Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES \ FIXES - July 10, 2008

Sophos Products Zero-byte MIME Attachments Denial of Service

Secunia Advisory: SA31037
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: DoS

Where: From remote

Solution Status: Vendor Patch


OS: Sophos Email Appliance (ES1000/ES4000) 2.x



Software: Sophos Anti-Virus Interface (SAVI)
Sophos PureMessage for UNIX 4.x
Sophos PureMessage for UNIX 5.x

Description:
A vulnerability has been reported in some Sophos products, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error when processing zero-byte MIME attachments and can be exploited to cause a DoS.

The vulnerability affects the following products that incorporate the July update (4.31 virus data and 2.75 engine):
* Sophos Email Appliance
* Pure Message for Unix
* Sophos Anti-Virus Interface (SAVI)

Solution:
Update to the latest virus identity file.

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://www.sophos.com/support/knowledgebase/article/42245.html

Discussion is locked
You are posting a reply to: VULNERABILITIES \ FIXES - July 10, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES \ FIXES - July 10, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Debian update for poppler

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31035
Release Date: 2008-07-10


Critical:
Highly critical
Impact: DoS
System access

Where: From remote

Solution Status: Vendor Patch


OS: Debian GNU/Linux 4.0
Debian GNU/Linux unstable alias sid

Description:
Debian has issued an update for poppler. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

Original Advisory:
http://lists.debian.org/debian-security-announce/2008/msg00187.html

Other References:
SA29836:
http://secunia.com/advisories/29836/

Collapse -
Nixu Secure Name Server BIND Query Port DNS Cache Poisoning

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31031
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Vendor Patch


OS: Nixu Secure Name Server 1.x

Description:
A vulnerability has been reported in Nixu Secure Name Server, which can be exploited by malicious people to poison the DNS cache.

Solution:
Reportedly, a patched version of BIND has been made available via automated software updates.

Original Advisory:
http://www.kb.cert.org/vuls/id/MAPG-7G7NUC

Collapse -
Infoblox NIOS BIND Query Port DNS Cache Poisoning

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31030
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Vendor Patch


OS: Infoblox DNS One 2.x
Infoblox NIOS 4.x

Description:
A vulnerability has been reported in Infoblox NIOS, which can be exploited by malicious people to poison the DNS cache.

Solution:
Reportedly fixed in NIOS version 4.2r5, 4.2r4-3, and 4.2r3-6.

Original Advisory:
http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q

Other References:
SA30973:
http://secunia.com/advisories/30973/

Collapse -
Gentoo update for openoffice and openoffice-bin

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31029
Release Date: 2008-07-10


Critical:
Highly critical
Impact: System access

Where: From remote

Solution Status: Vendor Patch


OS: Gentoo Linux 1.x

Description:
Gentoo has issued an update for openoffice and openoffice-bin. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

Solution:
openoffice users:
Update to "app-office/openoffice-2.4.1" or later.

openoffice-bin users:
Update to "app-office/openoffice-bin-2.4.1" or later.

Original Advisory:
http://www.gentoo.org/security/en/glsa/glsa-200807-05.xml

Other References:
SA30599:
http://secunia.com/advisories/30599/

Collapse -
Drupal Multiple Vulnerabilities

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31028
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Hijacking
Cross Site Scripting
Manipulation of data

Where: From remote

Solution Status: Vendor Patch


Software: Drupal 5.x
Drupal 6.x

Description:
Some vulnerabilities have been reported in Drupal, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, session fixation, SQL injection, and script insertion attacks.

The vulnerabilities are reported in version 5.x and 6.x.

Solution:
Update to the latest versions or apply patch for version 5.7 or 6.2.

Drupal 5.x:
Update to version 5.8.
http://ftp.drupal.org/files/projects/drupal-5.8.tar.gz

Drupal 6.x
Update to version 6.3.
http://ftp.drupal.org/files/projects/drupal-6.3.tar.gz

Drupal 5.7:
Apply patch.
http://drupal.org/files/sa-2008-044/SA-2008-044-5.7.patch

Drupal 6.2:
Apply patch.
http://drupal.org/files/sa-2008-044/SA-2008-044-6.2.patch

Provided and/or discovered by:
The vendor credits Erich C. Beyrent, John Morahan, Peter Wolanin (Drupal security team), Neil Drumm (Drupal security team), and Heine Deelstra (Drupal security team).

Original Advisory:
http://drupal.org/node/280571

Collapse -
Drupal OpenID Module Vulnerabilities

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31027
Release Date: 2008-07-10


Critical:
Less critical
Impact: Cross Site Scripting

Where: From remote

Solution Status: Vendor Patch


Software: Drupal OpenID Module 5.x

Description:
Some vulnerabilities have been reported in the OpenID module for Drupal, which can be exploited by malicious people to conduct cross-site scripting or cross-site request forgery attacks.

