30/07/2004 – Microsoft publica una actualizacion cri­ticia para Internet Explorer

julio 30, 2004 § Deja un comentario

Hispasec – una-al-d­ia – 30/07/2004
Todos los di­as una noticia de seguridad – http://www.hispasec.com

——————————————————————-
Microsoft publica una actualizacion cri­tica para Internet Explorer
——————————————————————-

Microsoft rompe su habitual practica de publicar boletines y
actualizaciones de seguridad los segundos martes de mes, para
publicar hoy mismo una actualizacion critica para Internet
Explorer.

Esta actualizacion resuelve tres vulnerabilidades publicas
descubiertas recientemente que permiten la ejecucion remota
de codigo y pueden ser empleadas por virus o intrusos. La propia
compañi­a reitera a los usuarios la necesidad de actualizarse para
prevenir ataques de virus.

El primero de los problemas anunciados se trata de una vulnerabilidad
de ejecucion remota de codigo en Internet Explorer debida al modo en
que se tratan los metodos de exploracion. Un intruso podri­a aprovechar
esta vulnerabilidad mediante la construccion de una pagina Web o
e-mail html malicioso que permitira la ejecucion remota de codigo
cuando el usuario visite el sitio web o visualice el mensaje. Un
atacante que consiga explotar con exito esta vulnerabilidad podria
ejecutar codigo malicioso en la zona de seguridad Equipo local de
Internet Explorer. Si un usuario inicia la sesion con privilegios
administrativos, el intruso podria lograr el control completo del
sistema afectado.

Otro problema corregido consiste en una vulnerabilidad de
desbordamiento de bufer en el tratamiento de imagenes BMP, que puede
permitir la ejecucion remota de codigo en los sistemas afectados. El
atacante debera construir una pagina web o un e-mail html con la
imagen BMP mal construida para lograr explotar el fallo. El codigo se
ejecutara con los permisos del usuario que inicia la sesion.

La ultima vulnerabilidad anunciada tambien consiste en un
desbordamiento de bufer en el tratamiento de imagenes GIF, que puede
permitir la ejecucion remota de codigo en los sistemas afectados. El
problema puede ser explotado de forma similar al anterior.

Actualizaciones publicadas:
Internet Explorer 5.01 Service Pack 2:
http://www.eu.microsoft.com/downloads/details.aspx?FamilyID=507E71EF-076B-43C4-8028-E91FCFAB252B&displaylang=es
Internet Explorer 5.01 Service Pack 3:
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=7AA6F31D-7350-43F8-B72E-ED9D62577A60&displaylang=es
Internet Explorer 5.01 Service Pack 4:
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=862E6914-821A-4C51-985B-C3958FAD3D4C&displaylang=es
Internet Explorer 5.5 Service Pack 2:
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=E458480C-93F6-454A-A663-FC187C18CD9B&displaylang=es
Internet Explorer 6:
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=4C2F8A40-1B88-4F93-98B1-1619DCFD7273&displaylang=es
Internet Explorer 6 Service Pack 1
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=06F49985-F19F-4B50-A75F-7636D8BEE576&displaylang=es
Internet Explorer 6 Service Pack 1 (64-Bit Edition):
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=FCDA580D-9E3B-4B44-BD65-C8D37A0DD62D&displaylang=en
Internet Explorer 6 para Windows Server 2003:
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=D86262D9-C66A-4608-8DBE-2492B4AFBC3B&displaylang=es
Internet Explorer 6 para Windows Server 2003 (64-Bit Edition):
http://www.eu.microsoft.com/downloads/details.aspx?FamilyId=1AA8F5A9-71D3-48F7-BB32-F8A4D36C5FB9&displaylang=en

Opina sobre esta noticia:
http://www.hispasec.com/unaaldia/2105/comentar

Mas informacion:

Boleti­n de seguridad de Microsoft MS04-025
Actualizacion de seguridad acumulativa para Internet Explorer (867801)
http://www.eu.microsoft.com/spain/technet/seguridad/boletines/MS04-025-IT.mspx

Antonio Ropero
antonior@hispasec.com

Anuncios

Primeros detalles del antivirus de Microsoft.

julio 30, 2004 § Deja un comentario

Primeros detalles del antivirus de Microsoft.

Primeros detalles del antivirus de Microsoft.

julio 30, 2004 § Deja un comentario

Primeros detalles del antivirus de Microsoft.

Primeros detalles del antivirus de Microsoft.

julio 30, 2004 § Deja un comentario

Primeros detalles del antivirus de Microsoft.

Secunia Weekly Summary – Issue: 2004-31

julio 29, 2004 § Deja un comentario

========================================================================
The Secunia Weekly Advisory Summary
2004-07-22 – 2004-07-29

This week : 43 advisories
========================================================================
Table of Contents:

1……………………………………………..Word From Secunia
2…………………………………………….This Week In Brief
3………………………….This Weeks Top Ten Most Read Advisories
4…………………………………Vulnerabilities Summary Listing
5…………………………………Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

New Features at Secunia.com

Secunia has implemented various statistical features at the websites
for both Secunia advisories and Virus Information.

Secunia Advisories Statistics:
http://secunia.com/advisory_statistics/

Examples of Specific Product Statistics:
http://secunia.com/product/11/ (Internet Explorer 6)
http://secunia.com/product/761/ (Opera 7.x)
http://secunia.com/product/1480/ (Mozilla 1.3)

Secunia Virus Information Statistics:
http://secunia.com/virus_statistics/

Furthermore, Secunia has made it possible for you to include all graphs
available at secunia.com on your own website.

This is described in detail at:
http://secunia.com/secunia_image_inclusion/

========================================================================
2) This Week in Brief:

ADVISORIES:

The Opera Browser is continuously plagued by a vulnerability, which
allows malicious websites to spoof the content of the address bar.

The first time Opera patched this vulnerability was on the 13th of May
2004. Since then, three variants of the same vulnerability have been
found, forcing Opera Software to issue new browser versions with the
latest being version 7.53.

The latest variant is still pending a patch from Opera Software, who
hopefully will develop a permanent solution to this.

Reference:
http://secunia.com/SA12162
http://secunia.com/SA12028
http://secunia.com/SA11901
http://secunia.com/SA11532

Mozilla and Mozilla Firefox were reported vulnerable to a certificate
spoofing vulnerability. This could be exploited by a malicious website
to include a certificate from a trusted site, thereby making the
malicious website look like it is “signed” with the trusted site’s
certificate.

