Home
Systeembeheer
Consultancy
Connectivity
Training
Development

Klanten

Inloggen

Resources

Sans artikelen
Security artikelen

Software

Linux
Windows









[ terug ]
SecurityFocus Newsletter #298
------------------------------

This Issue is Sponsored By: CanSecWest/core05

It won't affect you unless you run Linux, OSX, some BSDs, or Windows...
Can/SecWest/core05 - Vancouver, Canada - May 4-6 2005  
World Security Pros. Cutting Edge Training, Tools, and Techniques
Security Masters Dojo May 3/4 2005 

http://www.securityfocus.com/sponsor/CanSecWest_sf-news_050427

------------------------------------------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight Analyzer
is a free service that gives you the ability to track and manage attacks.
Analyzer automatically correlates attacks from various Firewall and network
based Intrusion Detection Systems, giving you a comprehensive view of your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Apple's Big Virus
     2. Bluetooth Security Review, Part 1
     3. Security for the Paranoid
II. BUGTRAQ SUMMARY
     1. Apple WebCore Framework XMLHttpRequests Remote Code Executio...
     2. IBM AIX Journaled File System Memory Disclosure Vulnerabilit...
     3. Webmin And Usermin Configuration File Unauthorized Access Vu...
     4. Ariadne CMS Remote File Include Vulnerability
     5. Apple Mac OS X Kernel Syscall Emulation Buffer Overflow Vuln...
     6. PHPBB Remote Mod.PHP SQL Injection Vulnerability
     7. Datenbank Module For PHPBB Remote Mod.PHP Cross-Site Scripti...
     8. Mozilla Suite And Firefox Search Plug-In Remote Script Code ...
     9. eGroupWare Multiple Cross-Site Scripting and SQL Injection V...
     10. MVNForum Search Cross-Site Scripting Vulnerability
     11. IBM OS/400 Incoming Remote Command Denial of Service Vulnera...
     12. Multiple Vendor TCP Session Acknowledgement Number Denial Of...
     13. Mozilla Suite And Firefox Favicon Link Tag Remote Script Cod...
     14. CVS Unspecified Buffer Overflow And Memory Access Vulnerabil...
     15. Coppermine Photo Gallery X-Forwarded-For Logging HTML Inject...
     16. Apple Mac OS X Kernel NFS Mount Denial Of Service Vulnerabil...
     17. Apple Mac OS X Kernel Executable File Denial Of Service Vuln...
     18. Apple Mac OS X Kernel Setsockopt Local Denial Of Service Vul...
     19. Apple Mac OS X Kernel Semop Local Stack-Based Buffer Overflo...
     20. PMSoftware Simple Web Server Remote Buffer Overflow Vulnerab...
     21. Mozilla Firefox PLUGINSPAGE Remote Script Code Execution Vul...
     22. Mozilla Suite And Firefox Blocked Pop-Up Window Remote Scrip...
     23. Mozilla Suite And Firefox Global Scope Pollution Cross-Site ...
     24. Mozilla Firefox Search Target Sidebar Panel Script Code Exec...
     25. Mozilla Suite And Firefox XPInstall JavaScript Object Instan...
     26. Mozilla Suite And Firefox Document Object Model Nodes Code E...
     27. Apple Mac OS X AppleFilingProtocol Server Information Disclo...
     28. Oracle Database Server InterMedia Denial of Service Vulnerab...
     29. F5 BIG-IP User Interface Login Credential Caching Vulnerabil...
     30. Sun Solaris Non-Privileged Network Port Hijacking Vulnerabil...
     31. McAfee Internet Security Suite Local Insecure Default Permis...
     32. XV Image Decoders Multiple Unspecified Input Validation Vuln...
     33. XV Planetary Data System Image Decoder Unspecified Input Val...
     34. XV Planetary Data System Image Decoder Format String Vulnera...
     35. XV Tagged Image File Format Image Decoder Format String Vuln...
     36. XV Image File Name Remote Command Execution Vulnerability
     37. Microsoft Windows Explorer Preview Pane Script Injection Vul...
     38. OneWorldStore DisplayResults.ASP SQL Injection Vulnerability
     39. WebcamXP Chat Name HTML Code Injection Vulnerability
     40. OneWorldStore DisplayResults.ASP Cross-Site Scripting Vulner...
     41. Info2www Cross-Site Scripting Vulnerability
     42. JAWS Glossary HTML Injection Vulnerability
     43. CityPost PHP LNKX Message.PHP Cross-Site Scripting Vulnerabi...
     44. CityPost PHP Image Editor M1 URI Parameter Cross-Site Script...
     45. CityPost PHP Image Editor M2 URI Parameter Cross-Site Script...
     46. CityPost PHP Image Editor M3 URI Parameter Cross-Site Script...
     47. CityPost PHP Image Editor Imgsrc URI Parameter Cross-Site Sc...
     48. CityPost PHP Image Editor M4 URI Parameter Cross-Site Script...
     49. CityPost Simple PHP Upload Simple-upload-53.PHP Cross-Site S...
     50. GeneWeb Maintainer Scripts Unspecified Insecure File Operati...
     51. WheresJames Webcam Publisher Web Server Buffer Overflow Vuln...
     52. RealNetworks RealPlayer Enterprise RAM File Parsing Buffer O...
     53. Adobe Acrobat Reader Unspecified File Parsing Memory Corrupt...
     54. Linux Kernel Unw_Unwind_To_User Local Denial of Service Vuln...
     55. Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerabi...
     56. Sun Java System Web Proxy Server Multiple Unspecified Remote...
     57. MPlayer RTSP Server Line Response Remote Buffer Overflow Vul...
     58. MPlayer MMST Stream ID Remote Buffer Overflow Vulnerability
     59. AZ Bulletin Board Remote File Include Vulnerability
     60. Logwatch Secure Script Denial Of Service Vulnerability
     61. ECommProV3 Admin/Login.ASP SQL Injection Vulnerability
     62. Netref Cat_for_gen.PHP Remote PHP Script Injection Vulnerabi...
     63. PHP Labs proFile Dir URI Variable Cross-Site Scripting Vulne...
     64. AZ Bulletin Board Attachment Parameter Remote Directory Trav...
     65. AZ Bulletin Board Directory Traversal Vulnerability
     66. Ocean12 Calendar Manager Admin Form SQL Injection Vulnerabil...
     67. Real Networks Helix Player Unspecified Vulnerability
     68. Neslo Desktop Rover Malformed Packet Remote Denial Of Servic...
     69. PHP Labs proFile File URI Variable Cross-Site Scripting Vuln...
     70. PHPBB-Auction Module Auction_Rating.PHP SQL Injection Vulner...
     71. PHPBB-Auction Module Auction_Offer.PHP SQL Injection Vulnera...
     72. DUportal Pro Multiple SQL Injection Vulnerabilities
     73. PHProjekt Chatroom Text Submission HTML Injection Vulnerabil...
     74. Coppermine Photo Gallery Favs SQL Injection Vulnerability
     75. DUportal/DUportal SQL Multiple SQL Injection Vulnerabilities
     76. Coppermine Photo Gallery ZipDownload.PHP SQL Injection Vulne...