The vulnerabilities affect versions prior to 5x.-1.2.

Solution:
Update to version 5x.-1.2.
http://drupal.org/node/280593

Provided and/or discovered by:
Neil Drumm and Peter Wolanin, Drupal Security Team

Original Advisory:
SA-2008-045:
http://drupal.org/node/280592

Collapse -
Gentoo update for apache

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31026
Release Date: 2008-07-10


Critical:
Less critical
Impact: Cross Site Scripting
DoS

Where: From remote

Solution Status: Vendor Patch


OS: Gentoo Linux 1.x

Description:
Gentoo has issued an update for apache. This fixes a some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks and cause a DoS (Denial of Service).

Solution:
Update to "www-servers/apache-2.2.9" or later.

Original Advisory:
http://www.gentoo.org/security/en/glsa/glsa-200807-06.xml

Other References:
SA28046:
http://secunia.com/advisories/28046/

SA30621:
http://secunia.com/advisories/30621/

Collapse -
Gentoo update for nx

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31025
Release Date: 2008-07-10


Critical:
Less critical
Impact: Exposure of sensitive information
Privilege escalation
DoS

Where: Local system

Solution Status: Vendor Patch


OS: Gentoo Linux 1.x

Description:
Gentoo has issued an update for nx. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

Solution:
nxnode users:
Update to "net-misc/nxnode-3.2.0-r3" or later.

nx users:
Update to "net-misc/nx-3.2.0-r2" or later.

Original Advisory:
http://www.gentoo.org/security/en/glsa/glsa-200807-07.xml

Other References:
SA30627:
http://secunia.com/advisories/30627/

Collapse -
vbDrupal Multiple Vulnerabilities

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31024
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Hijacking
Cross Site Scripting
Manipulation of data

Where: From remote

Solution Status: Vendor Patch


Software: vbDrupal 5.x

Description:
Some vulnerabilities have been reported in vbDrupal, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, session fixation, SQL injection, and script insertion attacks.

Solution:
Update to version 5.8.0.

Original Advisory:
http://sourceforge.net/project/showno...release_id=612517&group_id=158575

Other References:
SA31028:
http://secunia.com/advisories/31028/

Collapse -
Slackware update for seamonkey

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31023
Release Date: 2008-07-10


Critical:
Highly critical
Impact: System access
DoS
Exposure of sensitive information
Exposure of system information
Spoofing
Cross Site Scripting
Security Bypass

Where: From remote

Solution Status: Vendor Patch


OS: Slackware Linux 11.0

Description:
Slackware has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, or potentially compromise a user's system.

Solution:
Apply updated packages.

Original Advisory:
http://slackware.com/security/viewer....=2008&m=slackware-security.383152

Other References:
SA29860:
http://secunia.com/advisories/29860/

Collapse -
Slackware update for mozilla-firefox

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31021
Release Date: 2008-07-10


Critical:
Highly critical
Impact: Security Bypass
Cross Site Scripting
Spoofing
Exposure of system information
Exposure of sensitive information
DoS
System access

Where: From remote

Solution Status: Vendor Patch


OS: Slackware Linux 11.0

Description:
Slackware has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, or potentially compromise a user's system.

Solution:
Apply updated packages.

Original Advisory:
http://slackware.com/security/viewer....=2008&m=slackware-security.384911

Other References:
SA30911:
http://secunia.com/advisories/30911/

Collapse -
Fedora update for java-1.7.0-icedtea

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31020
Release Date: 2008-07-10


Critical:
Highly critical
Impact: Security Bypass
Exposure of system information
Exposure of sensitive information
DoS
System access

Where: From remote

Solution Status: Vendor Patch


OS: Fedora 8

Description:
Fedora has issued an update for java-1.7.0-icedtea. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

Solution:
Apply updated packages via the yum utility ("yum update java-1.7.0-icedtea").

Original Advisory:
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00453.html

Other References:
SA31010:
http://secunia.com/advisories/31010/

Collapse -
Fedora update for bind

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31019
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Vendor Patch


OS: Fedora 8
Fedora 9

Description:
Fedora has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

Solution:
Apply updated packages via the yum utility ("yum update bind").

Original Advisory:
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html

Other References:
SA30973:
http://secunia.com/advisories/30973/

Collapse -
DreamPics Builder "page" SQL Injection Vulnerability

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31009
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Manipulation of data

Where: From remote

Solution Status: Unpatched


Software: DreamPics Builder



Description:
Hussin X has reported a vulnerability in DreamPics Builder, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed via the "page" parameter to index.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Solution:
Filter malicious characters and character sequences in a proxy.

Provided and/or discovered by:
Hussin X

Original Advisory:
http://milw0rm.com/exploits/6034

Collapse -
AuraCMS "pages_data.php" Manipulation of Data

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31000
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Manipulation of data

Where: From remote

Solution Status: Unpatched


Software: AuraCMS 2.x

Description:
k1tk4t has reported a vulnerability in AuraCMS, which can be exploited by malicious people to manipulate certain data.