Reference:
http://secunia.com/SA12160

VIRUS ALERTS:

During the last week, Secunia issued one MEDIUM RISK virus alert and
one HIGH RISK virus alert. Please refer to the grouped virus profiles
below for more information:

Mydoom.M – HIGH RISK Virus Alert – 2004-07-26 20:25 GMT+1
http://secunia.com/virus_information/10755/mydoom.m/

Mydoom.M – MEDIUM RISK Virus Alert – 2004-07-26 17:25 GMT+1
http://secunia.com/virus_information/10755/mydoom.m/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1. [SA12048] Microsoft Internet Explorer Multiple Vulnerabilities
2. [SA11978] Multiple Browsers Frame Injection Vulnerability
3. [SA11793] Internet Explorer Local Resource Access and Cross-Zone
Scripting Vulnerabilities
4. [SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing
5. [SA12157] Apple Mac OS X Internet Connection Privilege Escalation
6. [SA12162] Opera Browser Address Bar Spoofing Vulnerability
7. [SA12027] Mozilla Fails to Restrict Access to “shell:”
8. [SA12077] mod_ssl Unspecified “mod_proxy” Hook Functions Format
String Vulnerability
9. [SA12028] Opera Browser Address Bar Spoofing Vulnerability
10. [SA11966] Internet Explorer Frame Injection Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA12164] ASPRunner Multiple Vulnerabilities
[SA12165] FTPGlide Exposure of Passwords

UNIX/Linux:
[SA12178] SCO OpenServer update for sendmail
[SA12172] Mandrake update for mod_ssl
[SA12163] Gentoo update for pavuk
[SA12153] Dropbear SSH Server DSS Verification Vulnerability
[SA12152] Pavuk Digest Authentication Buffer Overflow Vulnerabilities
[SA12149] Fedora update for php
[SA12142] Debian update for libapache-mod-ssl
[SA12138] Slackware update for mod_ssl
[SA12131] Gentoo update for mod_ssl
[SA12179] UnixWare update for tcpdump
[SA12171] Mandrake update for webmin
[SA12170] Mandrake update for postgresql
[SA12146] Fedora update for abiword
[SA12144] Debian update for courier
[SA12143] Debian update for mailreader
[SA12139] SuSE update for samba
[SA12136] AbiWord “wv” Library Buffer Overflow Vulnerability
[SA12128] Gentoo update for l2tpd
[SA12168] HP-UX CIFS Server Buffer Overflow Vulnerability
[SA12141] Mandrake update for samba
[SA12133] Red Hat update for samba
[SA12130] Samba Two Buffer Overflow Vulnerabilities
[SA12181] IBM HTTP Server Input Header Folding Denial of Service
Vulnerability
[SA12161] Gentoo update for subversion
[SA12148] Fedora update for subversion
[SA12140] SCO OpenServer update for Mozilla
[SA12134] Sun Java System Portal Server Proxy Authentication Failure
[SA12157] Apple Mac OS X Internet Connection Privilege Escalation
[SA12132] Gentoo update for kernel
[SA12129] InstallAnywhere Insecure Temporary File Creation
Vulnerability
[SA12135] Sun Java System Web Server Cross Site Scripting
Vulnerability

Other:
[SA12154] Thintune Client Multiple Vulnerabilities

Cross Platform:
[SA12177] Check Point VPN-1 ASN.1 Decoding Heap Overflow Vulnerability
[SA12166] Nucleus “itemid” SQL Injection Vulnerability
[SA12162] Opera Browser Address Bar Spoofing Vulnerability
[SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing
[SA12159] OpenDocMan “commitchange.php” Unauthorised Commitment of
Changes
[SA12150] Hitachi Web Page Generator Multiple Vulnerabilities
[SA12173] RiSearch Open Proxy Relay Vulnerability
[SA12155] Mensajeitor “AdminNick” Administrative User Spoofing
Vulnerability
[SA12151] EasyWeb FileManager “pathext” Directory Traversal

========================================================================
5) Vulnerabilities Content Listing

Windows:–

[SA12164] ASPRunner Multiple Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released: 2004-07-27

Ferruh Mavituna has reported some vulnerabilities in ASPRunner,
allowing malicious people to conduct SQL injection and cross-site
scripting attacks against pages created using ASPRunner.

Full Advisory:
http://secunia.com/advisories/12164/

[SA12165] FTPGlide Exposure of Passwords

Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2004-07-27

Ziv Kamir has reported a security issue in FTPGlide, which can be
exploited by malicious, local users to view usernames and passwords.

Full Advisory:
http://secunia.com/advisories/12165/

UNIX/Linux:–

[SA12178] SCO OpenServer update for sendmail

Critical: Extremely critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-29

SCO has issued an update for sendmail. This fixes two old
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12178/

[SA12172] Mandrake update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-28

MandrakeSoft has issued an update for mod_ssl. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12172/

[SA12163] Gentoo update for pavuk

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-27

Gentoo has issued an update for pavuk. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12163/

[SA12153] Dropbear SSH Server DSS Verification Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-26

Arne Bernin has reported a vulnerability in Dropbear SSH Server,
potentially allowing malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12153/

[SA12152] Pavuk Digest Authentication Buffer Overflow Vulnerabilities

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-27

Matthew Murphy has reported multiple vulnerabilities in Pavuk, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12152/

[SA12149] Fedora update for php

Critical: Highly critical
Where: From remote
Impact: Security Bypass, System access
Released: 2004-07-26

Fedora has issued an update for php. This fixes two vulnerabilities,
which can be exploited by malicious people to bypass certain security
functionality or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12149/

[SA12142] Debian update for libapache-mod-ssl

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-07-23

Debian has issued an update for libapache-mod-ssl. This fixes two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12142/

[SA12138] Slackware update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-26

Slackware has issued an update for mod_ssl. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12138/

[SA12131] Gentoo update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-22

Gentoo has issued an update for mod_ssl. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12131/

[SA12179] UnixWare update for tcpdump

Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-29

UnixWare has issued updated packages for tcpdump. These fix three
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a system running
tcpdump.

