Monthly Report Apr, 2007 Generated by Secunia 1 May, 2007 20 pages Monthly Report - Apr, 2007 Table of Contents Introduction A Note from Secunia 2 Advisory Statistics All Advisories Advisories by Criticality Advisories by Attack Vector Advisories by Impact Advisories by Solution Status 3 4 5 6 7 Advisory Listing All Advisories for Apr, 2007 8 About Advisories Criticality Attack Vector Impact 17 18 19 Generated by Secunia 1 May 2007 Page 1 of 20 Monthly Report - Apr, 2007 A Note from Secunia Every month hundreds of vulnerabilities are discovered in various applications, ranging from browser plug-ins to critical business software, small web applications to application servers, archiving utilities to large relational database applications. At times even commonly used firewalls and anti-virus solutions from the largest security software vendors are affected by severe vulnerabilities. Although most of the larger software vendors have initiated projects and plans for designing more secure software, we continue to see a large number of vulnerabilities in software that businesses rely on. Fortunately, most of these vulnerabilities are found by the "good" guys who disclose this information to the software vendors, who in turn produce patches to eliminate the vulnerability. However, each vendor has got their own "disclosure" policy, which effectively means that most don't ensure that their customers are informed about the security related update and therefore may run with unpatched systems for an extended period of time. This gives the "bad" guys a long time to exploit vulnerabilities which could have been patched long ago. Secunia provides efficient solutions to track and eliminate all these vulnerabilities across different vendors and different disclosure policies (or lack thereof). These solutions make sure that even large companies can quickly map all of their software and stay secure with comprehensive and timely advisories. This monthly report provides an opportunity to give you, your co-workers, and management an insight into the tremendous job of keeping track of all the vulnerabilities found each and every day, with detailed statistics for the past month as well as annual figures. Stay Secure, Secunia Generated by Secunia 1 May 2007 Page 2 of 20 Monthly Report - Apr, 2007 Vulnerability Reports/Advisories The following table and graphs show information about all advisories published by Secunia through April 2007. The first column below shows the total number of advisories published in April 2007. The second column shows the total number of advisories published between the 1st of January 2007 and the end of April of the same year. Finally, the last column shows all advisories published between the start of 2003 through April 2007. Vulnerabilities Generated by Secunia Apr, 2007 2007 (Jan-Apr) 375 1,527 1 May 2007 2003-2007 17,244 Page 3 of 20 Monthly Report - Apr, 2007 Level of Criticality Having the ability to view statistics about advisories based on their criticality rating can give you a good idea just how much time you should plan to set aside for patching systems within your infrastructure. The data below is grouped to show you the advisories from April 2007, from all of 2005 (through April), and since January 1, 2003. Apr, 2007 Extremely critical Highly critical Moderately critical Less critical Not critical Generated by Secunia 1 104 133 129 8 2007 (Jan-Apr) 6 406 542 513 60 1 May 2007 2003-2007 120 3,548 6,689 5,864 1,023 Page 4 of 20 Monthly Report - Apr, 2007 Attack Vector The following table and graphs show information about all advisories published by Secunia through April 2007 grouped by Attack Vector. From remote From local network Local system Generated by Secunia Apr, 2007 2007 (Jan-Apr) 300 1,228 41 153 34 146 1 May 2007 2003-2007 13,251 1,578 2,413 Page 5 of 20 Monthly Report - Apr, 2007 Impact The following table and graphs show information about all advisories published by Secunia through April 2007 grouped by Impact. This information can be a valuable way to delegate resources when testing the security of your infrastructure, choosing to allocate