HolidayBuyer's Guide

Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES \ FIXES - July 17, 2008

by Marianna Schmudlach / July 17, 2008 1:00 AM PDT

Blue Coat ProxyRA DNS Cache Poisoning Vulnerability


Secunia Advisory: SA31153
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Unpatched


OS: Blue Coat ProxyRA 2.x

Description:
Blue Coat has acknowledged a vulnerability in Blue Coat ProxyRA, which can be exploited by malicious people to poison the DNS cache.

The vulnerability is caused due to the product not sufficiently randomising the DNS transaction ID and the source port number, which can be exploited to poison the DNS cache.

Solution:
Reportedly, this will be fixed in version 2.3.2.1.

Provided and/or discovered by:
Dan Kaminsky

Original Advisory:
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Discussion is locked
You are posting a reply to: VULNERABILITIES \ FIXES - July 17, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES \ FIXES - July 17, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Blue Coat Director DNS Cache Poisoning Vulnerability
by Marianna Schmudlach / July 17, 2008 1:01 AM PDT

Secunia Advisory: SA31152
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Unpatched


OS: Blue Coat Director (SGME)

Description:
Blue Coat has acknowledged a vulnerability in Blue Coat Director, which can be exploited by malicious people to poison the DNS cache.

The vulnerability is caused due to the product not sufficiently randomising the DNS transaction ID and the source port number, which can be exploited to poison the DNS cache.

Solution:
Reportedly, this will be fixed in version 4.2.2.4 and 5.2.2.5.

Provided and/or discovered by:
Dan Kaminsky

Original Advisory:
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Collapse -
Blue Coat ProxySG DNS Cache Poisoning Vulnerability
by Marianna Schmudlach / July 17, 2008 1:02 AM PDT

Secunia Advisory: SA31151
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Unpatched


OS: Blue Coat Security Gateway OS (SGOS) 4.x
Blue Coat Security Gateway OS (SGOS) 5.x

Description:
Blue Coat has acknowledged a vulnerability in Blue Coat ProxySG, which can be exploited by malicious people to poison the DNS cache.

The vulnerability is caused due to the product not sufficiently randomising the DNS transaction ID and the source port number, which can be exploited to poison the DNS cache.

Solution:
Reportedly, this will be fixed in version 4.2.8.7 and 5.2.4.3.

Provided and/or discovered by:
Dan Kaminsky

Original Advisory:
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Collapse -
HP Select Identity Active Directory Bidirectional LDAP Conne
by Marianna Schmudlach / July 17, 2008 1:03 AM PDT

Secunia Advisory: SA31148
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Security Bypass

Where: From local network

Solution Status: Vendor Patch


Software: HP Select Identity Active Directory Bidirectional LDAP Connector 2.x

Description:
Some vulnerabilities have been reported in HP Select Identity Active Directory Bidirectional LDAP Connector, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerabilities are caused due to unspecified errors and can be exploited to gain unauthorised access. No further information is available.

The vulnerabilities are reported in versions 2.20, 2.20.001, 2.20.002, and 2.30.

Solution:
Apply patch (see vendor's advisory for details).
http://support.openview.hp.com/selfsolve/patches

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
HPSBMA02346 SSRT080097:
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01502023

Collapse -
HP-UX update for bind
by Marianna Schmudlach / July 17, 2008 1:04 AM PDT

Secunia Advisory: SA31143
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Vendor Patch


OS: HP-UX 11.x

Description:
HP has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

Solution:
Apply patches.

Original Advisory:
HPSBUX02351 SSRT080058:
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01506861

Other References:
SA30973:
http://secunia.com/advisories/30973/

Collapse -
rPath update for httpd
by Marianna Schmudlach / July 17, 2008 1:05 AM PDT

Secunia Advisory: SA31142
Release Date: 2008-07-17


Critical:
Less critical
Impact: Cross Site Scripting

Where: From remote

Solution Status: Vendor Patch


OS: rPath Linux 1.x

Description:
rPath has issued an update for httpd. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

Solution:
Update to:
"httpd=conary.rpath.com@rpl:1/2.0.63-0.3-1"
"mod_ssl=conary.rpath.com@rpl:1/2.0.63-0.3-1"

Original Advisory:
http://lists.rpath.com/pipermail/security-announce/2008-July/000370.html