Full Advisory:
http://secunia.com/advisories/12179/

[SA12171] Mandrake update for webmin

Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS
Released: 2004-07-28

MandrakeSoft has issued an update for webmin. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12171/

[SA12170] Mandrake update for postgresql

Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-28

MandrakeSoft has issued an update for postgresql. This fixes a
vulnerability in the ODBC driver, which can be exploited by malicious
people to cause a DoS (Denial of Service) and potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12170/

[SA12146] Fedora update for abiword

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-26

Fedora has issued an update for abiword. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user’s system.

Full Advisory:
http://secunia.com/advisories/12146/

[SA12144] Debian update for courier

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-07-23

Debian has issued an update for courier. This fixes a vulnerability,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/12144/

[SA12143] Debian update for mailreader

Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-23

Full Advisory:
http://secunia.com/advisories/12143/

[SA12139] SuSE update for samba

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-23

SuSE has issued an update for samba. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12139/

[SA12136] AbiWord “wv” Library Buffer Overflow Vulnerability

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-26

AbiWord is affected by a vulnerability in the “wv” library, which
potentially can be exploited by malicious people to compromise a user’s
system.

Full Advisory:
http://secunia.com/advisories/12136/

[SA12128] Gentoo update for l2tpd

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-22

Gentoo has issued an update for l2tpd. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12128/

[SA12168] HP-UX CIFS Server Buffer Overflow Vulnerability

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-28

HP has confirmed a vulnerability in HP-UX, which potentially can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12168/

[SA12141] Mandrake update for samba

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

MandrakeSoft has issued an update for samba. This fixes two
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12141/

[SA12133] Red Hat update for samba

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

Red Hat has issued an update for samba. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12133/

[SA12130] Samba Two Buffer Overflow Vulnerabilities

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

Two vulnerabilities have been reported in Samba, potentially allowing
malicious people to compromise a vulnerability system.

Full Advisory:
http://secunia.com/advisories/12130/

[SA12181] IBM HTTP Server Input Header Folding Denial of Service
Vulnerability

Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-07-29

IBM has acknowledged a vulnerability in IBM HTTP Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12181/

[SA12161] Gentoo update for subversion

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-27

Gentoo has issued an update for subversion. This fixes a vulnerability,
which can be exploited by malicious users to read protected files.

Full Advisory:
http://secunia.com/advisories/12161/

[SA12148] Fedora update for subversion

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-26

Fedora has issued an update for subversion. This fixes a vulnerability,
which can be exploited by malicious users to read protected files.

Full Advisory:
http://secunia.com/advisories/12148/

[SA12140] SCO OpenServer update for Mozilla

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information, Security Bypass
Released: 2004-07-23

SCO has issued an update for Mozilla. This fixes some older
vulnerabilities, which potentially exposes proxy authentication
credentials, allows cross domain access and cookie path traversal.

Full Advisory:
http://secunia.com/advisories/12140/

[SA12134] Sun Java System Portal Server Proxy Authentication Failure

Critical: Less critical
Where: From local network
Impact: Privilege escalation
Released: 2004-07-23

The vendor has reported a vulnerability in Sun Java System Portal
Server, which may allow malicious users to gain administrative
credentials.

Full Advisory:
http://secunia.com/advisories/12134/

[SA12157] Apple Mac OS X Internet Connection Privilege Escalation

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-07-27

B-r00t has reported a vulnerability in Mac OS X, which can be exploited
by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/12157/

[SA12132] Gentoo update for kernel

Critical: Less critical
Where: Local system
Impact: DoS
Released: 2004-07-22

Gentoo has issued an update for the kernel. This fixes multiple
vulnerabilities, which can be exploited by malicious, local users to
bypass certain restrictions, cause a DoS (Denial of Service), or gain
knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/12132/

[SA12129] InstallAnywhere Insecure Temporary File Creation
Vulnerability

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-07-26

Larry W. Cashdollar has reported a vulnerability in InstallAnywhere,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/12129/

[SA12135] Sun Java System Web Server Cross Site Scripting
Vulnerability

Critical: Not critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-07-23

Sun has issued an update for Sun Java System Web Server. This fixes a
vulnerability, allowing malicious people to conduct Cross Site
Scripting attacks.

Full Advisory:
http://secunia.com/advisories/12135/

Other:–

[SA12154] Thintune Client Multiple Vulnerabilities

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-26

Dirk Loss has reported some vulnerabilities in Thintune OS, allowing
malicious people to gain system access and local users to escalate
their privileges.

Full Advisory:
http://secunia.com/advisories/12154/

Cross Platform:–

[SA12177] Check Point VPN-1 ASN.1 Decoding Heap Overflow Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-29

ISS X-Force has discovered a vulnerability in various Check Point VPN-1
products, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12177/

[SA12166] Nucleus “itemid” SQL Injection Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2004-07-28

aCiDBiTS has reported a vulnerability in Nucleus, allowing malicious
people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12166/

[SA12162] Opera Browser Address Bar Spoofing Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Spoofing
Released: 2004-07-27

bitlance winter has discovered a vulnerability in the Opera browser,
which potentially can be exploited by malicious people to conduct
phishing attacks against a user.

Full Advisory:
http://secunia.com/advisories/12162/

[SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing

Critical: Moderately critical
Where: From remote
Impact: Spoofing
Released: 2004-07-26

Emmanouel Kellinis has reported a vulnerability in Mozilla and Mozilla
Firefox, allowing malicious sites to abuse SSL certificates of other
sites.

Full Advisory:
http://secunia.com/advisories/12160/

[SA12159] OpenDocMan “commitchange.php” Unauthorised Commitment of
Changes

Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2004-07-26

A vulnerability has been discovered in OpenDocMan, which can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12159/

[SA12150] Hitachi Web Page Generator Multiple Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Exposure of system information, DoS
Released: 2004-07-28

Multiple vulnerabilities have been discovered in Web Page Generator,
which can be exploited by malicious people to cause a DoS (Denial of
Service), disclose content of directories, or conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/12150/

[SA12173] RiSearch Open Proxy Relay Vulnerability

Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2004-07-29

A vulnerability has been reported in RiSearch, allowing malicious
people to relay connections.