     77. GNU GZip Filename Directory Traversal Vulnerability
     78. CPIO Filename Directory Traversal Vulnerability
     79. RaidenFTPD Unspecified Unauthorized File Access Vulnerabilit...
     80. NetMailshar Professional Webmail Service Directory Traversal...
     81. Yawcam Directory Traversal Vulnerability
     82. NetMailshar Professional Username Information Disclosure Vul...
     83. FlexPHPNews News.PHP SQL Injection Vulnerability
     84. IBM iSeries AS400 FTP Service Directory Traversal Vulnerabil...
     85. ProfitCode Software PayProCart Username Cross-Site Scripting...
     86. Microsoft Windows ASN.1 Library Bit String Processing Varian...
     87. MediaWiki Unspecified HTML Tidy Cross-Site Scripting Vulnera...
     88. ProfitCode Software PayProCart ChckOutAction Cross-Site Scri...
     89. ProfitCode Software PayProCart Ckprvd Cross-Site Scripting V...
     90. ProfitCode Software PayProCart PageID Cross-Site Scripting V...
     91. ProfitCode Software PayProCart AdminShop HDoc Cross-Site Scr...
     92. ProfitCode Software PayProCart AdminShop ModID Cross-Site Sc...
     93. ProfitCode Software PayProCart AdminShop TaskID Cross-Site S...
     94. ProfitCode Software PayProCart AdminShop ProMod Cross-Site S...
     95. ProfitCode Software PayProCart AdminShop MMActionComm Cross-...
     96. Raz-Lee Security+++ Suite Input Validation Vulnerability
     97. Palace Guard Software Secure/NET+ Input Validation Vulnerabi...
     98. PowerTech PowerLock Input Validation Vulnerability
     99. KDE Kommander Unspecified Arbitrary Script Execution Vulnera...
     100. MailEnable HTTPMail Connector Unspecified Security Vulnerabi...
III. SECURITYFOCUS NEWS ARTICLES
     1. Microsoft's reveals hardware security plans, concerns remain
     2. Privacy watchdog warns job seekers to beware
     3. Teenagers struggle with privacy, security issues
     4. Web attacks soar
     5. Failing UK cyber defences need overhaul
     6. MoD suppliers' laptop turns up on rubbish tip
IV. SECURITYFOCUS TOP 6 TOOLS
     1. LC 5 5
     2. Umbrella v0.6
     3. Auditor security collection 120305-01
     4. Ntprint 0.1a
     5. TFTP bruteforcer 0.1
     6. SNMP fuzzer 0.1.1
V. SECURITYJOBS LIST SUMMARY
     1. [SJ-JOB] Jr. Security Analyst, Sierra Vista, US (Thread)
     2. [SJ-JOB] Disaster Recovery Coordinator, Arlington, U... (Thread)
     3. [SJ-JOB] Manager, Information Security, Mt Laurel, U... (Thread)
     4. [SJ-JOB] Security Consultant, Chicago, US (Thread)
     5. [SJ-JOB] Security Engineer, Burbank, US (Thread)
     6. [SJ-JOB] Security Engineer, Mountain View, US (Thread)
     7. [SJ-JOB] Security Engineer, Penninsula,CA, US (Thread)
     8. [SJ-JOB] Information Assurance Engineer, McLean, US (Thread)
     9. [SJ-JOB] Security Product Manager, San Francisco - B... (Thread)
     10. [SJ-JOB] Security Engineer, New York City, US (Thread)
     11. [SJ-JOB] Manager, Information Security, Haywards Hea... (Thread)
     12. [SJ-JOB] Disaster Recovery Coordinator, Haywards Hea... (Thread)
     13. [SJ-JOB] Security Consultant, Haywards Heath, GB (Thread)
     14. [SJ-JOB] Security Researcher, San Jose, US (Thread)
     15. [SJ-JOB] Sr. Security Analyst, Harrisburg , US (Thread)
     16. [SJ-JOB] Manager, Information Security, Indianapolis... (Thread)
     17. [SJ-JOB] Manager, Information Security, Saint Louis,... (Thread)
     18. [SJ-JOB] CSO, Saint Louis, US (Thread)
     19. [SJ-JOB] Director, Computer Security, Saint Louis, U... (Thread)
     20. [SJ-JOB] Sr. Security Engineer, Saint Louis, US (Thread)
     21. [SJ-JOB] Application Security Engineer, Chicago, US (Thread)
     22. [SJ-JOB] Product Strategist, Seattle, US (Thread)
     23. [SJ-JOB] Security Product Marketing Manager, San Jos... (Thread)
     24. [SJ-JOB] Sr. Security Engineer, San Jose, US (Thread)
     25. [SJ-JOB] Manager, Information Security, Charlotte, U... (Thread)
     26. [SJ-JOB] Sales Representative, Atlanta, US (Thread)
     27. [SJ-JOB] Sales Representative, Dallas, US (Thread)
     28. [SJ-JOB] Sales Representative, Mountain View, US (Thread)
     29. [SJ-JOB] Sr. Security Engineer, Santa Barbara, US (Thread)
     30. [SJ-JOB] Security Consultant, Dallas, US (Thread)
     31. [SJ-JOB] Security System Administrator, New York, US (Thread)
     32. [SJ-JOB] Security Consultant, new York, US (Thread)
     33. [SJ-JOB] Manager, Information Security, New York, US (Thread)
     34. [SJ-JOB] Security Engineer, London, GB (Thread)
     35. [SJ-JOB] Sr. Security Engineer, New York, US (Thread)
     36. [SJ-JOB] Director, Information Security, Reston, US (Thread)
     37. [SJ-JOB] Security Architect, Chicago, US (Thread)
     38. [SJ-JOB] VP, Information Security, Reston, US (Thread)
     39. [SJ-JOB] Security Architect, Bethesda, US (Thread)
     40. [SJ-JOB] Security System Administrator, Dublin , IE (Thread)
     41. [SJ-JOB] Sr. Security Engineer, Atlanta, US (Thread)
     42. [SJ-JOB] Security Engineer, Dublin, IE (Thread)
     43. [SJ-JOB] Developer, Ann Arbor, US (Thread)
     44. [SJ-JOB] Quality Assurance, Ann Arbor, US (Thread)
     45. [SJ-JOB] Security System Administrator, Mountain Vie... (Thread)
     46. [SJ-JOB] Sr. Security Analyst, Brussels, BE (Thread)
     47. [SJ-JOB] Security Engineer, Portland, US (Thread)
     48. [SJ-JOB] Account Manager, Herndon, US (Thread)
     49. [SJ-JOB] Account Manager, Houston, US (Thread)
     50. [SJ-JOB] Account Manager, Dallas, US (Thread)
VI. INCIDENTS LIST SUMMARY
     1. New variant against phpBB2? (Thread)
VII. VULN-DEV RESEARCH LIST SUMMARY
     1. why chmod race conditions are bad (Thread)
     2. Recon 2005 - Speakers list (Thread)
     3. MS05-021 Microsoft Exchange X-LINK2STATE Heap Overfl... (Thread)
VIII. MICROSOFT FOCUS LIST SUMMARY
     1. SecurityFocus Microsoft Newsletter #237 (Thread)
     2. Windows Server 2003 Service Pack 1 (Thread)
IX. SUN FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2005-04-19 to 2005-04-26.
X. LINUX FOCUS LIST SUMMARY
     1. Any way to automatically change arbitrary headers of... (Thread)
XI. UNSUBSCRIBE INSTRUCTIONS
XII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Apple's Big Virus
By Kelly Martin
After your identity has been stolen, your bank accounts compromised, 53
critical patches and 27 reboots later, when will you decide that you've had
enough?
http://www.securityfocus.com/columnists/319