Other References:
SA28081:
http://secunia.com/advisories/28081/

Collapse -
BlackBerry Unite! PDF Processing Vulnerability
by Marianna Schmudlach / July 17, 2008 1:07 AM PDT

Secunia Advisory: SA31141
Release Date: 2008-07-17


Critical:
Highly critical
Impact: DoS
System access

Where: From remote

Solution Status: Vendor Patch


Software: BlackBerry Unite! 1.x

Description:
A vulnerability has been reported in BlackBerry Unite!, which potentially can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error in the BlackBerry Attachment Service when processing PDF files and can potentially be exploited to execute arbitrary code.

The vulnerability is reported in versions prior to 1.0.1 bundle 36.

Solution:
Update to version 1.0 Service Pack 1 (1.0.1) bundle 36 or later.

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://www.blackberry.com/btsc/articles/635/KB15770_f.SAL_Public.html

Other References:
SA31092:
http://secunia.com/advisories/31092/

Collapse -
Blue Coat PacketShaper and iShaper DNS Cache Poisoning
by Marianna Schmudlach / July 17, 2008 1:08 AM PDT

Secunia Advisory: SA31137
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Unpatched


OS: PacketWise 8.x

Description:
Blue Coat has acknowledged a vulnerability in Blue Coat PacketShaper and iShaper, which can be exploited by malicious people to poison the DNS cache.

The vulnerability is caused due to the products not sufficiently randomising the DNS transaction ID and the source port number, which can be exploited to poison the DNS cache.

Solution:
Reportedly, this will be fixed in upcoming versions.

PacketShaper:
Versions 8.3.2 and 8.4.0.

iShaper:
Version 8.3.2 (in-line plane).

Provided and/or discovered by:
Dan Kaminsky

Original Advisory:
http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning

Collapse -
Citrix XenServer XenAPI HTTP Interface Cross-Site Scripting
by Marianna Schmudlach / July 17, 2008 1:09 AM PDT

Secunia Advisory: SA31133
Release Date: 2008-07-17


Critical:
Less critical
Impact: Cross Site Scripting

Where: From remote

Solution Status: Vendor Patch


Software: Citrix XenServer 4.x

Description:
A vulnerability has been reported in Citrix XenServer, which can be exploited by malicious people to conduct cross-site scripting attacks.

Certain input passed to XenAPI HTTP interfaces is not properly sanitised before being returned to a user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability affects the following versions:
* Citrix XenServer Express, Standard, and Enterprise Edition version 4.1.0
* Citrix XenServer Dell Edition (Express and Enterprise) version 4.1.0
* HP integrated Citrix XenServer (Select and Enterprise) version 4.1.0

Solution:
Apply hotfix (XenServer-4.1.0-hotfix2 (2008-02)) via "Check for Updates" in the XenCenter GUI.

Provided and/or discovered by:
The vendor credits TEPCO.

Original Advisory:
CTX117814:
http://support.citrix.com/article/CTX117814

Collapse -
Mozilla Firefox 3 on Mac OS X GIF File Handling Code Executi
by Marianna Schmudlach / July 17, 2008 1:10 AM PDT

Secunia Advisory: SA31132
Release Date: 2008-07-17


Critical:
Highly critical
Impact: System access

Where: From remote

Solution Status: Vendor Patch


OS: Apple Macintosh OS X



Software: Mozilla Firefox 3.x

Description:
A vulnerability has been reported in Firefox 3 on Mac OS X, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error in the Mozilla graphics code on Mac OS X. This can be exploited to free an uninitialised pointer via a specially crafted GIF file.

Successful exploitation may allow execution of arbitrary code.

Solution:
Update to version 3.0.1.
http://www.mozilla.com/en-US/firefox/

Provided and/or discovered by:
The vendor credits Drew Yao of Apple Product Security.