more resources to those areas that tend to result in the most exploits. System access DoS Privilege escalation Exposure of sensitive information Exposure of system information Brute force Manipulation of data Spoofing Cross Site Scripting Security Bypass Hijacking Unknown Generated by Secunia Apr, 2007 2007 (Jan-Apr) 176 636 124 505 49 165 73 259 25 67 0 0 39 180 1 26 48 233 47 198 2 11 14 36 1 May 2007 2003-2007 6,659 5,052 2,187 2,370 985 22 2,130 394 2,886 2,242 93 314 Page 6 of 20 Monthly Report - Apr, 2007 Solution Status The following table and graphs show information about all advisories published by Secunia through April 2007 grouped by Solution Status. This illustrates trends of software vendors' reactions to advisories published by Secunia. Unpatched Vendor Patch Vendor Workaround Partial Fix Generated by Secunia Apr, 2007 2007 (Jan-Apr) 126 494 222 955 17 50 10 28 1 May 2007 2003-2007 4,298 12,353 310 283 Page 7 of 20 Monthly Report - Apr, 2007 Complete List of Secunia Advisories Released in Apr, 2007 The following is a complete listing of all Secunia advisories that were published in the month of April 2007. Apr 30, 2007 SA25044: Adobe Products PNG.8BI PNG File Handling Buffer Overflow SA25032: BEAST/BSE "seteuid()" and "setreuid()" Security Issue SA25034: Corel Paint Shop Pro Photo PNG File Handling Buffer Overflow SA25028: Debian update for clamav SA25025: Debian update for php4 SA25062: Debian update for php5 SA25033: FreeBSD IPv6 Type 0 Route Headers Denial of Service SA25059: Gentoo update for beast SA25066: HP Power Manager Remote Agent Unspecified Code Execution SA25038: Imager 8Bit BMP File Parsing Buffer Overflow Vulnerability SA25040: Imageview "album" Local File Inclusion SA25061: iputils rarpd Replies Denial of Service SA25052: IrfanView Formats Plug-in IFF File Handling Buffer Overflow Vulnerability SA25067: LAN Management System "OD" Cross-Site Scripting Vulnerability SA25068: Linux Kernel IPv6 Type 0 Route Headers Denial of Service SA25026: MyServer Data Processing Denial of Service Vulnerability SA25071: Papoo CMS "menuid" SQL Injection Vulnerability SA25009: Pi3Web HTTP Request Processing Denial of Service Vulnerability SA25036: Plesk "locale_id" Directory Traversal Vulnerabilities SA25043: PostNuke pnFlashGames Module "cid" SQL Injection SA25048: Sun Java System Directory Server NSS Denial of Service SA25072: SUSE Update for Multiple Packages SA25058: Ubuntu update for postgresql SA25042: WordPress myGallery Plugin "myPath" File Inclusion Apr 27, 2007 SA25046: AWBS "workdir" File Inclusion Vulnerability SA25012: Gimp SUNRAS Plugin "set_color_table()" Buffer Overflow SA25020: Groupmax Mobile Option Unspecified Buffer Overflow SA25045: IBM WebSphere Application Server Unspecified Vulnerability SA25051: IncrediMail IMMenuShellExt ActiveX Control Buffer Overflow SA25021: Invision Power Board class_upload.php Cross-Site Scripting SA25007: MyDNS DNS Update Denial of Service SA25035: phpOracleView "include_all.inc.php" File Inclusion SA24993: Red Hat update for java-1.4.2-ibm SA25014: SineCms "stringa" Cross-Site Scripting SA25037: Sun Solaris PostgreSQL SECURITY DEFINER Privilege Escalation SA25013: Symantec Products Information Disclosure and Buffer Overflow SA24999: Trustix update for postgresql SA25057: Ubuntu update for php Apr 26, 2007 SA25055: ABC-View Manager PSP File Handling Buffer Overflow Generated by Secunia 1 May 2007 Page 8 of 20 Monthly Report - Apr, 2007 Apr 26, 2007 (continued) SA25050: AccuSoft ImageGear igcore15d.dll Buffer Overflow Vulnerability SA25002: CA CleverPath Portal SQL Injection Vulnerability SA25047: Cisco Products PHP "htmlentities()" and "htmlspecialchars()" Buffer Overflows SA25054: Fresh View PSP File Handling Buffer Overflow SA25053: JulmaCMS "file" Directory Traversal Vulnerability SA25005: Mandriva update for postgresql SA25049: NaviCOPA GET Request Denial of Service Vulnerability SA25006: Sun Solaris X11 Multiple Vulnerabilities Apr 25, 2007 SA25023: Adobe Photoshop Bitmap File Handling Buffer Overflow Vulnerability SA24977: Asterisk T.38 SDP Buffer Overflows and Management Interface Denial of Service