2. Bluetooth Security Review, Part 1
By Marek Bialoglowy
This two-part series looks at Bluetooth security and privacy issues,
including methods of detection, data loss prevention and social engineering.
http://www.securityfocus.com/infocus/1830

3. Security for the Paranoid
By Mark Burnett
Paranoia is the key to success in the security world. Is it time to worry
when other security professionals consider you too paranoid?
http://www.securityfocus.com/columnists/320

II. BUGTRAQ SUMMARY
-------------------
1. Apple WebCore Framework XMLHttpRequests Remote Code Executio...
BugTraq ID: 13202
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13202
Summary:
A remote code execution vulnerability affects Apple's WebCore Framework.  This
issue is due to a failure of the affected framework library to securely handle
remote scripts.

An attacker may leverage this issue to execute arbitrary code with the
privileges of a user that activated the malicious remote script, facilitating
unauthorized access and privilege escalation.

2. IBM AIX Journaled File System Memory Disclosure Vulnerabilit...
BugTraq ID: 13204
Remote: No
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13204
Summary:
An information disclosure vulnerability affects IBM AIX.  This issue is due to a
serialization error.

This issue may result in the disclosure of potentially sensitive information.

3. Webmin And Usermin Configuration File Unauthorized Access Vu...
BugTraq ID: 13205
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13205
Summary:
Usermin and Webmin are affected by a configuration file access validation
vulnerability. This issue is due to a design error that causes certain
configuration files to be assigned insecure permissions.

An attacker may leverage this issue to gain access to various, potentially
sensitive system configuration files.  This may facilitate privilege escalation
or other attacks.

4. Ariadne CMS Remote File Include Vulnerability
BugTraq ID: 13206
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13206
Summary:
A remote file include vulnerability affects Ariadne CMS.  This issue is due to a
failure of the application to validate critical parameters before using them in
a 'require_once()' function call.

An attacker may leverage this issue to execute arbitrary server-side script code
on an affected computer with the privileges of the Web server process. This may
facilitate unauthorized access.

5. Apple Mac OS X Kernel Syscall Emulation Buffer Overflow Vuln...
BugTraq ID: 13207
Remote: No
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13207
Summary:
A heap-based buffer overflow vulnerability affects Apple Mac OS X. This issue is
due to a failure of the application to securely manage user-supplied data when
copying it into sensitive memory space while managing syscall emulation
functionality.

An attacker may leverage this issue to cause a denial of service condition and
potentially execute code with kernel level privileges.

It should be noted that this issue was previously reported in BID 13203 (Apple
Mac OS X Kernel Multiple Local Privilege Escalation And Denial Of Service
Vulnerabilities); it has been assigned its own BID.

6. PHPBB Remote Mod.PHP SQL Injection Vulnerability
BugTraq ID: 13209
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13209
Summary:
A remote SQL injection vulnerability affects the datenbank module for phpbb.
This issue is due to a failure of the application to properly sanitize
user-supplied input prior to including it in SQL queries.

An attacker may exploit this issue to manipulate SQL queries to the underlying
database.  This may facilitate theft sensitive information, potentially
including authentication credentials, and data corruption.

7. Datenbank Module For PHPBB Remote Mod.PHP Cross-Site Scripti...
BugTraq ID: 13210
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13210
Summary:
A remote cross-site scripting vulnerability affects the datenbank module for
phpbb.  This issue is due to a failure of the application to properly sanitize
user-supplied input prior to including it in dynamically generated Web content.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

8. Mozilla Suite And Firefox Search Plug-In Remote Script Code ...
BugTraq ID: 13211
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13211
Summary:
A remote script code execution vulnerability affects Mozilla Suite and Mozilla
Firefox.  This issue is due to a failure of the application to provide secure
access validation prior to carrying out remotely supplied script code execution.

