Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES \ FIXES - March 5, 2009

by Marianna Schmudlach / March 4, 2009 11:14 PM PST

TYPO3 Flat Manager Extension SQL Injection Vulnerability

Release Date: 2009-03-05

Critical:
Moderately critical
Impact: Manipulation of data
Where: From remote
Solution Status: Vendor Patch

Software: Flat Manager (flatmgr) Extension for TYPO3 1.x

Description:
A vulnerability has been reported in the Flat Manager (flatmgr) extension for TYPO3, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to an unspecified parameter is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in versions prior to 1.9.16.

http://secunia.com/advisories/34158/

Discussion is locked
You are posting a reply to: VULNERABILITIES \ FIXES - March 5, 2009
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES \ FIXES - March 5, 2009
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
IBM DB2 Denial of Service Vulnerabilities
by Marianna Schmudlach / March 4, 2009 11:15 PM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: DoS
Where: From local network
Solution Status: Vendor Patch

Software: IBM DB2 Universal Database 8.x

Description:
Some vulnerabilities have been reported in IBM DB2, which can be exploited by malicious users or malicious people to cause a DoS (Denial of Service).

http://secunia.com/advisories/34156/

Collapse -
TYPO3 Calendar Base Extension Search Cross-Site Scripting
by Marianna Schmudlach / March 4, 2009 11:16 PM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch

Software: Calendar Base (cal) Extension for TYPO3 1.x

Description:
A vulnerability has been reported in the Calendar Base (cal) extension for TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to search parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.

The vulnerability is reported in versions prior to 1.1.1.


http://secunia.com/advisories/34155/

Collapse -
Red Hat update for libpng
by Marianna Schmudlach / March 4, 2009 11:17 PM PST

Release Date: 2009-03-0

Critical:
Moderately critical
Impact: Exposure of sensitive information
DoS
System access
Where: From remote
Solution Status: Vendor Patch

OS: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)
RedHat Enterprise Linux AS 2.1
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux ES 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux WS 4

Description:
Red Hat has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise an application using the library.


http://secunia.com/advisories/34152/

Collapse -
Big Faceless Report Generator PDF Library Unspecified Vulner
by Marianna Schmudlach / March 4, 2009 11:18 PM PST

Release Date: 2009-03-05


Critical:
Moderately critical
Impact: Unknown
Where: From remote
Solution Status: Vendor Patch

Software: Big Faceless Report Generator 1.x

Description:
A vulnerability with an unknown impact has been reported in Big Faceless Report Generator.

The vulnerability is caused due to an error in the included Big Faceless PDF library and can be exploited when completing forms in malicious PDF documents.

http://secunia.com/advisories/34151/

Collapse -
Big Faceless PDF Library Unspecified JavaScript Vulnerabilit
by Marianna Schmudlach / March 4, 2009 11:19 PM PST

Release Date: 2009-03-05

Critical:
Moderately critical
Impact: Unknown
Where: From remote
Solution Status: Vendor Patch

Software: Big Faceless PDF Library 2.x

Description:
A vulnerability with an unknown impact has been reported in Big Faceless PDF Library.

The vulnerability is caused due to unspecified error when processing JavaScript. No additional information is currently available.

The vulnerability is reported in versions prior to 2.11.4.

http://secunia.com/advisories/34150/

Collapse -
Sun Management Center Performance Reporting Module Cross-Sit
by Marianna Schmudlach / March 4, 2009 11:20 PM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch

Software: Sun Management Center (SunMC) 3.x
Sun Management Center (SunMC) 4.x

Description:
A vulnerability has been reported in Sun Management Center (SunMC), which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed via unspecified parameters to the Performance Reporting Module is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.


http://secunia.com/advisories/34146/

Collapse -
Mozilla Firefox Multiple Vulnerabilities
by Marianna Schmudlach / March 4, 2009 11:21 PM PST

Release Date: 2009-03-05

ritical:
Highly critical
Impact: Security Bypass
Spoofing
Exposure of sensitive information
System access
Where: From remote
Solution Status: Vendor Patch

Software: Mozilla Firefox 3.x

Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, or compromise a user's system.

http://secunia.com/advisories/34145/

Collapse -
Firefox 3.0.7 fixes vulnerabilities
by Marianna Schmudlach / March 4, 2009 11:35 PM PST

5 March 2009

Mozilla has released Firefox 3.0.7, fixing three critical security vulnerabilities in the open source web browser. The release fixes several memory safety hazards found in the PNG libraries which could be used by a malicious website to crash a users browser and possibly execute arbitrary code. The upgraded libpng in version 3.0.7 fixes these flaws.

