Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES \ FIXES - March 25, 2009

by Marianna Schmudlach / March 25, 2009 12:49 AM PDT

phpMyAdmin File Inclusion and HTTP Response Splitting

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: Cross Site Scripting
Exposure of system information
Exposure of sensitive information
Where: From remote
Solution Status: Vendor Patch

Software: phpMyAdmin 3.x

Description:
Some vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct HTTP response splitting attacks or disclose sensitive information.

http://secunia.com/advisories/34468/

Discussion is locked
You are posting a reply to: VULNERABILITIES \ FIXES - March 25, 2009
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES \ FIXES - March 25, 2009
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Gentoo update for Squid
by Marianna Schmudlach / March 25, 2009 12:50 AM PDT

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch

OS: Gentoo Linux 1.x


Description:
Gentoo has issued an update for Squid. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

http://secunia.com/advisories/34467/

Collapse -
Slackware update for mozilla-thunderbird
by Marianna Schmudlach / March 25, 2009 12:51 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: DoS
System access
Spoofing
Where: From remote
Solution Status: Vendor Patch

OS: Slackware Linux 11.0

Description:
Slackware has issued an update for for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct spoofing attacks, or potentially compromise a user's system.

http://secunia.com/advisories/34464/

Collapse -
Slackware update for lcms
by Marianna Schmudlach / March 25, 2009 12:52 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: System access
DoS
Where: From remote
Solution Status: Vendor Patch

OS: Slackware Linux 10.0
Slackware Linux 11.0

Description:
Slackware has issued an update for lcms. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

http://secunia.com/advisories/34463/

Collapse -
Slackware update for seamonkey
by Marianna Schmudlach / March 25, 2009 12:53 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: Spoofing
DoS
System access
Where: From remote
Solution Status: Vendor Patch

OS: Slackware Linux 11.0

Description:
Slackware has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct spoofing attacks, or to potentially compromise a user's system.

http://secunia.com/advisories/34462/

Collapse -
Jinzora "name" Local File Inclusion Vulnerability
by Marianna Schmudlach / March 25, 2009 12:54 AM PDT

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: Exposure of system information
Exposure of sensitive information
Where: From remote
Solution Status: Unpatched

Software: Jinzora 2.x

Description:
A vulnerability has been discovered in Jinzora, which can be exploited by malicious people to disclose sensitive information.

Input passed to the "name" parameter in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.

Successful exploitation requires that "magic_quotes_gpc" is disabled.

The vulnerability is confirmed in version 2.8. Other versions may also be affected.

http://secunia.com/advisories/34448/

Collapse -
Media Entertainment Script "id" SQL Injection Vulnerability
by Marianna Schmudlach / March 25, 2009 12:55 AM PDT

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: Manipulation of data
Where: From remote
Solution Status: Unpatched

Software: Media Entertainment Script

Description:
A vulnerability has been discovered in Media Entertainment Script, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "id" parameter in view.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

http://secunia.com/advisories/34431/

Collapse -
phpMyAdmin Cross-Site Scripting Vulnerability
by Marianna Schmudlach / March 25, 2009 12:56 AM PDT

Release Date: 2009-03-25

Critical:
Not critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch

Software: phpMyAdmin 2.x
phpMyAdmin 3.x

Description:
A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed via export page cookies is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.

The vulnerability is reported in versions prior to 2.11.9.5 and 3.1.3.1.

http://secunia.com/advisories/34430/

Collapse -
ldns "ldns_rr_new_frm_str_internal()" Buffer Overflow Vulner
by Marianna Schmudlach / March 25, 2009 12:58 AM PDT

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: DoS
System access
Where: From remote
Solution Status: Vendor Patch

Software: ldns 1.x

Description:
A vulnerability has been reported in ldns, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

The vulnerability is caused due to a boundary error within the "ldns_rr_new_from_str_internal()" function in rr.c. This can be exploited to cause a heap-based buffer overflow by e.g. processing specially crafted DNS Resource Records.