Original Advisory:
MFSA 2008-36:
http://www.mozilla.org/security/announce/2008/mfsa2008-36.html

Collapse -
Debian update for afuse
by Marianna Schmudlach / July 17, 2008 1:12 AM PDT

Secunia Advisory: SA31131
Release Date: 2008-07-17


Critical:
Less critical
Impact: Privilege escalation

Where: Local system

Solution Status: Vendor Patch


OS: Debian GNU/Linux 4.0
Debian GNU/Linux unstable alias sid

Description:
Debian has issued an update for afuse. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

Original Advisory:
http://lists.debian.org/debian-security-announce/2008/msg00194.html

Other References:
SA31086:
http://secunia.com/advisories/31086/

Collapse -
PHPizabi "writeLogEntry()" Arbitrary PHP Code Execution
by Marianna Schmudlach / July 17, 2008 1:13 AM PDT

Secunia Advisory: SA31127
Release Date: 2008-07-17


Critical:
Highly critical
Impact: System access

Where: From remote

Solution Status: Unpatched


Software: PHPizabi 0.x

Description:
inphex has discovered a vulnerability in PHPizabi, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error within the "writeLogEntry()" function in system/v_cron_proc.php. This can be exploited to write arbitrary data to arbitrary files via the CONF[CRON_LOGFILE] and CONF[LOCALE_LONG_DATE_TIME] parameters.

Successful exploitation allows execution of arbitrary PHP code, but requires that "register_globals" is enabled.

The vulnerability is confirmed in version 0.848b C1 HFP3 SF1. Other versions may also be affected.

Solution:
Set "register_globals" to Off.

Restrict access to the the system/v_cron_proc.php script (e.g. via ".htaccess").

Provided and/or discovered by:
inphex

Original Advisory:
http://milw0rm.com/exploits/6085

Collapse -
Joomla DT Register Component "eventId" SQL Injection
by Marianna Schmudlach / July 17, 2008 1:14 AM PDT

Secunia Advisory: SA31126
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Manipulation of data
Exposure of sensitive information

Where: From remote

Solution Status: Unpatched


Software: DT Register 2.x (component for Joomla)

Description:
His0k4 has reported a vulnerability in the DT Register component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "eventId" parameter in the Joomla! installation's index.php script (when "option" is set to "com_dtregister" and "task" to "pay_options") is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation allows e.g. retrieval of administrator usernames and password hashes, but requires knowledge of the database table prefix.

The vulnerability is reported in version 2.2.3. Other versions may also be affected.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
His0k4

Original Advisory:
http://milw0rm.com/exploits/6086

Collapse -
Red Hat update for php
by Marianna Schmudlach / July 17, 2008 1:15 AM PDT

Secunia Advisory: SA31124
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Security Bypass
DoS
System access

Where: From remote

Solution Status: Vendor Patch


OS: RedHat Enterprise Linux AS 2.1
RedHat Enterprise Linux ES 2.1
RedHat Enterprise Linux WS 2.1
RedHat Linux Advanced Workstation 2.1 for Itanium

Description:
Red Hat has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, and by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

Solution:
Updated packages are available via Red Hat Network.
http://rhn.redhat.com

Original Advisory:
http://rhn.redhat.com/errata/RHSA-2008-0546.html

Other References:
SA27543:
http://secunia.com/advisories/27543/

SA27582:
http://secunia.com/advisories/27582/

SA30048:
http://secunia.com/advisories/30048/

Collapse -
F-Prot Antivirus Multiple Denial of Service Vulnerabilities
by Marianna Schmudlach / July 17, 2008 1:16 AM PDT

Secunia Advisory: SA31118
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: DoS

Where: From remote

Solution Status: Vendor Patch


Software: F-Prot Antivirus for Windows 6.x

Description:
Some vulnerabilities have been reported in F-Prot Antivirus, which can be exploited by malicious people to cause a DoS (Denial of Service).

Solution:
Update to the latest product/engine versions.
http://www.f-prot.com/download/

Provided and/or discovered by:
1) Sergio Alvarez of n.runs AG

Original Advisory:
FRISK:
http://www.f-prot.com/download/ReleaseNotesWindows.txt

n.runs:
http://www.nruns.com/security_advisory_fprot_out-of-bound_memory_access_DoS.php

Collapse -
CGI::Session "File" Driver "CGISESSID" Directory Traversal
by Marianna Schmudlach / July 17, 2008 1:17 AM PDT

Secunia Advisory: SA31117
Release Date: 2008-07-17


Critical:
Less critical
Impact: Security Bypass

Where: From remote

Solution Status: Vendor Patch


Software: CGI::Session 3.x
CGI::Session 4.x

Description:
Tan Chew Keong has reported a vulnerability in CGI::Session, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an input validation error in the "File" driver when handling the "CGISESSID" cookie value. This can be exploited to cause the "File" driver to read session data from arbitrary files outside of the session data directory via directory traversal sequences.