A vulnerability in Mozilla's garbage collection process, caused by improper memory management of a set of cloned XUL DOM elements which were linked as parent and child, has been fixed. The browser would crash after reloading a page with such linked elements, as it attempted to access an object that was already destroyed. An attacker could use this crash to run arbitrary code on the victim's computer.

More: http://www.h-online.com/security/Firefox-3-0-7-fixes-vulnerabilities--/news/112775

Collapse -
Red Hat update for wireshark
by Marianna Schmudlach / March 4, 2009 11:21 PM PST

Release Date: 2009-03-05

Critical:
Moderately critical
Impact: DoS
System access
Where: From remote
Solution Status: Vendor Patch

OS: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)
RedHat Enterprise Linux AS 3
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 4

Description:
Red Hat has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.

http://secunia.com/advisories/34144/

Collapse -
Red Hat update for libpng
by Marianna Schmudlach / March 4, 2009 11:22 PM PST

Release Date: 2009-03-05

Critical:
Moderately critical
Impact: DoS
System access
Where: From remote
Solution Status: Vendor Patch

OS: RedHat Enterprise Linux AS 3
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux WS 3

Description:
Red Hat has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library.

http://secunia.com/advisories/34143/

Collapse -
Red Hat update for firefox
by Marianna Schmudlach / March 4, 2009 11:23 PM PST

Release Date: 2009-03-05

Critical:
Highly critical
Impact: Security Bypass
Spoofing
Exposure of sensitive information
System access
Where: From remote
Solution Status: Vendor Patch

OS: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux WS 4

Description:
Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, or compromise a user's system.

http://secunia.com/advisories/34140/

Collapse -
Red Hat update for seamonkey
by Marianna Schmudlach / March 4, 2009 11:24 PM PST

Release Date: 2009-03-05

Critical:
Highly critical
Impact: Security Bypass
Exposure of sensitive information
System access
Where: From remote
Solution Status: Vendor Patch

OS: RedHat Enterprise Linux AS 2.1
RedHat Enterprise Linux AS 3
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux ES 2.1
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 4
RedHat Linux Advanced Workstation 2.1 for Itanium

Description:
Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a user's system.


http://secunia.com/advisories/34137/

Collapse -
IBM WebSphere Application Server for z/OS Cross-Site Scripti
by Marianna Schmudlach / March 4, 2009 11:25 PM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch

Software: IBM WebSphere Application Server 6.1.x

Description:
A vulnerability has been reported in IBM WebSphere Application Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to unspecified parameters in the administrative console is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

http://secunia.com/advisories/34131/

Collapse -
Debian update for opensc
by Marianna Schmudlach / March 4, 2009 11:26 PM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: Security Bypass
Where: From remote
Solution Status: Vendor Patch

OS: Debian GNU/Linux 5.0
Debian GNU/Linux unstable alias sid

Description:
Debian has issued an update for opensc. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.


http://secunia.com/advisories/34120/

Collapse -
Fedora update for psi
by Marianna Schmudlach / March 4, 2009 11:27 PM PST

Release Date: 2009-03-05

ritical:
Less critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch

OS: Fedora 10
Fedora 9

Description:
Fedora has issued an update for psi. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).


http://secunia.com/advisories/34119/

Collapse -
Cisco Session Border Controller Denial of Service Vulnerabil
by Marianna Schmudlach / March 4, 2009 11:28 PM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: DoS
Where: From local network
Solution Status: Vendor Patch

OS: Cisco Session Border Controller (SBC) for Cisco 7600 Series Routers 3.x

Description:
A vulnerability has been reported in Cisco Session Border Controller (SBC) for Cisco 7600 Series Routers, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error when processing TCP packets sent over port 2000, which can be exploited to cause a Cisco SBC card to reload via a specially crafted TCP packet.

The vulnerability is reported in SBC modules in versions prior to 3.0(2) for Cisco 7600 series routers.

http://secunia.com/advisories/34113/

Collapse -
Samhain SRP Authentication Bypass Vulnerability
by Marianna Schmudlach / March 4, 2009 11:29 PM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: Security Bypass
Where: From local network
Solution Status: Vendor Patch

Software: Samhain 2.x

Description:
A vulnerability has been reported in Samhain, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an input validation error in the implementation of the SRP authentication protocol. This can be exploited to bypass authentication on a Samhain server and e.g. disclose potentially sensitive information.