Full Advisory:
http://secunia.com/advisories/12173/

[SA12155] Mensajeitor “AdminNick” Administrative User Spoofing
Vulnerability

Critical: Less critical
Where: From remote
Impact: Spoofing
Released: 2004-07-27

Jordi Corrales has reported a vulnerability in Mensajeitor, which can
be exploited by malicious users to impersonate administrative users.

Full Advisory:
http://secunia.com/advisories/12155/

[SA12151] EasyWeb FileManager “pathext” Directory Traversal

Critical: Less critical
Where: From remote
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-07-26

sullo has reported a vulnerability in EasyWeb FileManager, allowing a
malicious user to retrieve arbitrary files.

Full Advisory:
http://secunia.com/advisories/12151/

Secunia Weekly Summary – Issue: 2004-31

julio 29, 2004 § Deja un comentario

========================================================================
The Secunia Weekly Advisory Summary
2004-07-22 – 2004-07-29

This week : 43 advisories
========================================================================
Table of Contents:

1……………………………………………..Word From Secunia
2…………………………………………….This Week In Brief
3………………………….This Weeks Top Ten Most Read Advisories
4…………………………………Vulnerabilities Summary Listing
5…………………………………Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

New Features at Secunia.com

Secunia has implemented various statistical features at the websites
for both Secunia advisories and Virus Information.

Secunia Advisories Statistics:
http://secunia.com/advisory_statistics/

Examples of Specific Product Statistics:
http://secunia.com/product/11/ (Internet Explorer 6)
http://secunia.com/product/761/ (Opera 7.x)
http://secunia.com/product/1480/ (Mozilla 1.3)

Secunia Virus Information Statistics:
http://secunia.com/virus_statistics/

Furthermore, Secunia has made it possible for you to include all graphs
available at secunia.com on your own website.

This is described in detail at:
http://secunia.com/secunia_image_inclusion/

========================================================================
2) This Week in Brief:

ADVISORIES:

The Opera Browser is continuously plagued by a vulnerability, which
allows malicious websites to spoof the content of the address bar.

The first time Opera patched this vulnerability was on the 13th of May
2004. Since then, three variants of the same vulnerability have been
found, forcing Opera Software to issue new browser versions with the
latest being version 7.53.

The latest variant is still pending a patch from Opera Software, who
hopefully will develop a permanent solution to this.

Reference:
http://secunia.com/SA12162
http://secunia.com/SA12028
http://secunia.com/SA11901
http://secunia.com/SA11532

Mozilla and Mozilla Firefox were reported vulnerable to a certificate
spoofing vulnerability. This could be exploited by a malicious website
to include a certificate from a trusted site, thereby making the
malicious website look like it is “signed” with the trusted site’s
certificate.

Reference:
http://secunia.com/SA12160

VIRUS ALERTS:

During the last week, Secunia issued one MEDIUM RISK virus alert and
one HIGH RISK virus alert. Please refer to the grouped virus profiles
below for more information:

Mydoom.M – HIGH RISK Virus Alert – 2004-07-26 20:25 GMT+1
http://secunia.com/virus_information/10755/mydoom.m/

Mydoom.M – MEDIUM RISK Virus Alert – 2004-07-26 17:25 GMT+1
http://secunia.com/virus_information/10755/mydoom.m/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1. [SA12048] Microsoft Internet Explorer Multiple Vulnerabilities
2. [SA11978] Multiple Browsers Frame Injection Vulnerability
3. [SA11793] Internet Explorer Local Resource Access and Cross-Zone
Scripting Vulnerabilities
4. [SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing
5. [SA12157] Apple Mac OS X Internet Connection Privilege Escalation
6. [SA12162] Opera Browser Address Bar Spoofing Vulnerability
7. [SA12027] Mozilla Fails to Restrict Access to “shell:”
8. [SA12077] mod_ssl Unspecified “mod_proxy” Hook Functions Format
String Vulnerability
9. [SA12028] Opera Browser Address Bar Spoofing Vulnerability
10. [SA11966] Internet Explorer Frame Injection Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA12164] ASPRunner Multiple Vulnerabilities
[SA12165] FTPGlide Exposure of Passwords

UNIX/Linux:
[SA12178] SCO OpenServer update for sendmail
[SA12172] Mandrake update for mod_ssl
[SA12163] Gentoo update for pavuk
[SA12153] Dropbear SSH Server DSS Verification Vulnerability
[SA12152] Pavuk Digest Authentication Buffer Overflow Vulnerabilities
[SA12149] Fedora update for php
[SA12142] Debian update for libapache-mod-ssl
[SA12138] Slackware update for mod_ssl
[SA12131] Gentoo update for mod_ssl
[SA12179] UnixWare update for tcpdump
[SA12171] Mandrake update for webmin
[SA12170] Mandrake update for postgresql
[SA12146] Fedora update for abiword
[SA12144] Debian update for courier
[SA12143] Debian update for mailreader
[SA12139] SuSE update for samba
[SA12136] AbiWord “wv” Library Buffer Overflow Vulnerability
[SA12128] Gentoo update for l2tpd
[SA12168] HP-UX CIFS Server Buffer Overflow Vulnerability
[SA12141] Mandrake update for samba
[SA12133] Red Hat update for samba
[SA12130] Samba Two Buffer Overflow Vulnerabilities
[SA12181] IBM HTTP Server Input Header Folding Denial of Service
Vulnerability
[SA12161] Gentoo update for subversion
[SA12148] Fedora update for subversion
[SA12140] SCO OpenServer update for Mozilla
[SA12134] Sun Java System Portal Server Proxy Authentication Failure
[SA12157] Apple Mac OS X Internet Connection Privilege Escalation
[SA12132] Gentoo update for kernel
[SA12129] InstallAnywhere Insecure Temporary File Creation
Vulnerability
[SA12135] Sun Java System Web Server Cross Site Scripting
Vulnerability

Other:
[SA12154] Thintune Client Multiple Vulnerabilities

Cross Platform:
[SA12177] Check Point VPN-1 ASN.1 Decoding Heap Overflow Vulnerability
[SA12166] Nucleus “itemid” SQL Injection Vulnerability
[SA12162] Opera Browser Address Bar Spoofing Vulnerability
[SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing
[SA12159] OpenDocMan “commitchange.php” Unauthorised Commitment of
Changes
[SA12150] Hitachi Web Page Generator Multiple Vulnerabilities
[SA12173] RiSearch Open Proxy Relay Vulnerability
[SA12155] Mensajeitor “AdminNick” Administrative User Spoofing
Vulnerability
[SA12151] EasyWeb FileManager “pathext” Directory Traversal

========================================================================
5) Vulnerabilities Content Listing

Windows:–

[SA12164] ASPRunner Multiple Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released: 2004-07-27

Ferruh Mavituna has reported some vulnerabilities in ASPRunner,
allowing malicious people to conduct SQL injection and cross-site
scripting attacks against pages created using ASPRunner.