SA24970: Avaya Products Wireshark Multiple Denial of Service Vulnerabilities SA24972: CA BrightStor ARCserve Backup Media Server Multiple Buffer Overflows SA24982: Debian update for aircrack-ng SA25022: Gentoo update for clamav SA25029: HP StorageWorks Command View Advanced Edition for XP Unauthorized User Account Access SA24710: InterVideo HomeTheater WinDVDX ActiveX Control Buffer Overflows SA25031: Linksys SPA941 SIP Message Denial of Service SA24976: Linux Kernel "L2CAP" and "HCI" Information Disclosure SA25000: Lunascape RSS Feed Cross-Site Scripting Vulnerability SA24724: Nero MediaHome Denial of Service Vulnerability SA24984: Ripe Website Manager SQL Injection and Cross-Site Scripting SA24936: SilverStripe "search" Unspecified Vulnerability SA24985: Sun Cluster Software Denial of Service Vulnerability SA24975: Sun Solaris libX11 Integer Overflow Vulnerability SA25027: SUSE update for opera SA24957: USP FOSS Distribution "dnld" File Disclosure Vulnerability SA25015: wavewoo "path_include" File Inclusion Vulnerability Apr 24, 2007 SA24983: ACVSWS "CheminInclude" File Inclusion Vulnerability SA25011: Apple QuickTime Java Handling Unspecified Code Execution SA24997: Big Blue Guestbook "comments" Script Insertion SA25016: Corel Paint Shop Pro Photo igcore15d.dll CLP File Handling Buffer Overflow SA25010: EsForum "idsalon" SQL Injection Vulnerability SA24935: freePBX Script Insertion and Command Execution Vulnerabilities SA24991: Gentoo update for blender SA24980: Gentoo update for nas SA24990: HP-UX sendmail Unspecified Denial of Service SA25017: Microgaming Download Helper ActiveX Control Buffer Overflow Vulnerability SA24967: MyBB "day" SQL Injection Vulnerability SA24978: OpenBSD IPv6 Type 0 Route Headers Denial of Service SA24992: Pagode "asolute" Command Injection and Directory Traversal SA24952: phpMyAdmin Cross-Site Scripting Vulnerabilities SA24971: Post Revolution "dir" File Inclusion Vulnerabilities SA25019: PostgreSQL SECURITY DEFINER Functions Privilege Escalation SA24989: rPath update for postgresql and postgresql-server Generated by Secunia 1 May 2007 Page 9 of 20 Monthly Report - Apr, 2007 Apr 24, 2007 (continued) SA25004: SUSE update for XFree86 and Xorg SA24998: TJSChat "user" Cross-Site Scripting Vulnerability SA24959: Xaraya Roles Module Form Handler Security Bypass SA25018: Yate Unspecified SIP Protocol Handling Denial of Service Vulnerability Apr 23, 2007 SA24961: 3proxy Transparent Request Handling Buffer Overflow SA24994: ACDSee Products "ID_X.apl" XPM File Handling Buffer Overflow SA24987: Avaya CMS / IR Sun Solaris IP Packet Denial of Service SA24974: Debian update for webcalendar SA24963: Gentoo courier-imap "XMAILDIR" Variable Command Injection SA25001: Gentoo update for 3proxy SA24964: Gentoo update for aircrack-ng SA24979: Mandriva update for krb5 SA24968: Maran PHP Forum "name" PHP Code Execution SA25003: NeatUpload Response Handling Race Condition Information Disclosure SA24981: PhotoFiltre Studio TIF File Handling Buffer Overflow SA24995: SUSE Update for Multiple Packages SA24996: Trustix update for freetype and clamav SA24958: WEBinsta FM Manager "absolute_path" File Inclusion SA24973: XnView XPM File Handling Buffer Overflow SA24986: ZoneAlarm Products SRESCAN.SYS IOCTL Handler Privilege Escalation Apr 20, 2007 SA24934: Exponent CMS "icodir" Directory Listing Disclosure Weakness SA22924: Gracenote CDDBControl ActiveX Buffer Overflow Vulnerability SA24969: HP Oracle for OpenView Multiple Vulnerabilities SA24966: Mac OS X Security Update Fixes Multiple Vulnerabilities SA24962: Nortel VPN Router Default User Accounts and Missing Authentication Checks SA24932: Phorum Multiple Vulnerabilities SA24949: PHP-Nuke SQL Filter Bypass and SQL Injection Vulnerabilities SA24941: Red Hat Stronghold update for php SA24965: Red Hat update for php SA24925: Sharity Unspecified Denial of Service Vulnerability SA24921: Slackware update for freetype SA24866: Slackware update for xine-lib SA24946: SUSE update for clamav Apr 19, 2007 SA24955: AimStats "process.php" PHP Code Injection SA24937: BMC PATROL "bgs_sdservice.exe" Memory Corruption SA24940: Canon