The vulnerability is reported in Samhain server in versions prior 2.5.4.

http://secunia.com/advisories/34104/

Collapse -
FileZilla Server SSL/TLS Denial of Service Vulnerability
by Marianna Schmudlach / March 4, 2009 11:30 PM PST

Release Date: 2009-03-05

Critical:
Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch

Software: FileZilla Server 0.x


Description:
A vulnerability has been reported in FileZilla Server, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error within the SSL/TLS code and may be exploited to cause a buffer overflow.

The vulnerability is reported in versions prior to 0.9.31.

http://secunia.com/advisories/34089/

Collapse -
Windows Vista and Server 2008 SP2 RC freely available
by Marianna Schmudlach / March 4, 2009 11:36 PM PST

5 March 2009

As previously announced, Microsoft has issued a pre-release version of Service Pack 2 for Windows Vista and Server 2008, to download.

SP2 updates all versions of Vista, from Home Basic to Ultimate. In order to install the service pack (as with all beta versions, this should not be used on live systems), users must have an existing SP1 installation. Only Vista users need SP1 installed as an update; Server 2008 is delivered with SP1. Vista with SP1 is based on the same kernel as Server 2008, which is why SP2 can be used with both operating systems.

Various versions can be found on Microsoft?s servers. There are standalone versions (as .exe files) which update the English, German, French, Japanese and Spanish-language versions of Vista (five language version available for x86, x64 and ia64). Users with a different language version require the larger package for all 36 language versions of the Vista operating system (an all language version is also available for x86, x64 and ia64). The standalone packages for x86, x64 and ia64 are also available as an ISO image (in five language and all languages packages).

http://www.h-online.com/security/Windows-Vista-and-Server-2008-SP2-RC-freely-available--/news/112782

Collapse -
libsndfile CAF Processing Integer Overflow Vulnerability
by Marianna Schmudlach / March 5, 2009 12:00 AM PST

Summary
"Libsndfile is a C library for reading and writing files containing sampled sound (such as MS Windows WAV and the Apple/SGI AIFF format) through one standard library interface." Secunia Research has discovered a vulnerability in libsndfile, which can be exploited by malicious people to compromise an application using the library.

Credit:
The information has been provided by Secunia Research.
The original article can be found at: http://secunia.com/secunia_research/2009-7/

http://www.securiteam.com/unixfocus/5UP0115QKQ.html

Collapse -
Easy File Sharing Web Server "vfolder" Directory Traversa
by Marianna Schmudlach / March 5, 2009 12:35 AM PST

Release Date: 2009-03-05

Critical:
Moderately critical
Impact: Exposure of system information
Exposure of sensitive information
Where: From remote
Solution Status: Unpatched

Software: Easy File Sharing Web Server 4.x

http://secunia.com/advisories/34121/

Collapse -
User info stolen from music site
by Marianna Schmudlach / March 5, 2009 1:00 AM PST

Thursday, 5 March 2009

The music streaming service Spotify has been targeted by hackers.

The Swedish company says people's personal details, including e-mail addresses, dates of birth and addresses, were all stolen.

However, it is thought credit-card details, which were handled by a third party, have remained secure.

Spotify has apologised for the security lapse and advised users who registered on the site before 19 December 2008 to change their passwords.

It is thought hackers gained access to user data at the end of 2008, although the security breach only came to light at the end of last week.

More: http://news.bbc.co.uk/2/hi/technology/7925455.stm

Collapse -
(OT) Windows 7 allows IE uninstall
by Marianna Schmudlach / March 5, 2009 1:02 AM PST

March 5, 2009

Gregg Keizer reports:

A just-leaked build of Windows 7 lets users remove Internet Explorer (IE), the first time that Microsoft Corp. has offered the option since it integrated the browser with Windows in 1997 ... might have been prompted by recent charges by the European Union that Microsoft has stifled browser competition by bundling IE with its operating system.