An attacker may leverage this issue to execute arbitrary code in the context of
a Web site that is being viewed by an unsuspecting user; if the Web page being
viewed is a privileged page, remote code execution is possible.  This may
facilitate cross-site scripting as well as a compromise of an affected computer.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

9. eGroupWare Multiple Cross-Site Scripting and SQL Injection V...
BugTraq ID: 13212
Remote: Unknown
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13212
Summary:
eGroupWare is prone to multiple input validation vulnerabilities.  A fixed
version is available.

The issues arise due to a failure of the application to properly validate
user-supplied input.  These issues result in cross-site scripting and SQL
injection attacks.

10. MVNForum Search Cross-Site Scripting Vulnerability
BugTraq ID: 13213
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13213
Summary:
mvnForum is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

11. IBM OS/400 Incoming Remote Command Denial of Service Vulnera...
BugTraq ID: 13214
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13214
Summary:
IBM OS/400 is prone to a remote denial of service vulnerability.  The issue
arises when the Incoming Remote Command service processes specifically malformed
data.

12. Multiple Vendor TCP Session Acknowledgement Number Denial Of...
BugTraq ID: 13215
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13215
Summary:
Multiple Vendor TCP/IP stack implementations are reported prone to a denial of
service vulnerability. 

A report indicates that the vulnerability manifests when an erroneous TCP
acknowledgement number is encountered in an active TCP session stream.

A successful attack may result in a degradation of the target connection,
effectively denying service for legitimate users. Additionally, reports indicate
that the computer being attacked may suffer CPU performance degradation,
potentially denying service for local users too.

13. Mozilla Suite And Firefox Favicon Link Tag Remote Script Cod...
BugTraq ID: 13216
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13216
Summary:
A remote script code execution vulnerability affects Mozilla Suite and Mozilla
Firefox.  This issue is due to a failure of the application to deny remote
unauthorized access to trusted local interfaces.

An attacker may be able to exploit this issue to execute arbitrary script code
with the privileges of an unsuspecting user that activated the affected Web
browser. This may facilitate the installation and execution of malicious
applications on an affected computer.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

14. CVS Unspecified Buffer Overflow And Memory Access Vulnerabil...
BugTraq ID: 13217
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13217
Summary:
CVS is prone to unspecified buffer overflow, memory access vulnerabilities, and
a NULL pointer dereference denial of service.

It is conjectured that the issues may be leveraged by a remote authenticated
user to disclose regions of the CVS process memory, and to corrupt CVS process
memory. The two issues combined may lead to a remote attacker reliably executing
arbitrary code in the context of the vulnerable process, although this is not
confirmed. 

This BID will be updated as soon as further information is made available.

15. Coppermine Photo Gallery X-Forwarded-For Logging HTML Inject...
BugTraq ID: 13218
Remote: Yes
Date Published: Apr 15 2005
Relevant URL: http://www.securityfocus.com/bid/13218
Summary:
Coppermine Photo Gallery is prone to an HTML injection vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input before writing it into log files.

Attacker-supplied HTML and script code would be able to access properties of the
site, potentially allowing for theft of cookie-based authentication credentials.
An attacker could also exploit this issue to control how the site is rendered to
the user; other attacks are also possible.

16. Apple Mac OS X Kernel NFS Mount Denial Of Service Vulnerabil...
BugTraq ID: 13221
Remote: No
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13221
Summary:
Apple Mac OS X is prone to a local denial of service vulnerability.  This issue
exists in Kernel NFS mount functionality and may permit a local attacker to
crash the vulnerable computer.

It should be noted that this issue was previously reported in BID 13203 (Apple
Mac OS X Kernel Multiple Local Privilege Escalation And Denial Of Service
Vulnerabilities); it has been assigned its own BID.

17. Apple Mac OS X Kernel Executable File Denial Of Service Vuln...
BugTraq ID: 13222
Remote: No
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13222
Summary:
Apple Mac OS X is prone to a local denial of service vulnerability.  This issue
is exposed when the Mac OS X kernel processes an executable file, causing
temporary interruption of services on the computer.

It should be noted that this issue was previously reported in BID 13203 (Apple
Mac OS X Kernel Multiple Local Privilege Escalation And Denial Of Service
Vulnerabilities); it has been assigned its own BID.

18. Apple Mac OS X Kernel Setsockopt Local Denial Of Service Vul...
BugTraq ID: 13223
Remote: No
Date Published: Apr 15 2005
Relevant URL: http://www.securityfocus.com/bid/13223
Summary:
A local denial of service vulnerability affects Apple Mac OS X.  The vendor
reports that the kernel 'setsockopt()' function fails to properly validate
user-supplied arguments. 

This issue may allow a local attacker to exhaust computer memory and ultimately
trigger a denial of service condition.

It should be noted that this issue was previously reported in BID 13203 (Apple
Mac OS X Kernel Multiple Local Privilege Escalation And Denial Of Service
Vulnerabilities); it has been assigned its own BID.

19. Apple Mac OS X Kernel Semop Local Stack-Based Buffer Overflo...
BugTraq ID: 13225
Remote: No
Date Published: Apr 15 2005
Relevant URL: http://www.securityfocus.com/bid/13225
Summary:
A kernel stack overflow that presents itself in the 'semop()' system call exists
in the Apple Mac OS X kernel. This is due to a failure of the affected function
to properly handle certain user-supplied arguments.  

Exploitation of this issue will facilitate code execution with kernel level
(ring 0) privileges.

It should be noted that this issue was previously reported in BID 13203 (Apple
Mac OS X Kernel Multiple Local Privilege Escalation And Denial Of Service
Vulnerabilities); it has been assigned its own BID.

20. PMSoftware Simple Web Server Remote Buffer Overflow Vulnerab...
BugTraq ID: 13227
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13227
Summary:
A remote buffer overflow vulnerability affects PMSoftware Simple Web Server.
This issue is due to a failure of the application to properly validate the
length of user-supplied strings prior to copying them into static process
buffers.

An attacker may exploit this issue to execute arbitrary code with the privileges
of the user that activated the vulnerable application. This may facilitate
unauthorized access or privilege escalation.