The problem is that it is possible to add, edit, or delete content on certain pages via e.g. a POST request to the js/pages/pages_data.php script.

The vulnerability is reported in version 2.2.2. Other versions may also be affected.

Solution:
Restrict access to the "js/pages/pages_data.php" script (e.g. with ".htaccess").

Provided and/or discovered by:
k1tk4t

Original Advisory:
http://milw0rm.com/exploits/6033

Collapse -
Red Hat update for openldap

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA30996
Release Date: 2008-07-10


Critical:
Less critical
Impact: DoS

Where: From local network

Solution Status: Vendor Patch


OS: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux WS 4

Description:
Red Hat has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

Solution:
Updated packages are available via Red Hat Network.
http://rhn.redhat.com

Original Advisory:
http://rhn.redhat.com/errata/RHSA-2008-0583.html

Other References:
SA30853:
http://secunia.com/advisories/30853/

Collapse -
Network Appliance Data ONTAP Unspecified Vulnerabilities

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA30931
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Unknown

Where: From remote

Solution Status: Vendor Patch


OS: Network Appliance Data ONTAP 7.x

Description:
Some vulnerabilities with unknown impact have been reported in IBM Data ONTAP.

The vulnerabilities are caused due to unknown errors in Data ONTAP Gateway and Data ONTAP Filer. No further information is currently available.

The vulnerabilities are reported in versions prior to 7.1.3.

Solution:
Update to Data ONTAP 7.1.3 or later (see original advisories for details).

Provided and/or discovered by:
Reported in an IBM advisory.

Original Advisory:
http://www-1.ibm.com/support/docview.wss?uid=ssg1S7002372
http://www-1.ibm.com/support/docview.wss?uid=ssg1S7002373

Collapse -
Updates for Java eliminate many security holes

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

10 July 2008

Sun Microsystems has issued updates for Java to eliminate many errors and vulnerabilities in the Java Development Kit (JDK) and the Java Runtime Environment (JRE). These include DoS vulnerabilities, buffer overflows and other errors that could cause a crash or allow a crafted applet to access certain resources, the filing system, or even the entire computer. Some of the errors are in Java Web Start, some in the Java Management Extensions (JMX) Management Agent, while others are in the functions that process XML data.

However, not all of the errors listed are contained in all versions. Users will have difficulty deciding which versions are actually affected by what, because Sun has divided its explanations of the individual problems over eight security advisories. Basically, all the errors listed are eliminated in the latest versions; JDK and JRE 6 Update 7, JDK and JRE 5.0 Update 16, SDK and J2SE 1.4.2_18 and SDK and J2SE 1.3.1_23.

More: http://www.heise-online.co.uk/security/Updates-for-Java-eliminate-many-security-holes--/news/111080

Collapse -
Slackware update for bind

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Secunia Advisory: SA31022
Release Date: 2008-07-10


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Vendor Patch


OS: Slackware Linux 10.0
Slackware Linux 11.0
Slackware Linux 8.x
Slackware Linux 9.0
Slackware Linux 9.1

Description:
Slackware has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

Solution:
Apply updated packages.

Original Advisory:
http://slackware.com/security/viewer....=2008&m=slackware-security.539239

Other References:
SA30973:
http://secunia.com/advisories/30973/

Collapse -
Novell eDirectory LDAP Search Request Heap Corruption Vulner

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Summary
Novell eDirectory is "cross-platform directory server that implements the Lightweight Directory Access Protocol (LDAP). The search request is used to search a directory tree for objects that match a search filter". Remote exploitation of a heap buffer overflow vulnerability in Novell Inc.'s eDirectory could allow an attacker to execute arbitrary code with the privileges of the affected service.

Credit:
The information has been provided by iDefense.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=724

http://www.securiteam.com/unixfocus/5NP0B00OUM.html

Collapse -
One Bushel of Apple Updates

In reply to: VULNERABILITIES \ FIXES - July 10, 2008

Published: 2008-07-10,
Last Updated: 2008-07-10 16:31:52 UTC
by Johannes Ullrich

Apple is updating many systems this week (in paritcular today) to get ready for the iPhone 3G launch and the new "MobileMe" software. Its not exactly within your scope to cover product updates or releases like that. However, some of the updates released today are security relevant. For example the new AppleTV software includes a number of security patches. A new version of Quicktime ( 7.7.0.43) was released as well (thanks David!).

It is not clear if the new version of iTunes (7.7) released today includes any security fixes.

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute

http://isc.sans.org/

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

REVIEW

Sublime suburban chariot

High on style and technology, the 2019 Volvo XC90 is an incredibly satisfying everyday crossover.