More: http://blogs.computerworld.com/windows_7_allows_ie_uninstall_ie8_eu_ec_anti_trust_foo

Collapse -
Sun Solaris Crypto Driver Denial of Service Vulnerability
by Marianna Schmudlach / March 5, 2009 1:50 AM PST

Release Date: 2009-03-05

Critical:
Not critical
Impact: DoS
Where: Local system
Solution Status: Vendor Patch

OS: Sun Solaris 10

Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by a malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error and can be exploited to cause a system panic. No additional information is currently available.

http://secunia.com/advisories/34149/

Collapse -
Ubuntu update for curl
by Marianna Schmudlach / March 5, 2009 4:05 AM PST

Release Date: 2009-03-05

Critical:
Less critical
Impact: Security Bypass
Where: From remote
Solution Status: Vendor Patch

OS: Ubuntu Linux 8.10

Description:
Ubuntu has issued an update for curl. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

http://secunia.com/advisories/34118/

Collapse -
Microsoft Windows Vista/Server 2008 SP2 Available For Downlo
by Marianna Schmudlach / March 5, 2009 5:04 AM PST

By Antone Gonsalves
InformationWeek
March 5, 2009

Microsoft has made the Service Pack 2 release candidates of Windows Vista and Windows Server 2008 publicly available for download.

The prerelease software, which is for evaluation and testing, provides fixes for a number of reliability, performance, and compatibility issues. The service packs are available for download in 32- and 64-bit versions and require the system to be running SP1. Beta versions of the operating systems have to be removed before installation.

More: http://www.informationweek.com/news/windows/operatingsystems/showArticle.jhtml?articleID=215800770&cid=RSSfeed_IWK_Security

Collapse -
Study: Firefox wins browser time-to-patch race
by Marianna Schmudlach / March 5, 2009 5:06 AM PST

Posted by Ryan Naraine

March 5th, 2009

A new report from Secunia is pouring more gas on the Internet Explorer vs. Mozilla Firefox security debate.

The security alerts aggregator collected and crunched the numbers on security flaws publicly reported ? and fixed ? by the two vendors and found that Mozilla easily won the time-to-patch race, despite having to respond to almost four times the number of vulnerabilities.

More: http://blogs.zdnet.com/security/?p=2786

Collapse -
Photo site hit by internal phishing attack
by Marianna Schmudlach / March 5, 2009 5:08 AM PST

05 March 2009

By John E. Dunn, Techworld

The iStockphoto image-selling website has been hit by a brazen phishing attack, which attempts to fool account holders into giving up their site logins.

Advertisement

The danger of the attack appears to be its unusual method - strike from within. The Getty-owned service appears to have been targeted using the site's internal mail boards in an attempt to persuade users to visit a fake login page, re-entering their details for remote capture. Once entered, a user would have been re-directed to the correct login page.

The attack took the service down for a period of hours as admins battled to cleanse the messages from the system.

More: http://www.techworld.com/security/news/index.cfm?RSS&NewsID=112222

Collapse -
Zero-day Adobe PDF peril goes click free
by Marianna Schmudlach / March 5, 2009 5:10 AM PST

Thumbnail preview threat

By John Leyden
5th March 2009

An unpatched flaw in Adobe Acrobat and Reader might be exploited without even needing to trick a surfer into opening a maliciously constructed file.

Proof of concept demonstrations of this by security blogger Didier Stevens will increase pressure on Adobe to release a fix ahead of schedule.

The exploit techniques demoed by Stevens make use of the Windows Explorer Shell Extension installed with Adobe Reader. The feature creates a conduit between Adobe Reader and Windows Explorer and means that simply hovering the mouse cursor over a booby-trapped file, or selecting it, are enough to allow the bust out of potentially malicious code. Selecting a thumbnail view poses a similar risk.

More: http://www.theregister.co.uk/2009/03/05/click_free_pdf_peril/

Collapse -
Spotify data exposed
by Marianna Schmudlach / March 5, 2009 5:13 AM PST

5 March 2009

Spotify have warned of a security breach that may have exposed sensitive user data, including passwords. The on-line music site posted a notice on its blog about the breach and notified users by email.

According to Spotify, an unspecified "group" had managed to compromise the Spotify protocols and upon investigation, the company had found that this group had gained access to information which could allow for password hash cracking. Passwords, email addresses, date of birth, gender, postal code and billing receipt details were exposed by the problem, though Spotify say that credit card information was not exposed, as this is handled by a third party and not stored on Spotify's servers. The exposed information was made available due to a bug that Spotify discovered and fixed on December 19th, 2008.

Spotify say that the complete user database was not leaked and that the hashed passwords were salted, making attacks by rainbow tables infeasible. Spotify said "We never store passwords, and they have never been sent over the Internet unencrypted, but the combination of the bug and the group?s reverse engineering of our encrypted streaming protocol may have given outsiders access to individual hashes".

More: http://www.h-online.com/security/Spotify-data-exposed--/news/112778

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

CNET FORUMS TOP DISCUSSION

Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?