21. Mozilla Firefox PLUGINSPAGE Remote Script Code Execution Vul...
BugTraq ID: 13228
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13228
Summary:
A remote script code execution vulnerability affects Mozilla Firefox.  This
issue is due to a failure of the application to deny remote unauthorized access
to malicious Plugin Finder Service links.

An attacker may be able to exploit this issue to execute arbitrary script code
with the privileges of an unsuspecting user that activated the affected Web
browser. This may facilitate the installation and execution of malicious
applications, subsequently facilitating unauthorized access.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

22. Mozilla Suite And Firefox Blocked Pop-Up Window Remote Scrip...
BugTraq ID: 13229
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13229
Summary:
A remote script code execution vulnerability affects Mozilla Suite and Mozilla
Firefox.  This issue is due to a failure of the application to execute
JavaScript in blocked pop-up windows securely.

An attacker may be able to exploit this issue to execute arbitrary script code
with the privileges of an unsuspecting user that activated the affected Web
browser. This may facilitate the installation and execution of malicious
applications, subsequently facilitating unauthorized access.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

23. Mozilla Suite And Firefox Global Scope Pollution Cross-Site ...
BugTraq ID: 13230
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13230
Summary:
A remote cross-site scripting vulnerability affects Mozilla Suite and Mozilla
Firefox.  This issue is due to a failure of the application to properly clear
stored parameters.

An attacker may exploit this issue to execute arbitrary script code in the
context of a page that is currently being viewed. This may facilitate the theft
of cookie based authentication credentials as well a other attacks.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

24. Mozilla Firefox Search Target Sidebar Panel Script Code Exec...
BugTraq ID: 13231
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13231
Summary:
A remote script code execution vulnerability affects Mozilla Firefox.  This
issue is due to a failure of the application to securely run script code
targeted at the sidebar panel.

An attacker may be able to exploit this issue to execute arbitrary script code
with the privileges of an unsuspecting user that activated the affected Web
browser. This may facilitate the installation and execution of malicious
applications, subsequently facilitating unauthorized access.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

25. Mozilla Suite And Firefox XPInstall JavaScript Object Instan...
BugTraq ID: 13232
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13232
Summary:
Mozilla Suite and Mozilla Firefox are affected by an input validation
vulnerability.  This issue is due to a failure in the application to verify
input passed to installation objects.

An attacker may be able to exploit this issue to execute malicious code in the
context of the affected browser, subsequently facilitating unauthorized access.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

26. Mozilla Suite And Firefox Document Object Model Nodes Code E...
BugTraq ID: 13233
Remote: Yes
Date Published: Apr 16 2005
Relevant URL: http://www.securityfocus.com/bid/13233
Summary:
Mozilla Suite and Mozilla Firefox are affected by a code execution
vulnerability.  This issue is due to a failure in the application to properly
verify Document Object Model (DOM) property values.

An attacker may leverage this issue to execute arbitrary code with the
privileges of the user that activated the vulnerable Web browser, ultimately
facilitating a compromise of the affected computer.

It should be noted that this issue was previously reported in BID 13208 (Mozilla
Suite Multiple Code Execution, Cross-Site Scripting, And Policy Bypass
Vulnerabilities); it has been assigned its own BID.

27. Apple Mac OS X AppleFilingProtocol Server Information Disclo...
BugTraq ID: 13237
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13237
Summary:
The Mac OS X AppleFilingProtocol (AFP) Server is prone to an information
disclosure vulnerability.  The issue arises because file permissions are not
properly validated.

28. Oracle Database Server InterMedia Denial of Service Vulnerab...
BugTraq ID: 13239
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13239
Summary:
There is a denial of service vulnerability in Oracle Database Server.  This
issue is a result of a failure in the application to properly sanitize
user-supplied input.

This issue affects the Intermedia component and requires SQL (Oracle Net)
access.    A successful attack can compromise the availability of a vulnerable
server.

Oracle has released a Critical Patch Update to address this issue.

It should be noted that this issue was previously reported in BID 13139 (Oracle
Multiple Vulnerabilities); it has been assigned its own BID.

29. F5 BIG-IP User Interface Login Credential Caching Vulnerabil...
BugTraq ID: 13240
Remote: Yes
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13240
Summary:
A vulnerability is present in the F5 BIG-IP user interface.

This issue exists because the Configuration utility does not check the
credentials for additional sessions from a user once they are logged in.

Versions 9.0.2 through to 9.0.4 of BIG-IP are reported vulnerable to this issue.

30. Sun Solaris Non-Privileged Network Port Hijacking Vulnerabil...
BugTraq ID: 13241
Remote: No
Date Published: Apr 18 2005
Relevant URL: http://www.securityfocus.com/bid/13241
Summary:
Sun Solaris is prone to a vulnerability that may allow local attackers to hijack
non-privileged ports.  An attacker could abuse this to run malicious or rogue
services.

31. McAfee Internet Security Suite Local Insecure Default Permis...
BugTraq ID: 13242
Remote: No
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13242
Summary:
A local insecure default permissions vulnerability affects McAfee Internet
Security Suite.  This issue is due to a failure of the application to install
with secure permissions.

An local attacker may leverage this issue to gain SYSTEM privileges and disable
Internet-based security applications.

32. XV Image Decoders Multiple Unspecified Input Validation Vuln...
BugTraq ID: 13243
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13243
Summary:
Multiple unspecified input validation vulnerabilities affect xv.  These issues
are due to a failure of the application to properly sanitize input prior to
using it to carry out critical functions.

Although unconfirmed, it is likely that these issues may be exploited to cause
the affected application to crash, and potentially execute arbitrary commands or
machine code. This BID will be updated and potentially split into seperate BIDs
with the release of further details.

33. XV Planetary Data System Image Decoder Unspecified Input Val...
BugTraq ID: 13244
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13244
Summary:
An unspecified input validation vulnerability affects xv.  This issues is due to
a failure of the application to properly sanitize input prior to using it to
carry out critical functions.

Although unconfirmed, it is likely that these issues may be exploited to cause
the affected application to crash, and potentially execute arbitrary commands or
machine code. This BID will be updated with the release of further details.