The vulnerability is reported in versions prior to 1.5.0.

http://secunia.com/advisories/34426/

Collapse -
HP-UX "VRTSvxfs" and "VRTSodm" Privilege Escalation Vulnerab
by Marianna Schmudlach / March 25, 2009 12:59 AM PDT

Release Date: 2009-03-25

Critical:
Less critical
Impact: Privilege escalation
Where: Local system
Solution Status: Vendor Patch

OS: HP-UX 11.x


Description:
A vulnerability has been reported in HP-UX, which can be exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to unspecified errors in the VERITAS File System ("VRTSvxfs") and VERITAS Oracle Disk Manager ("VRTSodm") packages and can be exploited to perform certain actions with escalated privileges.

The vulnerability in the following products and versions:
* HP-UX B.11.11 running VRTSodm version 3.5
* HP-UX B.11.23 running VRTSodm version 4.1 or VRTSvxfs version 4.1
* HP-UX B.11.23 running VRTSodm version 5.0 or VRTSvxfs version 5.0
* HP-UX B.11.31 running VRTSodm version 5.0

http://secunia.com/advisories/34419/

Collapse -
SUSE Update for Multiple Packages
by Marianna Schmudlach / March 25, 2009 1:00 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: Unknown
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
DoS
System access
Where: From remote
Solution Status: Vendor Patch

OS: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SUSE Linux Enterprise Server 10
SUSE Linux Enterprise Server 9

Description:
SUSE has issued an update for multiple packages. This fixes some security issues and vulnerabilities, where one has unknown impacts and others can be exploited by malicious, local users to bypass certain security restrictions, and by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and cross-site request-forgery attacks, conduct script insertion attacks, manipulate data, cause a DoS (Denial of Service), and compromise a vulnerable system.

http://secunia.com/advisories/34418/

Collapse -
Red Hat update for thunderbird
by Marianna Schmudlach / March 25, 2009 1:01 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: Exposure of sensitive information
System access
Where: From remote
Solution Status: Vendor Patch

OS: Red Hat Enterprise Linux Desktop (v. 5 client)
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux WS 4

Software: RHEL Optional Productivity Applications (v. 5 server)

Description:
Red Hat has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information or potentially compromise a user's system.

http://secunia.com/advisories/34417/

Collapse -
Red Hat update for glib2
by Marianna Schmudlach / March 25, 2009 1:02 AM PDT

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

OS: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)

Description:
Red Hat has issued an update for glib2. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise an application using the library.

http://secunia.com/advisories/34416/

Collapse -
PHPizabi File Inclusion and SQL Injection Vulnerabilities
by Marianna Schmudlach / March 25, 2009 1:03 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: Manipulation of data
Exposure of system information
Exposure of sensitive information
System access
Where: From remote
Solution Status: Unpatched

Software: PHPizabi 0.x

Description:
Some vulnerabilities have been discovered in PHPizabi, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information, or compromise a vulnerable system.

http://secunia.com/advisories/34396/

Collapse -
Hannon Hill Cascade Server Command Execution Vulnerability
by Marianna Schmudlach / March 25, 2009 1:04 AM PDT

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: System access
Where: From remote
Solution Status: Unpatched

Software: Hannon Hill Cascade Server 5.x

Description:
A vulnerability has been reported in Hannon Hill Cascade Server, which can be exploited by malicious users to compromise a vulnerable system.

The vulnerability is caused due to an error in the processing of XSLT stylesheets, which can be exploited to execute arbitrary Java code via a specially crafted stylesheet.

Successful exploitation requires privileges to edit XSLT stylesheets.

http://secunia.com/advisories/34389/

Collapse -
cPanel File Manager Script Insertion Vulnerabilities
by Marianna Schmudlach / March 25, 2009 1:05 AM PDT

Release Date: 2009-03-25

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Unpatched

Software: cPanel 11.x

Description:
Some vulnerabilities have been reported in cPanel, which can be exploited by malicious users to conduct script insertion attacks.

Input passed via the file name in the standard and legacy file managers is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in the context of an affected site when the malicious file name is viewed.