Network Camera Server VB100 Series Cross-Site Scripting Vulnerability SA24938: IBM Tivoli Monitoring Various Services Buffer Overflow Vulnerabilities SA24922: JEX-Treme Einfacher Passwortschutz "msg" Cross-Site-Scripting SA24956: jGallery "G_JGALL[inc_path]" File Inclusion Vulnerability SA24909: Mandriva update for php SA24954: MediaBeez "server.php" SQL Execution Vulnerability SA24944: Novell GroupWise WebAccess Base64 Decoding Buffer Overflow SA24915: Opensurveypilot Two File Inclusion Vulnerabilities Generated by Secunia 1 May 2007 Page 10 of 20 Monthly Report - Apr, 2007 Apr 19, 2007 (continued) SA24926: Rezervi Generic "root" File Inclusion Vulnerabilities SA24947: rPath update for lighttpd SA24945: rPath update for php, php-mysql, and php-pgsql SA24960: Second Sight ActiveGS ActiveX Control Buffer Overflow Vulnerabilities SA24928: Second Sight ActiveMod ActiveX Control Buffer Overflow Vulnerabilities SA24948: Sun Solaris Mozilla 1.7 Vulnerabilities SA24920: SUSE update for clamav SA24953: Ubuntu update for libx11 SA24951: WordPress Pingback Denial of Service Security Issue SA24899: Zomplog "file" Directory Traversal Vulnerability Apr 18, 2007 SA24908: Anthologia "ads_file" File Inclusion Vulnerability SA24918: Gentoo file Denial of Service Security Issue SA24917: Gentoo update for freeradius SA24931: Gentoo update for madwifi-ng SA24950: HP Insight Management Agents SSL Vulnerabilities SA24930: HP UX Tru64 Multiple SSL and BIND Vulnerabilities SA24893: McAfee e-Business Server Authentication Packet Processing Denial Of Service SA24914: McAfee VirusScan Enterprise On-Access Scanner Unicode Filename Buffer Overflow SA24942: my little weblog "id" Cross-Site Scripting SA24929: Oracle Products Multiple Vulnerabilities SA24887: PHP-Nuke vWar Module SQL Injection and Cross-Site Scripting SA24867: ProFTPD Auth API Multiple Authentication Modules Security Issue SA24939: ShoutPro "shout" PHP Code Injection Vulnerability SA24927: Sun Solaris and Java Web Console Format String Vulnerability SA24943: Wabbit PHP Gallery Script Two Cross-Site Scripting Vulnerabilities SA24933: webMethods Glue "resource" Directory Traversal Vulnerability Apr 17, 2007 SA24900: Akamai Download Manager ActiveX Control Buffer Overflow Vulnerabilities SA24859: Gentoo update for inkscape SA24906: Gentoo update for openoffice and openoffice-bin SA24905: Gentoo update for vixie-cron SA24882: MailBee WebMail Pro Cross-Site Scripting Vulnerabilities SA24895: Mandriva update for cups SA24907: Mandriva update for freeradius SA24826: Mandriva update for ipsec-tools SA24913: Mozilla Firefox Wizz RSS News Reader Extension Cross-Context Scripting SA24919: oe2edit "q" Cross-Site Scripting Vulnerability SA24910: Red Hat update for php SA24924: Red Hat update for php SA24901: rPath update for kernel SA24912: Simple PHP Scripts Gallery "gallery" File Inclusion SA24890: StoreFront for Gallery "GALLERY_BASEDIR" File Inclusion Vulnerabilities Apr 16, 2007 SA24902: CNStats File Inclusion Vulnerabilities SA24894: FileZilla Unspecified Format String Vulnerabilities Generated by Secunia 1 May 2007 Page 11 of 20 Monthly Report - Apr, 2007 Apr 16, 2007 (continued) SA24897: Gentoo update for xine-lib SA24892: LANDesk Management Suite Alert Service Buffer Overflow SA24886: lighttpd "mtime" and "\r\n\r\n\" Denial of Service Vulnerabilities SA24904: LS simple guestbook "message" PHP Code Execution SA24898: MiniShare Multiple Connections Denial of Service SA24896: NMDeluxe "template" Local File Inclusion Vulnerability SA24821: Pixaria Gallery "cfg[sys][base_path]" File Inclusion SA24878: Red Hat update for cups SA24885: Red Hat update for freetype SA24911: Red Hat update for squid SA24903: ScramDisk 4 Linux Privilege Escalation Security Issues SA24916: SSH Tectia Server Insecure Permissions SA24889: SUSE Update for Multiple Packages SA24884: VCDGear Cue File Buffer Overflow Vulnerability Apr 13, 2007 SA24880: Aircrack-ng 802.11 Authentication Packet Processing Buffer Overflow SA24875: Avaya Products Incorrect GnuPG Usage SA24873: Chatness Security Bypass and PHP Code Execution SA24879: chCounter "login_name" Cross-Site