Full Advisory:
http://secunia.com/advisories/12164/

[SA12165] FTPGlide Exposure of Passwords

Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2004-07-27

Ziv Kamir has reported a security issue in FTPGlide, which can be
exploited by malicious, local users to view usernames and passwords.

Full Advisory:
http://secunia.com/advisories/12165/

UNIX/Linux:–

[SA12178] SCO OpenServer update for sendmail

Critical: Extremely critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-29

SCO has issued an update for sendmail. This fixes two old
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12178/

[SA12172] Mandrake update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-28

MandrakeSoft has issued an update for mod_ssl. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12172/

[SA12163] Gentoo update for pavuk

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-27

Gentoo has issued an update for pavuk. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12163/

[SA12153] Dropbear SSH Server DSS Verification Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-26

Arne Bernin has reported a vulnerability in Dropbear SSH Server,
potentially allowing malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12153/

[SA12152] Pavuk Digest Authentication Buffer Overflow Vulnerabilities

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-27

Matthew Murphy has reported multiple vulnerabilities in Pavuk, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12152/

[SA12149] Fedora update for php

Critical: Highly critical
Where: From remote
Impact: Security Bypass, System access
Released: 2004-07-26

Fedora has issued an update for php. This fixes two vulnerabilities,
which can be exploited by malicious people to bypass certain security
functionality or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12149/

[SA12142] Debian update for libapache-mod-ssl

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-07-23

Debian has issued an update for libapache-mod-ssl. This fixes two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12142/

[SA12138] Slackware update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-26

Slackware has issued an update for mod_ssl. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12138/

[SA12131] Gentoo update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-22

Gentoo has issued an update for mod_ssl. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12131/

[SA12179] UnixWare update for tcpdump

Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-29

UnixWare has issued updated packages for tcpdump. These fix three
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a system running
tcpdump.

Full Advisory:
http://secunia.com/advisories/12179/

[SA12171] Mandrake update for webmin

Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS
Released: 2004-07-28

MandrakeSoft has issued an update for webmin. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12171/

[SA12170] Mandrake update for postgresql

Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-28

MandrakeSoft has issued an update for postgresql. This fixes a
vulnerability in the ODBC driver, which can be exploited by malicious
people to cause a DoS (Denial of Service) and potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12170/

[SA12146] Fedora update for abiword

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-26

Fedora has issued an update for abiword. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user’s system.

Full Advisory:
http://secunia.com/advisories/12146/

[SA12144] Debian update for courier

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-07-23

Debian has issued an update for courier. This fixes a vulnerability,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/12144/

[SA12143] Debian update for mailreader

Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-23

Full Advisory:
http://secunia.com/advisories/12143/

[SA12139] SuSE update for samba

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-23

SuSE has issued an update for samba. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12139/

[SA12136] AbiWord “wv” Library Buffer Overflow Vulnerability

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-26

AbiWord is affected by a vulnerability in the “wv” library, which
potentially can be exploited by malicious people to compromise a user’s
system.

Full Advisory:
http://secunia.com/advisories/12136/

[SA12128] Gentoo update for l2tpd

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-22

Gentoo has issued an update for l2tpd. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12128/

[SA12168] HP-UX CIFS Server Buffer Overflow Vulnerability

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-28

HP has confirmed a vulnerability in HP-UX, which potentially can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12168/

[SA12141] Mandrake update for samba

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

MandrakeSoft has issued an update for samba. This fixes two
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12141/

[SA12133] Red Hat update for samba

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

Red Hat has issued an update for samba. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12133/

[SA12130] Samba Two Buffer Overflow Vulnerabilities

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

Two vulnerabilities have been reported in Samba, potentially allowing
malicious people to compromise a vulnerability system.

Full Advisory:
http://secunia.com/advisories/12130/

[SA12181] IBM HTTP Server Input Header Folding Denial of Service
Vulnerability

Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-07-29

IBM has acknowledged a vulnerability in IBM HTTP Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12181/

[SA12161] Gentoo update for subversion

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-27

Gentoo has issued an update for subversion. This fixes a vulnerability,
which can be exploited by malicious users to read protected files.

Full Advisory:
http://secunia.com/advisories/12161/

[SA12148] Fedora update for subversion

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-26

Fedora has issued an update for subversion. This fixes a vulnerability,
which can be exploited by malicious users to read protected files.

Full Advisory:
http://secunia.com/advisories/12148/

[SA12140] SCO OpenServer update for Mozilla

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information, Security Bypass
Released: 2004-07-23

SCO has issued an update for Mozilla. This fixes some older
vulnerabilities, which potentially exposes proxy authentication
credentials, allows cross domain access and cookie path traversal.

Full Advisory:
http://secunia.com/advisories/12140/

[SA12134] Sun Java System Portal Server Proxy Authentication Failure

Critical: Less critical
Where: From local network
Impact: Privilege escalation
Released: 2004-07-23

The vendor has reported a vulnerability in Sun Java System Portal
Server, which may allow malicious users to gain administrative
credentials.

Full Advisory:
http://secunia.com/advisories/12134/

[SA12157] Apple Mac OS X Internet Connection Privilege Escalation

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-07-27

B-r00t has reported a vulnerability in Mac OS X, which can be exploited
by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/12157/

[SA12132] Gentoo update for kernel

Critical: Less critical
Where: Local system
Impact: DoS
Released: 2004-07-22

Gentoo has issued an update for the kernel. This fixes multiple
vulnerabilities, which can be exploited by malicious, local users to
bypass certain restrictions, cause a DoS (Denial of Service), or gain
knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/12132/

[SA12129] InstallAnywhere Insecure Temporary File Creation
Vulnerability

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-07-26

Larry W. Cashdollar has reported a vulnerability in InstallAnywhere,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/12129/

[SA12135] Sun Java System Web Server Cross Site Scripting
Vulnerability

Critical: Not critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-07-23

Sun has issued an update for Sun Java System Web Server. This fixes a
vulnerability, allowing malicious people to conduct Cross Site
Scripting attacks.