The vulnerabilities are reported in version 11.24.4-CURRENT. Other versions may also be affected.

http://secunia.com/advisories/34342/

Collapse -
Autonomy KeyView Word Perfect File Parsing Buffer Overflow V
by Marianna Schmudlach / March 25, 2009 1:08 AM PDT

Summary
Autonomy KeyView SDK is "a commercial SDK that provides many file format parsing libraries. It supports a large number of different document formats, one of which is the Word Perfect Document (WPD) format. It is used by several popular vendors for processing documents". Remote exploitation of a stack-based buffer overflow in Autonomy Inc's KeyView SDK allows attackers to execute arbitrary code with the privileges of the current user.

Credit:
The information has been provided by iDefense Labs Security Advisories.

http://www.securiteam.com/windowsntfocus/5WP0M15QKO.html

Collapse -
Critical holes in HP OpenView NetworkManager
by Marianna Schmudlach / March 25, 2009 2:10 AM PDT

25 March 2009

Security experts have discovered critical vulnerabilities in Hewlett Packard's OpenView NetworkManager IT software. Due to buffer overflows, remote attackers can potentially take full control of systems that run a vulnerable version of the software. HP says that versions 7.01, 7.51 and 7.53 are affected.

The vendor has confirmed the problems discovered by Core Security security specialists and has released an advisory about the issue. Patches can be downloaded to fix the problem. HP recommends that the admins of affected systems act immediately and update their vulnerable systems.

See also:

http://www.h-online.com/security/Critical-holes-in-HP-OpenView-NetworkManager--/news/112925

Collapse -
Adobe fixes critical vulnerability in Unix versions of Acrob
by Marianna Schmudlach / March 25, 2009 2:11 AM PDT

Adobe fixes critical vulnerability in Unix versions of Acrobat and Reader

25 March 2009

Adobe has released the Adobe Reader and Acrobat 8.1.4 and 9.1 updates for Unix to fix a previously reported critical vulnerability. The vulnerability allowed malicious code to be injected and executed with the users permissions by using a specially crafted PDF file. According to the updated security bulletin, the updates also address an additional JBIG2 input validation issue that could possibly lead to remote code execution.

Adobe has already released updates for the Windows and Mac versions of Acrobat and Reader to address recent critical vulnerabilities. The 9.1 update for Windows and Mac was released during the second week of March. One week later, the 8.1.4 and 7.1.1 updates were also released.

http://www.h-online.com/security/Adobe-fixes-critical-vulnerability-in-Unix-versions-of-Acrobat-and-Reader--/news/112924

Collapse -
Facebook fights back against fraud tide
by Marianna Schmudlach / March 25, 2009 2:28 AM PDT

25 March 2009

By Jeremy Kirk, IDG News Service

Facebook is shoring up its security protection procedures as the social-networking site comes under attacks from spammers, data thieves and other tricksters, the company's chief privacy officer has said.

Advertisement

Facebook, which has about 100 million daily visitors and about 175 million registered users, has come under scrutiny over how it manages user data as well as how it lets users control who sees their own data. That aggregation of data, as well as high numbers of visitors, makes the site attractive to miscreants and cybercriminals.

"Obviously, we've become a very large target for people trying to hack the site, trying to spam people on the site," said Chris Kelly, who is also the company's head of global public policy, during a presentation at the E-crime Congress in London on Tuesday. "In those rare occasions where these attempts get through, we learn very quickly."

More: http://www.techworld.com/security/news/index.cfm?RSS&NewsID=113331

Collapse -
Kerberos "spnego_gss_accept_sec_context()" Denial of Service
by Marianna Schmudlach / March 25, 2009 6:40 AM PDT

Release Date: 2009-03-25

Critical:
Less critical
Impact: DoS
Where: From remote
Solution Status: Vendor Workaround

Software: Kerberos 5.x

Description:
A vulnerability has been reported in Kerberos 5, which can be exploited by malicious users to cause a DoS (Denial of Service).

The vulnerability is caused due to a NULL pointer dereference error in the "spnego_gss_accept_sec_context()" function in "src/lib/gssapi/spnego/spnego_mech.c". This can be exploited to e.g. crash the daemon by sending a "NegTokenInit" token with specially crafted ContextFlags.