Scripting SA24865: Cisco Products Multiple Vulnerabilities SA24891: Clam AntiVirus Multiple Vulnerabilities SA24881: eIQNetworks Enterprise Security Analyzer Command Processing Vulnerabilities SA24853: Gentoo update for dokuwiki SA24870: Mephisto "q" Cross-Site Scripting Vulnerability SA24871: Microsoft Windows DNS Service Buffer Overflow Vulnerability SA24775: Open Business Management Authentication Bypass SA24888: PhpWiki "UpLoad" PHP Script Upload Vulnerability SA24868: PicoZip Archive Handling Directory Traversal Vulnerability SA24857: Sun Solaris IP Packet Denial of Service SA24869: toendaCMS "searchword" Cross-Site Scripting Apr 12, 2007 SA24854: Adobe Bridge Update Installation Unspecified Privilege Escalation SA24846: CodeBreak "process_method" File Inclusion Vulnerability SA24845: CoSign POST Request Carriage Return Insertion Vulnerabilities SA24848: Drupal Database Administration Module Multiple Vulnerabilities SA24872: FAC Guestbook Database Disclosure Security Issue SA24849: FreeRADIUS EAP-TTLS "VALUE_PAIR" Memory Leak Security Issue SA24835: Hiox Guestbook "from" PHP Code Execution Vulnerability SA24852: IBM WebSphere Application Server Unspecified Vulnerabilities SA24839: Mandriva update for apache-mod_perl SA24841: Mandriva update for madwifi-source SA24876: Openads "adclick.php" HTTP Header Injection SA24877: Opera Unspecified Flash Player Plug-In Vulnerability SA24843: PunBB "referer" and Category Name Vulnerabilities SA24858: RicarGBooK "lang" Local File Inclusion SA24797: SUSE update for qt3 and qt4 SA24874: TuMusika Evolution "msg" Cross-Site Scripting Vulnerability Generated by Secunia 1 May 2007 Page 12 of 20 Monthly Report - Apr, 2007 Apr 12, 2007 (continued) SA24847: Ubuntu update for kdelibs and qt-x11-free SA24731: URLshrink Free Unspecified Vulnerability SA24837: UseBB Full Path Disclosure Weakness Apr 11, 2007 SA24850: Adobe ColdFusion MX Insecure Directory and File Permissions SA24864: bftpd GET/MGET File Transfer Denial of Service Vulnerability SA22251: CinePlayer SonicDVDDashVRNav.dll Buffer Overflow Vulnerability SA24862: Crea-book Multiple SQL Injection Vulnerabilities SA24829: DotClear "post_id" / "tool_url" Cross-Site Scripting Vulnerabilities SA24861: DropAFew "id" SQL Injection, Calorie Log Disclosure and Link Weaknesses SA24855: HP-UX Portable File System "pfs_mountd.rpc" Buffer Overflow Vulnerability SA24842: Inout Mailing List Manager Multiple Vulnerabilities SA24860: phpGalleryScript "include_class" File Inclusion Vulnerability SA24851: SimpCMS Light "site" File Inclusion Vulnerability SA24856: Sun StarOffice and StarSuite 8 WordPerfect Vulnerability SA24752: Ubuntu update for kernel SA24863: Weatimages "ini[langpack]" File Inclusion Vulnerability Apr 10, 2007 SA24836: AlstraSoft Video Share Enterprise SQL Injection and Missing Authentication SA24747: AOL Instant Messenger File Transfer Directory Traversal Vulnerability SA24830: Apple AirPort Extreme Base Station Two Weaknesses SA24838: Battle.net Clan Script "user" SQL Injection SA24811: Beryo "chemin" Directory Traversal Vulnerability SA24807: cattaDoc "download2.php" File Disclosure Vulnerability SA24840: CompreXX Archive Handling Directory Traversal Vulnerability SA24844: DeskPRO "username" Cross-Site Scripting Vulnerability SA24825: eCardMAX HotEditor "first" Local File Inclusion SA24805: Globus Toolkit GSI-OpenSSH Two Vulnerabilities SA24803: ICQ File Transfer Directory Traversal Vulnerability SA24816: iPIX Image Well ActiveX Control Unspecified Buffer Overflows SA24815: IPsec Tools "isakmp_inf.c" Denial of Service SA24793: Linux Kernel "atalk_sum_skb()" AppleTalk Denial of Service SA22896: Microsoft Agent URL Parsing Memory Corruption Vulnerability SA24819: Microsoft Content Management Server Two Vulnerabilities SA24834: Microsoft Windows Kernel Mapped Memory Insecure Permissions SA24822: Microsoft Windows XP UPnP Memory Corruption Vulnerability SA24814: PHP "readwbmp()" Integer Overflow Vulnerability SA24818: PHP121 Instant Messenger "php121dir" File Inclusion Vulnerability SA24808: Quagga "reachable/unreachable" NLRI Attributes Denial of Service SA24831: QuizShock "forward_to" Cross-Site Scripting SA24832: Request It : Song Request System "id" File Inclusion Vulnerability SA24810: rPath update for openoffice.org SA24796: ScarNews "sn_admin_dir" File Inclusion Vulnerability SA24809: Scorp Book "config" File Inclusion Vulnerability SA24802: SmodBIP "zoom" SQL Injection Vulnerability SA24833: Ubuntu update for ipsec-tools SA24823: Windows Vista CSRSS Privilege Escalation Vulnerability Generated by Secunia 1 May 2007 Page 13 of 20 Monthly Report - Apr, 2007 Apr 9, 2007 SA24827: ArchiveXpert Archive Handling Directory Traversal Vulnerability SA24812: CMailServer Two Cross-Site Scripting Vulnerabilities SA24828: Debian update for man-db SA24804: Debian update for xmms SA24806: eBoard "GLOBALS[name]" Local File Inclusion Vulnerability SA24787: Gentoo update for evince SA24794: Gentoo update for libwpd SA24780: JustSystems Ichitaro Document Processing Unspecified Code Execution SA24801: man-db "BROWSER" Privilege Escalation Vulnerability SA24824: PHP "FILTER_VALIDATE_EMAIL" Filter Newline Injection SA24817: SGI update for krb5 SA24820: SignKorea SKCrypAX ActiveX Control Multiple Buffer Overflows SA24766: Winamp libsndfile.dll MAT File Handling NULL Byte Overwrite SA24813: WitShare "menu" Local File Inclusion Vulnerability Apr 6, 2007 SA24779: ACDSee Products BMP Image Handling Memory Corruption SA24789: CodeWand phpBrowse "include_path" Remote File Inclusion SA24784: FastStone Image Viewer BMP Image Handling Memory Corruption SA24792: HP-UX update for CIFS Server SA24799: IBM OpenSSH for AIX Two Vulnerabilities SA24800: Nuke ET "Your_Account" User Deletion Vulnerability SA24786: SUSE update for krb5 SA24767: Symantec Enterprise Security Manager Remote Upgrade Missing Authentication SA24782: Trustix Updates for Multiple Packages SA24712: WebSPELL "picture.php" Information Disclosure SA24769: XOOPS Jobs Module "cid" SQL Injection SA24774: XOOPS WF-Links Module "cid" SQL Injection Apr 5, 2007 SA24773: AROUNDMe File Inclusion Vulnerabilities SA24764: Enterasys Networks NetSight Products TFTPD/BOOTPD Vulnerabilities SA24768: FreeType BDF Font Integer Overflow Vulnerability SA24778: Kaspersky Products Multiple Vulnerabilities SA24795: Lite-CMS "p" Local File Inclusion Vulnerability SA24776: Mandriva update for freetype2 SA24777: Mandriva update for kernel SA24785: Mandriva update for krb5 SA24772: Mandriva update for tightvnc SA24765: Mandriva update for xorg-x11 SA24743: Mozilla Firefox Firebug Extension Two Cross-Context Scripting Vulnerabilities SA24798: Novell Kerberos KDC "krb5_klog_syslog()" Buffer Overflow SA24791: OpenBSD update for X.Org SA24783: rPath update for nas SA24722: SAP RFC Library Multiple Vulnerabilities SA24788: VMware ESX Server Multiple Vulnerabilities SA24790: Xoops Rha7 Downloads Module "lid" SQL Injection SA24781: Xoops WF-Snippets Module "c" SQL Injection Generated by Secunia 1 May 2007 Page 14 of 20 Monthly Report - Apr, 2007 Apr 4, 2007 SA24736: Debian update for krb5 SA24735: Gentoo update for mit-krb5 SA24720: Gentoo update for openafs SA24716: Gentoo update for openpbs SA24708: Gentoo update for zziplib SA24730: HP Mercury Quality Center "RunQuery()" Insecure Method SA24763: IBM Tivoli Business Service Manager Password Disclosure SA24740: Kerberos Multiple Vulnerabilities SA24705: Mandriva update for kdelibs SA24699: Mandriva update for qt3 and qt4 SA24738: Metamod-P "safevoid_vsnprintf()" Denial of Service Vulnerability SA24689: MyBB "Client-IP" SQL Injection and Code Execution SA24760: MySpeach "chat.php" File Inclusion Vulnerability SA24750: Red Hat update for krb5 SA24744: Red Hat update for mysql SA24771: Red Hat update for XFree86 SA24745: Red Hat update for xorg-x11 SA24756: rPath update for freetype, xorg-x11, xorg-x11-fonts, xorg-x11-tools, and xorg-x11-xfs SA24739: rpath update for ImageMagick SA24759: rPath update for qt-x11-free SA24757: rPath updates for krb5 SA24704: ScriptMagix FAQ Builder "catid" SQL Injection SA24698: ScriptMagix Photo Rating "phid" SQL Injection SA24754: Slackware update for file SA24753: Slackware update for ktorrent SA24726: Slackware update for qt SA24762: SolidWorks