Full Advisory:
http://secunia.com/advisories/12135/

Other:–

[SA12154] Thintune Client Multiple Vulnerabilities

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-26

Dirk Loss has reported some vulnerabilities in Thintune OS, allowing
malicious people to gain system access and local users to escalate
their privileges.

Full Advisory:
http://secunia.com/advisories/12154/

Cross Platform:–

[SA12177] Check Point VPN-1 ASN.1 Decoding Heap Overflow Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-29

ISS X-Force has discovered a vulnerability in various Check Point VPN-1
products, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12177/

[SA12166] Nucleus “itemid” SQL Injection Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2004-07-28

aCiDBiTS has reported a vulnerability in Nucleus, allowing malicious
people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12166/

[SA12162] Opera Browser Address Bar Spoofing Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Spoofing
Released: 2004-07-27

bitlance winter has discovered a vulnerability in the Opera browser,
which potentially can be exploited by malicious people to conduct
phishing attacks against a user.

Full Advisory:
http://secunia.com/advisories/12162/

[SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing

Critical: Moderately critical
Where: From remote
Impact: Spoofing
Released: 2004-07-26

Emmanouel Kellinis has reported a vulnerability in Mozilla and Mozilla
Firefox, allowing malicious sites to abuse SSL certificates of other
sites.

Full Advisory:
http://secunia.com/advisories/12160/

[SA12159] OpenDocMan “commitchange.php” Unauthorised Commitment of
Changes

Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2004-07-26

A vulnerability has been discovered in OpenDocMan, which can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12159/

[SA12150] Hitachi Web Page Generator Multiple Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Exposure of system information, DoS
Released: 2004-07-28

Multiple vulnerabilities have been discovered in Web Page Generator,
which can be exploited by malicious people to cause a DoS (Denial of
Service), disclose content of directories, or conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/12150/

[SA12173] RiSearch Open Proxy Relay Vulnerability

Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2004-07-29

A vulnerability has been reported in RiSearch, allowing malicious
people to relay connections.

Full Advisory:
http://secunia.com/advisories/12173/

[SA12155] Mensajeitor “AdminNick” Administrative User Spoofing
Vulnerability

Critical: Less critical
Where: From remote
Impact: Spoofing
Released: 2004-07-27

Jordi Corrales has reported a vulnerability in Mensajeitor, which can
be exploited by malicious users to impersonate administrative users.

Full Advisory:
http://secunia.com/advisories/12155/

[SA12151] EasyWeb FileManager “pathext” Directory Traversal

Critical: Less critical
Where: From remote
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-07-26

sullo has reported a vulnerability in EasyWeb FileManager, allowing a
malicious user to retrieve arbitrary files.

Full Advisory:
http://secunia.com/advisories/12151/

Secunia Weekly Summary – Issue: 2004-31

julio 29, 2004 § Deja un comentario

========================================================================
The Secunia Weekly Advisory Summary
2004-07-22 – 2004-07-29

This week : 43 advisories
========================================================================
Table of Contents:

1……………………………………………..Word From Secunia
2…………………………………………….This Week In Brief
3………………………….This Weeks Top Ten Most Read Advisories
4…………………………………Vulnerabilities Summary Listing
5…………………………………Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

New Features at Secunia.com

Secunia has implemented various statistical features at the websites
for both Secunia advisories and Virus Information.

Secunia Advisories Statistics:
http://secunia.com/advisory_statistics/

Examples of Specific Product Statistics:
http://secunia.com/product/11/ (Internet Explorer 6)
http://secunia.com/product/761/ (Opera 7.x)
http://secunia.com/product/1480/ (Mozilla 1.3)

Secunia Virus Information Statistics:
http://secunia.com/virus_statistics/

Furthermore, Secunia has made it possible for you to include all graphs
available at secunia.com on your own website.

This is described in detail at:
http://secunia.com/secunia_image_inclusion/

========================================================================
2) This Week in Brief:

ADVISORIES:

The Opera Browser is continuously plagued by a vulnerability, which
allows malicious websites to spoof the content of the address bar.

The first time Opera patched this vulnerability was on the 13th of May
2004. Since then, three variants of the same vulnerability have been
found, forcing Opera Software to issue new browser versions with the
latest being version 7.53.

The latest variant is still pending a patch from Opera Software, who
hopefully will develop a permanent solution to this.

Reference:
http://secunia.com/SA12162
http://secunia.com/SA12028
http://secunia.com/SA11901
http://secunia.com/SA11532

Mozilla and Mozilla Firefox were reported vulnerable to a certificate
spoofing vulnerability. This could be exploited by a malicious website
to include a certificate from a trusted site, thereby making the
malicious website look like it is “signed” with the trusted site’s
certificate.

Reference:
http://secunia.com/SA12160

VIRUS ALERTS:

During the last week, Secunia issued one MEDIUM RISK virus alert and
one HIGH RISK virus alert. Please refer to the grouped virus profiles
below for more information:

Mydoom.M – HIGH RISK Virus Alert – 2004-07-26 20:25 GMT+1
http://secunia.com/virus_information/10755/mydoom.m/

Mydoom.M – MEDIUM RISK Virus Alert – 2004-07-26 17:25 GMT+1
http://secunia.com/virus_information/10755/mydoom.m/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1. [SA12048] Microsoft Internet Explorer Multiple Vulnerabilities
2. [SA11978] Multiple Browsers Frame Injection Vulnerability
3. [SA11793] Internet Explorer Local Resource Access and Cross-Zone
Scripting Vulnerabilities
4. [SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing
5. [SA12157] Apple Mac OS X Internet Connection Privilege Escalation
6. [SA12162] Opera Browser Address Bar Spoofing Vulnerability
7. [SA12027] Mozilla Fails to Restrict Access to “shell:”
8. [SA12077] mod_ssl Unspecified “mod_proxy” Hook Functions Format
String Vulnerability
9. [SA12028] Opera Browser Address Bar Spoofing Vulnerability
10. [SA11966] Internet Explorer Frame Injection Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA12164] ASPRunner Multiple Vulnerabilities
[SA12165] FTPGlide Exposure of Passwords