Reportedly this issue is distinct from those outlined in BID 13243 (XV Image
Decoders Multiple Unspecified Input Validation Vulnerabilities).

34. XV Planetary Data System Image Decoder Format String Vulnera...
BugTraq ID: 13245
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13245
Summary:
A remote, client-side format string vulnerability affects xv.  This issue is due
to a failure of the application to securely implement a formatted printing
function.

An attacker may leverage this issue to execute arbitrary code with the
privileges of an unsuspecting user that activated the vulnerable utility.

35. XV Tagged Image File Format Image Decoder Format String Vuln...
BugTraq ID: 13246
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13246
Summary:
A remote, client-side format string vulnerability affects xv.  This issue is due
to a failure of the application to securely implement a formatted printing
function.

An attacker may leverage this issue to execute arbitrary code with the
privileges of an unsuspecting user that activated the vulnerable utility.

36. XV Image File Name Remote Command Execution Vulnerability
BugTraq ID: 13247
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13247
Summary:
A remote, client-side command execution vulnerability affects xv. This issue is
due to a failure of the application to properly sanitize input prior to using it
to carry out critical functions.

An attacker may leverage this issue to execute arbitrary commands with the
privileges on an unsuspecting user.

37. Microsoft Windows Explorer Preview Pane Script Injection Vul...
BugTraq ID: 13248
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13248
Summary:
Microsoft Windows Explorer is prone to a script injection vulnerability.  This
occurs when the Windows Explorer preview pane is enabled on Windows 2000
computers.  If a file with malicious attributes is selected using Explorer,
script code contained in the attribute fields may be executed with the privilege
level of the user that invoked Explorer.  This could be exploited to gain
unauthorized access to the vulnerable computer.

38. OneWorldStore DisplayResults.ASP SQL Injection Vulnerability
BugTraq ID: 13249
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13249
Summary:
OneWorldStore is prone to an SQL injection vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input before
using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

39. WebcamXP Chat Name HTML Code Injection Vulnerability
BugTraq ID: 13250
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13250
Summary:
A problem with WebcamXP Chat page could allow remote users to execute arbitrary
code in the context of the web site running WebcamXP Chat. The problem occurs
due to the lack of sanitization performed on user-supplied input.

As a result, a malicious user may have the ability to submit a post to the site
containing embedded HTML code. This code would be executed by a user's browser
in the context of the vulnerable site.

It should be noted that although this vulnerability has been reported to affect
WebcamXP version 1.07.80, previous versions might also be affected.

40. OneWorldStore DisplayResults.ASP Cross-Site Scripting Vulner...
BugTraq ID: 13251
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13251
Summary:
OneWorldStore is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

41. Info2www Cross-Site Scripting Vulnerability
BugTraq ID: 13252
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13252
Summary:
Info2www is prone to a cross-site scripting vulnerability.  This could allow an
attacker to place a link that appears safe on a Web page but that will in fact
cause script code to be executed in a user's browser.

42. JAWS Glossary HTML Injection Vulnerability
BugTraq ID: 13254
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13254
Summary:
JAWS is prone to an HTML injection vulnerability in the Glossary module.  The
module fails to sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

43. CityPost PHP LNKX Message.PHP Cross-Site Scripting Vulnerabi...
BugTraq ID: 13255
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13255
Summary:
CityPost PHP LNKX is affected by a cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input to the 'message.php' script.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

44. CityPost PHP Image Editor M1 URI Parameter Cross-Site Script...
BugTraq ID: 13256
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13256
Summary:
CityPost Image Cropper/Resizer is affected by a cross-site scripting
vulnerability.  This issue is due to a failure in the application to properly
sanitize user-supplied input to the 'image-editor-52.php' script.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

45. CityPost PHP Image Editor M2 URI Parameter Cross-Site Script...
BugTraq ID: 13257
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13257
Summary:
CityPost Image Cropper/Resizer is affected by a cross-site scripting
vulnerability.  This issue is due to a failure in the application to properly
sanitize user-supplied input to the 'image-editor-52.php' script.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

46. CityPost PHP Image Editor M3 URI Parameter Cross-Site Script...
BugTraq ID: 13258
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13258
Summary:
CityPost Image Cropper/Resizer is affected by a cross-site scripting
vulnerability.  This issue is due to a failure in the application to properly
sanitize user-supplied input to the 'image-editor-52.php' script.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

47. CityPost PHP Image Editor Imgsrc URI Parameter Cross-Site Sc...
BugTraq ID: 13259
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13259
Summary:
CityPost Image Cropper/Resizer is affected by a cross-site scripting
vulnerability.  This issue is due to a failure in the application to properly
sanitize user-supplied input to the 'image-editor-52.php' script.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

48. CityPost PHP Image Editor M4 URI Parameter Cross-Site Script...
BugTraq ID: 13260
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13260
Summary:
CityPost Image Cropper/Resizer is affected by a cross-site scripting
vulnerability.  This issue is due to a failure in the application to properly
sanitize user-supplied input to the 'image-editor-52.php' script.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

49. CityPost Simple PHP Upload Simple-upload-53.PHP Cross-Site S...
BugTraq ID: 13261
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13261
Summary:
CityPost Simple PHP Upload is affected by a cross-site scripting vulnerability. 
This issue is due to a failure in the application to properly sanitize
user-supplied input to the 'simple-upload-53.php' script.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

50. GeneWeb Maintainer Scripts Unspecified Insecure File Operati...
BugTraq ID: 13262
Remote: No
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13262
Summary:
GeneWeb ships with maintainer scripts that are employed when upgrading or
installing the software. 

The GeneWeb maintainer scripts are reported prone to an unspecified insecure
file operation.

This issue may lead to modification of arbitrary files with the context of the
user that is running the maintainer scripts.

51. WheresJames Webcam Publisher Web Server Buffer Overflow Vuln...
BugTraq ID: 13263
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13263
Summary:
A problem exists in the handling of remote web requests by the WheresJames
Webcam Publisher software.  Because of this, it may be possible for a remote
attacker to gain unauthorized access to a vulnerable system.