sldimdownload ActiveX Control "Run()" Insecure Method SA24755: Sun SEAM Kerberized telnetd Daemon Arbitrary User Login SA24770: Ubuntu update for freetype, libxfont, xorg, and xorg-server SA24706: Ubuntu update for krb5 SA24751: WordPress XMLRPC SQL Injection and Security Bypass SA24741: X.Org X11 Multiple Vulnerabilities SA24758: XFree86 Multiple Vulnerabilities SA24761: Xoops PopnupBlog Module "postid" SQL Injection SA24742: Yahoo! Messenger AudioConf ActiveX Control Buffer Overflow Apr 3, 2007 SA24685: Advanced Website Creator SQL Injection Vulnerability SA24694: Asterisk AEL Extensions Security Bypass SA24723: Debian update for file SA24713: Debian update for zope2.7 SA24728: DirectAdmin Log Viewer Script Insertion Vulnerability SA24719: Gentoo update for asterisk SA24656: holaCMS Cross-Site Scripting Vulnerability SA24746: HP OpenView Network Node Manager Unspecified Unauthorized Access SA24717: IBM Tivoli Provisioning Manager for OS Deployment "multipart/form-data" Handling Multiple Vulnerabilities SA24721: ImageMagick DCM and XWD Buffer Overflows SA24725: IrfanView Animated Cursor Handling Buffer Overflow Generated by Secunia 1 May 2007 Page 15 of 20 Monthly Report - Apr, 2007 Apr 3, 2007 (continued) SA24711: Netscape Multiple Vulnerabilities SA24727: Qt Overlong UTF-8 Sequence Cross-Site Scripting Vulnerability SA24733: TinyMUX "fun_ladd()" Buffer Overflow Vulnerability SA24700: Winmail Server "sid" Directory Traversal Vulnerability SA24748: Xoops Camportail Module "camid" SQL Injection SA24749: Xoops Kshop Module "id" SQL Injection Apr 2, 2007 SA24714: America Online SuperBuddy ActiveX Control "LinkSBIcons()" Vulnerability SA24732: Apache Tomcat Directory Traversal Security Issue SA24701: BT-Sondage "repertoire_visiteur" File Inclusion SA24688: dproxy-nexgen "dns_decode_reverse_name" Buffer Overflow Vulnerability SA24660: Gentoo update for cups SA24608: Gentoo update for file SA24662: Gentoo update for squid SA24683: Hitachi Products Cosminexus Component Container Improper Session Information Usage SA24692: HP Mercury Quality Center SPIDERLib ActiveX Control Buffer Overflow SA24670: MadWifi Denial of Service and Information Disclosure Vulnerabilities SA24715: MapLab "gszAppPath" File Inclusion Vulnerability SA24718: PHP-Fusion Expanded Calendar Module "m_month" SQL Injection SA24697: PHP-Nuke Addressbook Module "module_name" Local File Inclusion SA24671: RSPA Multiple File Inclusion Vulnerabilities SA24729: Softerra Time-Assistant "inc_dir" / "lib_dir" File Inclusion Vulnerabilities SA24624: Sun Solaris Mozilla 1.7 Vulnerability SA24734: SUSE update for gpg SA24737: SUSE Update for Multiple Packages SA24677: Symantec Norton Personal Firewall Hooked Functions Denial of Service SA24709: Xoops RM+Soft Gallery System Module "idcat" SQL Injection Generated by Secunia 1 May 2007 Page 16 of 20 Monthly Report - Apr, 2007 About Advisories - Criticality Extremely Critical Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. These vulnerabilities can e.g. exist in services like FTP, HTTP, and SMTP or in certain client systems like email programs or browsers. Highly Critical Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction but there are no known exploits available at the time of disclosure. Such vulnerabilities can e.g. exist in services like FTP, HTTP, and SMTP or in client systems like email programs or browsers. Moderately Critical Typically used for remotely exploitable Denial of Service vulnerabilities against services like FTP, HTTP, and SMTP, and for vulnerabilities that allows system compromises but require user interaction. This rating is also used for vulnerabilities allowing system compromise on LANs in services like SMB, RPC, NFS, LPD and similar services that are not intended for use over the Internet. Less Critical Typically used for cross-site scripting vulnerabilities and privilege escalation vulnerabilities. This rating is also used for vulnerabilities allowing exposure of sensitive data to local users. Not Critical Typically used for very limited privilege escalation vulnerabilities and locally exploitable Denial of Service vulnerabilities. This