UNIX/Linux:
[SA12178] SCO OpenServer update for sendmail
[SA12172] Mandrake update for mod_ssl
[SA12163] Gentoo update for pavuk
[SA12153] Dropbear SSH Server DSS Verification Vulnerability
[SA12152] Pavuk Digest Authentication Buffer Overflow Vulnerabilities
[SA12149] Fedora update for php
[SA12142] Debian update for libapache-mod-ssl
[SA12138] Slackware update for mod_ssl
[SA12131] Gentoo update for mod_ssl
[SA12179] UnixWare update for tcpdump
[SA12171] Mandrake update for webmin
[SA12170] Mandrake update for postgresql
[SA12146] Fedora update for abiword
[SA12144] Debian update for courier
[SA12143] Debian update for mailreader
[SA12139] SuSE update for samba
[SA12136] AbiWord “wv” Library Buffer Overflow Vulnerability
[SA12128] Gentoo update for l2tpd
[SA12168] HP-UX CIFS Server Buffer Overflow Vulnerability
[SA12141] Mandrake update for samba
[SA12133] Red Hat update for samba
[SA12130] Samba Two Buffer Overflow Vulnerabilities
[SA12181] IBM HTTP Server Input Header Folding Denial of Service
Vulnerability
[SA12161] Gentoo update for subversion
[SA12148] Fedora update for subversion
[SA12140] SCO OpenServer update for Mozilla
[SA12134] Sun Java System Portal Server Proxy Authentication Failure
[SA12157] Apple Mac OS X Internet Connection Privilege Escalation
[SA12132] Gentoo update for kernel
[SA12129] InstallAnywhere Insecure Temporary File Creation
Vulnerability
[SA12135] Sun Java System Web Server Cross Site Scripting
Vulnerability

Other:
[SA12154] Thintune Client Multiple Vulnerabilities

Cross Platform:
[SA12177] Check Point VPN-1 ASN.1 Decoding Heap Overflow Vulnerability
[SA12166] Nucleus “itemid” SQL Injection Vulnerability
[SA12162] Opera Browser Address Bar Spoofing Vulnerability
[SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing
[SA12159] OpenDocMan “commitchange.php” Unauthorised Commitment of
Changes
[SA12150] Hitachi Web Page Generator Multiple Vulnerabilities
[SA12173] RiSearch Open Proxy Relay Vulnerability
[SA12155] Mensajeitor “AdminNick” Administrative User Spoofing
Vulnerability
[SA12151] EasyWeb FileManager “pathext” Directory Traversal

========================================================================
5) Vulnerabilities Content Listing

Windows:–

[SA12164] ASPRunner Multiple Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released: 2004-07-27

Ferruh Mavituna has reported some vulnerabilities in ASPRunner,
allowing malicious people to conduct SQL injection and cross-site
scripting attacks against pages created using ASPRunner.

Full Advisory:
http://secunia.com/advisories/12164/

[SA12165] FTPGlide Exposure of Passwords

Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2004-07-27

Ziv Kamir has reported a security issue in FTPGlide, which can be
exploited by malicious, local users to view usernames and passwords.

Full Advisory:
http://secunia.com/advisories/12165/

UNIX/Linux:–

[SA12178] SCO OpenServer update for sendmail

Critical: Extremely critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-29

SCO has issued an update for sendmail. This fixes two old
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12178/

[SA12172] Mandrake update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-28

MandrakeSoft has issued an update for mod_ssl. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12172/

[SA12163] Gentoo update for pavuk

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-27

Gentoo has issued an update for pavuk. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12163/

[SA12153] Dropbear SSH Server DSS Verification Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-26

Arne Bernin has reported a vulnerability in Dropbear SSH Server,
potentially allowing malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12153/

[SA12152] Pavuk Digest Authentication Buffer Overflow Vulnerabilities

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-27

Matthew Murphy has reported multiple vulnerabilities in Pavuk, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12152/

[SA12149] Fedora update for php

Critical: Highly critical
Where: From remote
Impact: Security Bypass, System access
Released: 2004-07-26

Fedora has issued an update for php. This fixes two vulnerabilities,
which can be exploited by malicious people to bypass certain security
functionality or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12149/

[SA12142] Debian update for libapache-mod-ssl

Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2004-07-23

Debian has issued an update for libapache-mod-ssl. This fixes two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12142/

[SA12138] Slackware update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-26

Slackware has issued an update for mod_ssl. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12138/

[SA12131] Gentoo update for mod_ssl

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-22

Gentoo has issued an update for mod_ssl. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12131/

[SA12179] UnixWare update for tcpdump

Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-29

UnixWare has issued updated packages for tcpdump. These fix three
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a system running
tcpdump.

Full Advisory:
http://secunia.com/advisories/12179/

[SA12171] Mandrake update for webmin

Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS
Released: 2004-07-28

MandrakeSoft has issued an update for webmin. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12171/

[SA12170] Mandrake update for postgresql

Critical: Moderately critical
Where: From remote
Impact: System access, DoS
Released: 2004-07-28

MandrakeSoft has issued an update for postgresql. This fixes a
vulnerability in the ODBC driver, which can be exploited by malicious
people to cause a DoS (Denial of Service) and potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12170/

[SA12146] Fedora update for abiword

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-26

Fedora has issued an update for abiword. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user’s system.

Full Advisory:
http://secunia.com/advisories/12146/

[SA12144] Debian update for courier

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-07-23

Debian has issued an update for courier. This fixes a vulnerability,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/12144/

[SA12143] Debian update for mailreader

Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-23

Full Advisory:
http://secunia.com/advisories/12143/

[SA12139] SuSE update for samba

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-23

SuSE has issued an update for samba. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12139/

[SA12136] AbiWord “wv” Library Buffer Overflow Vulnerability

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-26

AbiWord is affected by a vulnerability in the “wv” library, which
potentially can be exploited by malicious people to compromise a user’s
system.