52. RealNetworks RealPlayer Enterprise RAM File Parsing Buffer O...
BugTraq ID: 13264
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13264
Summary:
RealNetworks RealPlayer Enterprise is reported prone to a buffer overflow
vulnerability. It is reported that the issue manifests when a malicious RAM file
is parsed.

A remote attacker may exploit this vulnerability to execute arbitrary code in
the context of a user that uses a vulnerable version of the media player to load
a malicious RAM file.

53. Adobe Acrobat Reader Unspecified File Parsing Memory Corrupt...
BugTraq ID: 13265
Remote: Yes
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13265
Summary:
Adobe Acrobat Reader is alleged to be prone to a memory corruption
vulnerability. It is reported that the issue presents itself when the affected
software is processing malformed files. 

It is reported that this issue may be leveraged to execute arbitrary code in the
context of an application that is linked to the vulnerable library.

54. Linux Kernel Unw_Unwind_To_User Local Denial of Service Vuln...
BugTraq ID: 13266
Remote: No
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13266
Summary:
A local denial of service vulnerability affects the Linux kernel.

A local attacker may leverage this issue to cause an affected Linux kernel to
panic, effectively denying service to legitimate users.

55. Linux Kernel Fib_Seq_Start Local Denial of Service Vulnerabi...
BugTraq ID: 13267
Remote: No
Date Published: Apr 19 2005
Relevant URL: http://www.securityfocus.com/bid/13267
Summary:
A local denial of service vulnerability affects the Linux kernel.

A local attacker may leverage this issue to cause an affected Linux kernel to
panic, effectively denying service to legitimate users.

Although only the Linux kernel version 2.6.9 is reported vulnerable, it is
likely that other versions are vulnerable as well.

56. Sun Java System Web Proxy Server Multiple Unspecified Remote...
BugTraq ID: 13268
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13268
Summary:
Sun Java System Web Proxy Server is prone to multiple unspecified remote buffer
overflow vulnerabilities.  

Successful exploitation will permit remote attackers to execute arbitrary code
in the context of the server.

57. MPlayer RTSP Server Line Response Remote Buffer Overflow Vul...
BugTraq ID: 13270
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13270
Summary:
A remote heap-based buffer overflow vulnerability affects MPlayer. This issue is
due to a failure of the application to properly validate the length of
user-supplied strings prior to copying them into static process buffers.

An attacker may exploit this issue to execute arbitrary code with the privileges
of the user that activated the vulnerable application. This may facilitate
unauthorized access or privilege escalation.

58. MPlayer MMST Stream ID Remote Buffer Overflow Vulnerability
BugTraq ID: 13271
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13271
Summary:
A remote heap-based buffer overflow vulnerability affects MPlayer. This issue is
due to a failure of the application to properly validate the length of
user-supplied strings prior to copying them into static process buffers.

An attacker may exploit this issue to execute arbitrary code with the privileges
of the user that activated the vulnerable application. This may facilitate
unauthorized access or privilege escalation.

59. AZ Bulletin Board Remote File Include Vulnerability
BugTraq ID: 13272
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13272
Summary:
A remote file include vulnerability affects AZ Bulletin Board. This issue is due
to a failure of the application to validate ciritcal parameters before using
them in a 'include()' function call.

An attacker may leverage this issue to execute arbitrary server-side script code
on an affected computer with the privileges of the Web server process. This may
facilitate unauthorized access.

60. Logwatch Secure Script Denial Of Service Vulnerability
BugTraq ID: 13273
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13273
Summary:
Logwatch is prone to a denial of vulnerability in the secure script.  

This issue may be exploited by a local attacker who can inject a malicious
string into a log file, causing a denial of service condition.  As a result, the
utility may not detect subsequent malicious activity.

61. ECommProV3 Admin/Login.ASP SQL Injection Vulnerability
BugTraq ID: 13274
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13274
Summary:
EcommProV3 is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

62. Netref Cat_for_gen.PHP Remote PHP Script Injection Vulnerabi...
BugTraq ID: 13275
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13275
Summary:
A remote PHP script injection vulnerability affects Netref. This issue is due to
a failure of the application to sanitize user-supplied data.

An attacker may leverage this issue to execute arbitrary PHP script code in the
context of an affected Web server.  This will facilitate a compromise of the
host computer.

63. PHP Labs proFile Dir URI Variable Cross-Site Scripting Vulne...
BugTraq ID: 13276
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13276
Summary:
PHP Labs proFile is prone to a cross-site scripting vulnerability.  As a result,
attackers may embed hostile HTML and script code in a malicious link to the
affected application.  If the link is followed, the code may be rendered by the
victim's browser in the context of the vulnerable site.

Exploitation could allow theft of cookie-based authentication credentials or
other attacks.

64. AZ Bulletin Board Attachment Parameter Remote Directory Trav...
BugTraq ID: 13277
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13277
Summary:
A remote directory traversal vulnerability affects AZ Bulletin Board. This issue
is due to a failure of the application to sanitize user-supplied data prior to
using it to access the host computer's file system.

An attacker may leverage this issue to reveal the existence of arbitrary files
on an affected computer.

65. AZ Bulletin Board Directory Traversal Vulnerability
BugTraq ID: 13278
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13278
Summary:
A remote directory traversal vulnerability affects AZ Bulletin Board. This issue
is due to a failure of the application to sanitize user-supplied data prior to
using it to access the host computer's file system.

An attacker may leverage this issue to delete arbitrary files on an affected
computer with the privileges of the hosting Web server.

66. Ocean12 Calendar Manager Admin Form SQL Injection Vulnerabil...
BugTraq ID: 13279
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13279
Summary:
Ocean12 Calendar Manager is prone to an SQL injection vulnerability.  This issue
is due to a failure in the application to properly sanitize user-supplied input
before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

67. Real Networks Helix Player Unspecified Vulnerability
BugTraq ID: 13280
Remote: Unknown
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13280
Summary:
An unspecified vulnerability affects Real Networks Helix Player.  The cause of
this issue is currently unknown.

The potential impact of this issue is currently unknown; this BID will be
updated as more information is released.

It should be noted that it is likely that this issue corresponds with that
reported in BID 13264 (RealNetworks RealPlayer Enterprise RAM File Parsing
Buffer Overflow Vulnerability). If it is confirmed that this issue corresponds
to the RealPlayer issue, this BID will be retired.

