of-service conditions
- hide contents of security warnings
- access sensitive information
- escape sandbox and execute scripts with chrome privileges
- inject script code into other sites and violate the same-origin policy

Other attacks are possible.

These issues are present in Firefox 2.0.0.11 and prior versions. Mozilla Thunderbird 2.0.0.9 and prior versions as well as SeaMonkey 1.1.7 and prior versions are also affected by many of these vulnerabilities.

88. Mozilla Firefox/Thunderbird/SeaMonkey Character Encoding Cross-Site Scripting Vulnerabilities
BugTraq ID: 29303
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29303
Summary:
Mozilla Firefox, Thunderbird, and SeaMonkey are prone to multiple cross-site scripting vulnerabilities because of a design error. The HTML parser used by these applications fails to properly handle certain character encodings.

An attacker can exploit these issues to execute arbitrary script code in the context of the user running the application and to steal cookie-based authentication credentials and other sensitive data that may aid in further attacks.

89. Linux Kernel CIFS Transport.C Remote Buffer Overflow Vulnerability
BugTraq ID: 26438
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/26438
Summary:
The Linux kernel is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code with kernel-level privileges or cause the affected kernel to crash, denying service to legitimate users.

This issue affects version 2.6.23.1; previous versions may also be affected.

90. ASUS Remote Console DPC Proxy Buffer Overflow Vulnerability
BugTraq ID: 28394
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/28394
Summary:
ASUS Remote Console is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer.

Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

ASUS Remote Console 2.0.0.19 is vulnerable; other versions may also be affected.

91. HP-UX 'useradd' Security Bypass Vulnerability
BugTraq ID: 29286
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29286
Summary:
HP-UX is prone to a security-bypass vulnerability because the software fails to properly restrict access to certain functionality.

Local attackers can exploit this issue to bypass certain security restrictions and carry out some unauthorized tasks. This may lead to various attacks.

This issue affects the following versions of HP-UX:

HP-UX B.11.11
HP-UX B.11.23
HP-UX B.11.31

92. HP FTP Unspecified Remote Denial of Service Vulnerability
BugTraq ID: 29160
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29160
Summary:
FTP running on HP-UX is prone to a remote denial-of-service vulnerability.

Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.

93. Drupal Taxonomy Image Module Multiple Unspecified Cross Site Scripting Vulnerabilities
BugTraq ID: 29683
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29683
Summary:
The application is prone to multiple cross-site scripting vulnerabilities because it fails to sanitize user-supplied input to unspecified parameters.

An attacker may leverage these issues to steal cookie-based authentication credentials and launch other attacks.

Versions of Taxonomy Image prior to 5.x-1.3 as well as versions prior to 6.x-1.3 are affected by these issues.

94. Drupal Magic Tabs Module PHP Code Execution Vulnerability
BugTraq ID: 29682
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29682
Summary:
Drupal Magic Tabs module is prone to a remote PHP code-execution vulnerability.

An attacker can exploit this issue to inject and execute arbitrary malicious PHP code in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

Versions of Magic Tabs prior to 5.x-1.1 are vulnerable.

95. Sun Solaris 10 Event Port Denial of Service Vulnerability
BugTraq ID: 29680
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29680
Summary:
This system is prone to a denial-of-service vulnerability due to an unspecified error in the event port implementation.

An attacker can exploit this issue to cause the affected kernel to panic, resulting in a denial-of-service condition.

This issue affects the Solaris 10 operating system.

96. Sun Solaris 10 and OpenSolaris Unspecified Kernel Denial of Service Vulnerability
BugTraq ID: 29678
Remote: No
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29678
Summary:
Sun Solaris and OpenSolaris are prone to a denial-of-service vulnerability due to an unspecified issue affecting the kernel.

An attacker can exploit this issue to cause the affected kernel to panic, resulting in a denial-of-service condition.

This issue affects Solaris Systems Using the Sun UltraSPARC T2 and UltraSPARC T2+ Processors. OpenSolaris based upon builds snv_64 through snv_92 are also affeced.

97. Drupal Aggregation Module Multiple Vulnerabilities
BugTraq ID: 29677
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29677
Summary:
Aggregation module for Drupal is prone to multiple vulnerabilities, including multiple HTML-injection and multiple SQL-injection vulnerabilities, an arbitrary file-upload vulnerability and a security bypass vulnerability.

An attacker could exploit these vulnerabilities to execute arbitrary script code in the context of the affected site, manipulate SQL query logic, access restricted information or execute arbitrary code on the server.

These issues affect Aggregation versions prior to 5.x-4.4.

98. Sun Java System Access Manager Authentication Bypass Vulnerability
BugTraq ID: 29676
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29676
Summary:
Sun Java System Access Manager is prone to an authentication-bypass vulnerability.

Exploiting this issue can allow remote attackers to access resources in an unauthorized manner or to gain administrative privileges to the application. This may aid in further attacks.

Sun Java System Access Manager 7.1 is affected by this issue.

99. Drupal Node Hierarchy Module Security Bypass Vulnerability
BugTraq ID: 29675
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29675
Summary:
Node Hierarchy module for Drupal is prone to a vulnerability that may allow users to bypass authentication and rearrange the hierarchy of nodes.

This issue affects Node Hierarchy versions prior to 5.x-1.1 and 6.x-1.0.

100. JAMM CMS 'id' Parameter SQL Injection Vulnerability
BugTraq ID: 29674
Remote: Yes
Last Updated: 2008-06-11
Relevant URL: http://www.securityfocus.com/bid/29674
Summary:
JAMM CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Boycott spotlights antivirus testing issues
By: Robert Lemos
Security firm Trend Micro refuses to apply for future VB100 certifications, highlighting a debate over how to best test antivirus software.
http://www.securityfocus.com/news/11522

2. Hired gun blamed for business outage
By: Robert Lemos
Video-content firm Revision3 accuses anti-piracy company MediaDefender -- known for its aggressive tactics against file sharers -- of attacking its servers over the weekend.
http://www.securityfocus.com/news/11521

3. Legal experts wary of MySpace hacking charges
By: Robert Lemos
Federal prosecutors charge the parent who allegedly badgered a girl to suicide with three counts of computer crime, but law experts worry about a dangerous precedent.
http://www.securityfocus.com/news/11519

4. Admins warned of brute-force SSH attacks
By: Robert Lemos
Normally considered a low-level threat on the Internet, scans for default-configured secure shell servers spiked this week.
http://www.securityfocus.com/news/11518

IV. SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Sales Engineer, San Francisco
http://www.securityfocus.com/archive/77/493259

2. [SJ-JOB] Security System Administrator, San Mateo
http://www.securityfocus.com/archive/77/493257

3. [SJ-JOB] Sales Engineer, San Francisco
http://www.securityfocus.com/archive/77/493258

4. [SJ-JOB] Sales Engineer, Alpharetta
http://www.securityfocus.com/archive/77/493260

V. INCIDENTS LIST SUMMARY
---------------------------
VI. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. default for requiring authentication 2003
http://www.securityfocus.com/archive/88/493298

VIII. SUN FOCUS LIST SUMMARY
----------------------------
IX. LINUX FOCUS LIST SUMMARY
----------------------------
1. sshd log analyzer
http://www.securityfocus.com/archive/91/493280

X. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to sf-news-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

XI. SPONSOR INFORMATION
------------------------
This issue is sponsored by IBM® Rational® AppScan

Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities.
Download a free trial of AppScan and see how it can help prevent against the threat of attack.
https://www.watchfire.com/securearea/appscan.aspx?id=701700000009T0r

No comments:

Blog Archive