rating is also used for non-sensitive system information disclosure vulnerabilities (e.g. remote disclosure of installation path of applications). Generated by Secunia 1 May 2007 Page 17 of 20 Monthly Report - Apr, 2007 About Advisories - Attack vector Local system "Local system" describes vulnerabilities, where the attack vector requires that the attacker is a local user on the system. From local network "From local network" describes vulnerabilities, where the attack vector requires that an attacker is situated on the same network as a vulnerable system (not necessarily a LAN). This category covers vulnerabilities in certain services (e.g. DHCP, RPC, administrative services etc.), which should not be accessible from the Internet, but only from a local network and optionally a restricted set of external systems. From remote "From remote" describes other vulnerabilities, where the attack vector doesn't require access to the system nor a local network. This category covers services, which are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP etc.) as well as client applications used on the Internet and certain vulnerabilities, where it is reasonable to assume that a security conscious user can be tricked into performing certain actions. Generated by Secunia 1 May 2007 Page 18 of 20 Monthly Report - Apr, 2007 About Advisories - Impact Brute force Used in cases where an application or algorithm allows an attacker to guess passwords in an easy manner. Cross-Site Scripting Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behaviour of a web application in a user's browser, without compromising the underlying system. Different Cross-Site Scripting related vulnerabilities are also classified under this category, including "script insertion" and "cross-site request forgery". Cross-Site Scripting vulnerabilities are often used against specific users of a website to steal their credentials or to conduct spoofing attacks. DoS (Denial of Service) This includes various vulnerabilities ranging from excessive resource consumption (e.g. causing a system to use a lot of memory) to crashing an application or an entire system. Exposure of sensitive information Vulnerabilities where documents or credentials are leaked or can be revealed either locally or from remote. Exposure of system information Vulnerabilities where excessive information about the system (e.g. version numbers, running services, installation paths, and similar) is exposed and can be revealed from remote and in some cases locally. Hijacking This covers vulnerabilities where a user session or a communication channel can be taken over by other users or remote attackers. Manipulation of data This includes vulnerabilities where a user or a remote attacker can manipulate local data on a system, but not necessarily be able to gain escalated privileges or system access. The most frequent type of vulnerabilities with this impact are SQL-injection vulnerabilities, where a malicious user or person can manipulate SQL queries. Privilege escalation This covers vulnerabilities where a user is able to conduct certain tasks with the privileges of other users or administrative users. This typically includes cases where a local user on a client or server system can gain access to the administrator or root account thus taking full control of the system. Security Bypass This covers vulnerabilities or security issues where malicious users or people can bypass certain security mechanisms of the application. Generated by Secunia 1 May 2007 Page 19 of 20 Monthly Report - Apr, 2007 The actual impact varies significantly depending on the design and purpose of the affected application. Spoofing This covers various vulnerabilities where it is possible for malicious users or people to impersonate other users or systems. System access This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. Unknown Covers various weaknesses, security issues, and vulnerabilities not covered by the other impact types, or where the impact isn't known due to insufficient information from vendors and researchers. Generated by Secunia 1 May 2007 Page 20 of 20