Successful exploitation requires that the target application using CGI::Session is on Windows and that an attacker is able to place a file containing valid session data on a known location on the target system.

The vulnerability is reported in version 3.94, 3.95, and 4.33. Other versions may also be affected.

Solution:
Update to version 4.34.
http://search.cpan.org/~markstos/CGI-Session-4.34/

Provided and/or discovered by:
Tan Chew Keong

Original Advisory:
http://vuln.sg/cgisession433-en.html

Collapse -
Claroline Unspecified Vulnerabilities
by Marianna Schmudlach / July 17, 2008 1:18 AM PDT

Secunia Advisory: SA31116
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Unknown

Where: From remote

Solution Status: Vendor Patch


Software: Claroline 1.x

Description:
Some vulnerabilities with an unknown impact have been reported in Claroline.

The vulnerabilities are caused due to unknown errors. No further information is currently available.

The vulnerabilities are reported in version 1.8.9. Prior versions may also be affected.

Solution:
Update to version 1.8.10.

Provided and/or discovered by:
The vendor credits Digital Security Research Group.

Original Advisory:
http://sourceforge.net/project/shownotes.php?release_id=613634

Collapse -
FreeStyle Wiki CGI::Session "File" Driver "CGISESSID" Direct
by Marianna Schmudlach / July 17, 2008 1:20 AM PDT

Secunia Advisory: SA31114
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Security Bypass

Where: From remote

Solution Status: Vendor Patch


Software: FreeStyle Wiki 3.x

Description:
Tan Chew Keong has reported a vulnerability in FreeStyle Wiki, which can be exploited by malicious people to bypass certain security restrictions.

Solution:
Apply patch.
http://fswiki.org/wiki.pl?page=%CD%FA%CE%F2%2F2008%2D7%2D16

Provided and/or discovered by:
Tan Chew Keong

Original Advisory:
http://vuln.sg/fswiki362session-en.html

Other References:
SA31117:
http://secunia.com/advisories/31117/

Collapse -
AlstraSoft Affiliate Network Pro "pgm" SQL Injection Vulnera
by Marianna Schmudlach / July 17, 2008 1:21 AM PDT

Secunia Advisory: SA31112
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Manipulation of data

Where: From remote

Solution Status: Unpatched


Software: AlstraSoft Affiliate Network Pro 7.x
AlstraSoft Affiliate Network Pro 8.x



Description:
Hussin X has reported a vulnerability in AlstraSoft Affiliate Network Pro, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "pgm" parameter in index.php (when "Act" is set to "directory") is not properly sanitised before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
Hussin X

Original Advisory:
http://milw0rm.com/exploits/6087

Collapse -
BlackBerry Enterprise Server PDF Processing Vulnerability
by Marianna Schmudlach / July 17, 2008 1:22 AM PDT

Secunia Advisory: SA31092
Release Date: 2008-07-17


Critical:
Highly critical
Impact: DoS
System access

Where: From remote

Solution Status: Unpatched


Software: BlackBerry Enterprise Server for Domino 4.x
BlackBerry Enterprise Server for Exchange 4.x
BlackBerry Enterprise Server for Novell GroupWise 4.x

Description:
A vulnerability has been reported in BlackBerry Enterprise Server, which potentially can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an unspecified error in the BlackBerry Attachment Service when processing PDF files. This can be exploited to potentially execute arbitrary code on the vulnerable system via an email containing a specially crafted PDF.

Successful exploitation requires that a BlackBerry smartphone user views the specially crafted PDF file.

The vulnerability is reported in versions 4.1 Service Pack 3 (4.1.3) through 4.1 Service Pack 5 (4.1.5). Other versions may also be affected.

Solution:
Disable the processing of PDF files in the BlackBerry Attachment Service. Please see vendor's advisory for more details.