The vulnerability is reported in version 1.6.3. Other versions may also be affected.

http://secunia.com/advisories/34347/

Collapse -
eXeScope Input File processing Buffer Overflow Vulnerability
by Marianna Schmudlach / March 25, 2009 6:42 AM PDT

Release Date: 2009-03-25

Critical:
Less critical
Impact: System access
Where: From remote
Solution Status: Unpatched

Software: eXeScope 6.x

Description:
A vulnerability has been discovered in eXeScope, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the application not properly handling input files. This can be exploited to cause a buffer overflow via a specially crafted input file (e.g. *.exe, *.dll, *.ocx, or *.vbx).

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in version 6.50. Other versions may also be affected.


http://secunia.com/advisories/34413/

Collapse -
e107 Cross-Site Request Forgery and Script Insertion
by Marianna Schmudlach / March 25, 2009 6:43 AM PDT

Release Date: 2009-03-25

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Unpatched

Software: e107 0.x

Description:
Some vulnerabilities have been discovered in e107, which can be exploited by malicious people to conduct cross-site request forgery attacks and malicious users to conduct script insertion attacks.

http://secunia.com/advisories/34169/

Collapse -
OpenSSL Multiple Vulnerabilities
by Marianna Schmudlach / March 25, 2009 6:44 AM PDT

Release Date: 2009-03-25

Critical:
Moderately critical
Impact: Security Bypass
DoS
Where: From remote
Solution Status: Vendor Patch

Software: OpenSSL 0.9.x

Description:
Some vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

http://secunia.com/advisories/34411/

Collapse -
Red Hat update for NetworkManager
by Marianna Schmudlach / March 25, 2009 8:31 AM PDT

Release Date: 2009-03-25

Critical:
Not critical
Impact: Manipulation of data
Exposure of sensitive information
Where: Local system
Solution Status: Vendor Patch

OS: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)

Description:
Red Hat has issued an update for NetworkManager. This fixes some security issues, which can be exploited by malicious, local users to manipulate certain data and disclose potentially sensitive information.

http://secunia.com/advisories/34473/

Collapse -
IBM Access Support ActiveX Control "GetXMLValue()" Buffer Ov
by Marianna Schmudlach / March 25, 2009 8:33 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: System access
Where: From remote
Solution Status: Unpatched

Software: IBM Access Support ActiveX Control (eGatherer) 2.x
IBM Access Support ActiveX Control (eGatherer) 3.x

Description:
A vulnerability has been reported in IBM Access Support ActiveX Control, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error in the ActiveX control (IbmEgath.dll) when parsing input to the "GetXMLValue()" method. This can be exploited to cause a stack-based buffer overflow via an overly long argument.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is reported in version 3.20.284.0. Other versions may also be affected.

http://secunia.com/advisories/34470/

Collapse -
Red Hat update for acroread
by Marianna Schmudlach / March 25, 2009 11:13 AM PDT

Release Date: 2009-03-25

Critical:
Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

Software: Red Hat Enterprise Linux Extras v. 3
Red Hat Enterprise Linux Extras v. 4
RHEL Desktop Supplementary (v. 5 client)
RHEL Supplementary (v. 5 server)

Description:
Red Hat has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

http://secunia.com/advisories/34392/

Collapse -
PSCS VPOP3 Email Server Cross-Site Scripting Vulnerabilities
by Marianna Schmudlach / March 25, 2009 11:14 AM PDT

Release Date: 2009-03-25

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Unpatched

Software: PSCS VPOP3 Email Server 2.x

Description:
Some vulnerabilities have been discovered in PSCS VPOP3 Email Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to the "sess_folder" parameter in homeplus.html and to the "reason" parameter in index.html is not properly sanitised before being used. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerabilities are confirmed in version 2.6.0j Standard and reported in version 2.6.0j Enterprise. Other versions may also be affected.

http://secunia.com/advisories/34270/

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

CNET FORUMS TOP DISCUSSION

Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?