Full Advisory:
http://secunia.com/advisories/12136/

[SA12128] Gentoo update for l2tpd

Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2004-07-22

Gentoo has issued an update for l2tpd. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12128/

[SA12168] HP-UX CIFS Server Buffer Overflow Vulnerability

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-28

HP has confirmed a vulnerability in HP-UX, which potentially can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12168/

[SA12141] Mandrake update for samba

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

MandrakeSoft has issued an update for samba. This fixes two
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/12141/

[SA12133] Red Hat update for samba

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

Red Hat has issued an update for samba. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/12133/

[SA12130] Samba Two Buffer Overflow Vulnerabilities

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-23

Two vulnerabilities have been reported in Samba, potentially allowing
malicious people to compromise a vulnerability system.

Full Advisory:
http://secunia.com/advisories/12130/

[SA12181] IBM HTTP Server Input Header Folding Denial of Service
Vulnerability

Critical: Less critical
Where: From remote
Impact: DoS
Released: 2004-07-29

IBM has acknowledged a vulnerability in IBM HTTP Server, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/12181/

[SA12161] Gentoo update for subversion

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-27

Gentoo has issued an update for subversion. This fixes a vulnerability,
which can be exploited by malicious users to read protected files.

Full Advisory:
http://secunia.com/advisories/12161/

[SA12148] Fedora update for subversion

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2004-07-26

Fedora has issued an update for subversion. This fixes a vulnerability,
which can be exploited by malicious users to read protected files.

Full Advisory:
http://secunia.com/advisories/12148/

[SA12140] SCO OpenServer update for Mozilla

Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information, Security Bypass
Released: 2004-07-23

SCO has issued an update for Mozilla. This fixes some older
vulnerabilities, which potentially exposes proxy authentication
credentials, allows cross domain access and cookie path traversal.

Full Advisory:
http://secunia.com/advisories/12140/

[SA12134] Sun Java System Portal Server Proxy Authentication Failure

Critical: Less critical
Where: From local network
Impact: Privilege escalation
Released: 2004-07-23

The vendor has reported a vulnerability in Sun Java System Portal
Server, which may allow malicious users to gain administrative
credentials.

Full Advisory:
http://secunia.com/advisories/12134/

[SA12157] Apple Mac OS X Internet Connection Privilege Escalation

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-07-27

B-r00t has reported a vulnerability in Mac OS X, which can be exploited
by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/12157/

[SA12132] Gentoo update for kernel

Critical: Less critical
Where: Local system
Impact: DoS
Released: 2004-07-22

Gentoo has issued an update for the kernel. This fixes multiple
vulnerabilities, which can be exploited by malicious, local users to
bypass certain restrictions, cause a DoS (Denial of Service), or gain
knowledge of sensitive information.

Full Advisory:
http://secunia.com/advisories/12132/

[SA12129] InstallAnywhere Insecure Temporary File Creation
Vulnerability

Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2004-07-26

Larry W. Cashdollar has reported a vulnerability in InstallAnywhere,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.

Full Advisory:
http://secunia.com/advisories/12129/

[SA12135] Sun Java System Web Server Cross Site Scripting
Vulnerability

Critical: Not critical
Where: From remote
Impact: Cross Site Scripting
Released: 2004-07-23

Sun has issued an update for Sun Java System Web Server. This fixes a
vulnerability, allowing malicious people to conduct Cross Site
Scripting attacks.

Full Advisory:
http://secunia.com/advisories/12135/

Other:–

[SA12154] Thintune Client Multiple Vulnerabilities

Critical: Moderately critical
Where: From local network
Impact: System access
Released: 2004-07-26

Dirk Loss has reported some vulnerabilities in Thintune OS, allowing
malicious people to gain system access and local users to escalate
their privileges.

Full Advisory:
http://secunia.com/advisories/12154/

Cross Platform:–

[SA12177] Check Point VPN-1 ASN.1 Decoding Heap Overflow Vulnerability

Critical: Highly critical
Where: From remote
Impact: System access
Released: 2004-07-29

ISS X-Force has discovered a vulnerability in various Check Point VPN-1
products, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/12177/

[SA12166] Nucleus “itemid” SQL Injection Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2004-07-28

aCiDBiTS has reported a vulnerability in Nucleus, allowing malicious
people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/12166/

[SA12162] Opera Browser Address Bar Spoofing Vulnerability

Critical: Moderately critical
Where: From remote
Impact: Spoofing
Released: 2004-07-27

bitlance winter has discovered a vulnerability in the Opera browser,
which potentially can be exploited by malicious people to conduct
phishing attacks against a user.

Full Advisory:
http://secunia.com/advisories/12162/

[SA12160] Mozilla / Mozilla Firefox “onunload” SSL Certificate
Spoofing

Critical: Moderately critical
Where: From remote
Impact: Spoofing
Released: 2004-07-26

Emmanouel Kellinis has reported a vulnerability in Mozilla and Mozilla
Firefox, allowing malicious sites to abuse SSL certificates of other
sites.

Full Advisory:
http://secunia.com/advisories/12160/

[SA12159] OpenDocMan “commitchange.php” Unauthorised Commitment of
Changes

Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2004-07-26

A vulnerability has been discovered in OpenDocMan, which can be
exploited by malicious users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/12159/

[SA12150] Hitachi Web Page Generator Multiple Vulnerabilities

Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Exposure of system information, DoS
Released: 2004-07-28

Multiple vulnerabilities have been discovered in Web Page Generator,
which can be exploited by malicious people to cause a DoS (Denial of
Service), disclose content of directories, or conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/12150/

[SA12173] RiSearch Open Proxy Relay Vulnerability

Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2004-07-29

A vulnerability has been reported in RiSearch, allowing malicious
people to relay connections.

Full Advisory:
http://secunia.com/advisories/12173/

[SA12155] Mensajeitor “AdminNick” Administrative User Spoofing
Vulnerability

Critical: Less critical
Where: From remote
Impact: Spoofing
Released: 2004-07-27

Jordi Corrales has reported a vulnerability in Mensajeitor, which can
be exploited by malicious users to impersonate administrative users.

Full Advisory:
http://secunia.com/advisories/12155/

[SA12151] EasyWeb FileManager “pathext” Directory Traversal

Critical: Less critical
Where: From remote
Impact: Exposure of system information, Exposure of sensitive
information
Released: 2004-07-26

sullo has reported a vulnerability in EasyWeb FileManager, allowing a
malicious user to retrieve arbitrary files.

Full Advisory:
http://secunia.com/advisories/12151/

¿Dónde estoy?

Actualmente estás viendo los archivos para julio, 2004 en Seguridad Informática.