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://www.blackberry.com/btsc/articles/660/KB15766_f.SAL_Public.html

Collapse -
BilboBlog Multiple Vulnerabilities
by Marianna Schmudlach / July 17, 2008 1:23 AM PDT

Secunia Advisory: SA31054
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Security Bypass
Cross Site Scripting
Manipulation of data

Where: From remote

Solution Status: Unpatched


Software: BilboBlog 0.x

Description:
Black_H has discovered some vulnerabilities in BilboBlog, which can be exploited by malicious users to conduct script insertion and SQL injection attacks, and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

Solution:
Edit the source code to ensure that input is properly sanitised. Set "register_globals" to "Off" and "magic_quotes_gpc" to "On" in php.ini. Restrict access to the admin/login.php script (e.g. with ".htaccess").

Use another product.

Provided and/or discovered by:
Black_H

Original Advisory:
http://milw0rm.com/exploits/6073

Collapse -
MyBB Multiple Vulnerabilities
by Marianna Schmudlach / July 17, 2008 1:24 AM PDT

Secunia Advisory: SA31013
Release Date: 2008-07-17


Critical:
Moderately critical
Impact: Unknown

Where: From remote

Solution Status: Vendor Patch


Software: MyBB (formerly MyBulletinBoard) 1.x



Description:
Some vulnerabilities with unknown impacts have been reported in MyBB.

The vulnerabilities are caused due to unspecified errors within portal.php, inc/functions_post.php, inc/datahandler/user.php, and inc/class_language.php.

The vulnerabilities are reported in versions prior to 1.2.13.

Solution:
Update to version 1.2.13 or apply patch.

Provided and/or discovered by:
The vendor credits ostro.

Original Advisory:
http://community.mybboard.net/showthread.php?tid=31666

Collapse -
Simple Machines Forum "HTML-Tag" Vulnerability
by Marianna Schmudlach / July 17, 2008 1:26 AM PDT

Secunia Advisory: SA30955
Release Date: 2008-07-17


Critical:
Less critical
Impact: Unknown

Where: From remote

Solution Status: Vendor Patch


Software: Simple Machines Forum 1.x

Description:
A vulnerability with an unknown impact has been reported in Simple Machines Forum.

The vulnerability is caused due to an unspecified error within "the use of the html-tag".

Note: This also fixes an issue related to the random number generator seeding with PHP versions prior to 4.2.0.

The vulnerability is reported in versions prior to 1.0.13 and 1.1.5.

Solution:
Update to version 1.0.13 or 1.1.5.

Provided and/or discovered by:
The vendor credits Jessica Hope.

Original Advisory:
http://www.simplemachines.org/community/index.php?topic=236816.0

Collapse -
Firefox sweeps away carpet bombing bug
by Marianna Schmudlach / July 17, 2008 1:30 AM PDT

Updates fix several vulns
By John Leyden
Published Thursday 17th July 2008

Mozilla has plugged two critical security holes in versions 2 and 3 of Firefox.

Version 2.0.0.16 fixes a code injection risk involving vulnerabilities in its CSS reference counter, and a flaw in handling command-line URLs that means multiple tabs can be launched when Firefox is not running. The first flaw also affects the Thunderbird email clients when JavaScript is enabled for email reading. Such a set-up is generally a bad idea.

The second flaw allows multiple tabs to be launched in Firefox even when it's not open. This is an attack vector for the Mozilla side of a blended threat ariseing when Apple's Safari browser is installed on the same systems as either Internet Explorer or Firefox. Dubbed the "carpet bombing" bug, this was disclosed by independent researcher Billy Rios in May and patched by Apple - after some foot-dragging - in June.

More: http://www.theregister.co.uk/2008/07/17/firefox_updates/

Collapse -
Vista, Word and Google Desktop circumvent TrueCrypt function
by Marianna Schmudlach / July 17, 2008 1:33 AM PDT

17 July 2008

Cryptography expert Bruce Schneier, in conjunction with a research group, has studied the security of TrueCrypt, to see whether it meets the specifications for a 'Deniable File System' (DFS) ? implemented in TrueCrypt as hidden volumes ? and is really able to conceal the existence of a volume within a standard system environment.

Hidden volumes are intended to conceal even the existence of encrypted files. It allows a PC owner to deny having specific encrypted data on his PC. Even where a suspect in a police investigation reveals the key to an outer container in order to avoid a jail term, he or she can still deny the existence of a concealed inner container. This is known as deniable encryption. For the authorities, the only solution to this would be to make the private use of encryption itself illegal.

More: http://www.heise-online.co.uk/security/Vista-Word-and-Google-Desktop-circumvent-TrueCrypt-function--/news/111118

Collapse -
Facebook fixes data leak
by Marianna Schmudlach / July 17, 2008 1:34 AM PDT

Earlier this week, social networking website Facebook was forced to plug a data leak which allowed members' dates of birth to be viewed. According to Facebook, the problem only occurred for a short period for a restricted group of users during public beta testing of new profile pages. This period was obviously long enough for anti-virus specialists Sophos to stumble upon it and inform Facebook. Graham Cluley gives further details on the problem and has posted a video on the Sophos blog.

More: http://www.heise-online.co.uk/security/Facebook-fixes-data-leak--/news/111117

Collapse -
Firefox Releases 3.0.1 and fixes 3 security vulnerabilities
by Marianna Schmudlach / July 17, 2008 1:36 AM PDT

Published: 2008-07-17,
Last Updated: 2008-07-17 14:55:04 UTC
by Mari Kirby Nichols (Version: 1)

A security advisory released yesterday by Mozilla fixes the following issues and more:

MFSA 2008-36 Crash with malformed GIF file on Mac OS X. Where a specially crafted GIF file caused the browser to free an uninitialized pointer. This can crash the browser and allow arbitrary code execution on the victim?s computer.

More: http://isc.sans.org/

Collapse -
Microsoft Updates 2 DirectX Bulletins
by Marianna Schmudlach / July 17, 2008 4:25 AM PDT

Published: 2008-07-17,
Last Updated: 2008-07-17 17:45:21 UTC
by Mari Kirby Nichols

Microsoft has issued a "Security Bulletin Major Revision" involving its DirectX products. These revisions include the following two previously released bulletins and particularly affect administrative users as the resulting compromise allows the attacker to gain user rights.

MS08-033 Vulnerabilities in DirectX Could Allow Remote Code Execution (951698) is rated as critical and states that DirectX 9.0 was added as affected software. This vulnerability can be exploited through a specially crafted media file.

MS07-064 Vulnerabilities in DirectX Could Allow Remote Code Execution (941568) is also rated critical and has been updated to reflect DirectX 9.0 and 9.0a as affected software. This vulnerability can be exploited through a specially crafted media file via streaming.

More: http://isc.sans.org/

Collapse -
Adobe Reader 9 Released
by Marianna Schmudlach / July 17, 2008 4:26 AM PDT

Published: 2008-07-17,
Last Updated: 2008-07-17 15:42:46 UTC
by Mari Kirby Nichols

One of our readers, Steve, let us know that the Adobe website has Version 9 of Reader available for download. Be sure to notice that they kindly offer a "Free eBay Desktop" is checked by default and it is a 33.5MB download.

More: http://isc.sans.org/

Collapse -
Microsoft Outlook Web Access XSS (MS08-039)
by Marianna Schmudlach / July 17, 2008 4:28 AM PDT

Summary
Several Cross Site Scripting vulnerabilities were found in within Outlook Web Access (OWA) 2003/2007. An attacker can craft a malicious email which will trigger within a user's browser. Different version of OWA and different clients (Light and Premium) have different attack vectors which can result in an attacker gaining *persistent* control over a victim's use of Outlook Web Access. An attacker would have full control and access to the victims e-mail account. This control could be further abused by utilising techniques such as JavaScript root-kits or web worms.

Credit:
The information has been provided by Context IS - Disclosure.

http://www.securiteam.com/windowsntfocus/5UP0G20OUE.html

Collapse -
Oracle Database Local Untrusted Library Path Vulnerability
by Marianna Schmudlach / July 17, 2008 4:29 AM PDT

Summary
Oracle Database Server is "a family of database products that range from personal databases to enterprise solutions". Local exploitation of an untrusted library path vulnerability in Oracle Corp.'s Oracle Database product allows attackers to gain elevated privileges.

Credit:
The information has been provided by iDefense Labs Security Advisories.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=727


http://www.securiteam.com/unixfocus/5PP0B20OUY.html

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

HOLIDAY GIFT GUIDE 2017

Cameras that make great holiday gifts

Let them start the new year with a step up in photo and video quality from a phone.