Note: This BID is being retired as it has been confirmed that this issue
affecting Helix Player is the same issue affecting RealPlayer as reported in BID
13264 (RealNetworks RealPlayer Enterprise RAM File Parsing Buffer Overflow
Vulnerability).

68. Neslo Desktop Rover Malformed Packet Remote Denial Of Servic...
BugTraq ID: 13281
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13281
Summary:
Neslo Desktop Rover is prone to a remote denial of service. Reports indicate
that the software will crash when a malformed packet is processed on TCP port
61427.

A remote attacker may exploit this condition crash the software and effectively
deny service for legitimate users.

69. PHP Labs proFile File URI Variable Cross-Site Scripting Vuln...
BugTraq ID: 13282
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13282
Summary:
PHP Labs proFile is prone to a cross-site scripting vulnerability.  As a result,
attackers may embed hostile HTML and script code in a malicious link to the
affected application.  If the link is followed, the code may be rendered by the
victim's browser in the context of the vulnerable site.

Exploitation could allow theft of cookie-based authentication credentials or
other attacks.

70. PHPBB-Auction Module Auction_Rating.PHP SQL Injection Vulner...
BugTraq ID: 13283
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13283
Summary:
phpbb-auction module is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

71. PHPBB-Auction Module Auction_Offer.PHP SQL Injection Vulnera...
BugTraq ID: 13284
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13284
Summary:
phpbb-auction module is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

72. DUportal Pro Multiple SQL Injection Vulnerabilities
BugTraq ID: 13285
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13285
Summary:
DUportal Pro is prone to multiple SQL injection vulnerabilities.  These issues
exist because the application fails to properly sanitize user-supplied input
before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

These vulnerabilities are reported to affect DUportal Pro 3.4; earlier versions
may also be affected.

73. PHProjekt Chatroom Text Submission HTML Injection Vulnerabil...
BugTraq ID: 13286
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13286
Summary:
PHProjekt is prone to an HTML injection vulnerability in the Chatroom text
submission form.  The application fails to sanitize user-supplied input that is
in turn displayed to all users of the chatroom.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

74. Coppermine Photo Gallery Favs SQL Injection Vulnerability
BugTraq ID: 13287
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13287
Summary:
Coppermine is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

75. DUportal/DUportal SQL Multiple SQL Injection Vulnerabilities
BugTraq ID: 13288
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13288
Summary:
DUportal/DUportal SQL are prone to multiple SQL injection vulnerabilities. 
These issues exist because the application fails to properly sanitize
user-supplied input before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

These vulnerabilities are reported to affect DUportal/DUportal SQL 3.1.2;
earlier versions may also be affected.

76. Coppermine Photo Gallery ZipDownload.PHP SQL Injection Vulne...
BugTraq ID: 13289
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13289
Summary:
Coppermine is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

77. GNU GZip Filename Directory Traversal Vulnerability
BugTraq ID: 13290
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13290
Summary:
gzip is prone to a directory traversal vulnerability. The issue manifests when
gunzip is invoked on a malicious archive using the '-N' switch.

An archive containing an absolute path for a filename that contains '/'
characters, results in the file getting written using the absolute path
contained in the filename.

A remote attacker may leverage this issue using a malicious archive to corrupt
arbitrary files with the privileges of the user that is running the vulnerable
software.

78. CPIO Filename Directory Traversal Vulnerability
BugTraq ID: 13291
Remote: Yes
Date Published: Apr 20 2005
Relevant URL: http://www.securityfocus.com/bid/13291
Summary:
cpio is prone to a directory traversal vulnerability. The issue manifests when
cpio is invoked on a malicious archive.

An archive containing an absolute path for a filename that contains '/'
characters, results in the file getting written using the absolute path
contained in the filename.

A remote attacker may leverage this issue using a malicious archive to corrupt
arbitrary files with the privileges of the user that is running the vulnerable
software.

79. RaidenFTPD Unspecified Unauthorized File Access Vulnerabilit...
BugTraq ID: 13292
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13292
Summary:
RaidenFTPD is prone to an unspecified vulnerability that could allow
unauthorized access to files outside the FTP root.  Specific details of this
vulnerability are not currently known.

This issue was reported to affect all versions of RaidenFTPD prior to 2.4.2241.

80. NetMailshar Professional Webmail Service Directory Traversal...
BugTraq ID: 13293
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13293
Summary:
netMailshar Professional is prone to a directory traversal vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

This issue enables an attacker to disclose the contents of arbitrary files
normally accessible to the application.  Information gathered could be used to
in further attacks against the underlying system.

This issue is reported to affect netMailshar version 4; earlier versions may
also be vulnerable.

81. Yawcam Directory Traversal Vulnerability
BugTraq ID: 13295
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13295
Summary:
Yawcam is prone to a directory traversal vulnerability that could allow
attackers to read files outside the Web root.

82. NetMailshar Professional Username Information Disclosure Vul...
BugTraq ID: 13296
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13296
Summary:
netMailshar Professional is prone to an information disclosure vulnerability. 
This issue is due to the application responding with different messages with
regards to the validity of an entered username.

This issue is reported to affect netMailshar Professional version 4; earlier
versions may also be vulnerable.

83. FlexPHPNews News.PHP SQL Injection Vulnerability
BugTraq ID: 13297
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13297
Summary:
FlexPHPNews is prone to an SQL injection Vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

This issue is reported to affect FlexPHPNews version 0.0.3; earlier versions may
also be vulnerable.

84. IBM iSeries AS400 FTP Service Directory Traversal Vulnerabil...
BugTraq ID: 13298
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13298
Summary:
IBM iSeries AS400 FTP Service is susceptible to a directory traversal
vulnerability.

It has been conjectured that this vulnerability allows a remote attacker to read
files outside of the FTP document root directory. An attacker may read files
with the privileges of the FTP server process.

85. ProfitCode Software PayProCart Username Cross-Site Scripting...
BugTraq ID: 13299
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13299
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

86. Microsoft Windows ASN.1 Library Bit String Processing Varian...
BugTraq ID: 13300
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13300
Summary:
Microsoft ASN.1 handling library has been reported prone to a heap corruption
vulnerability. The issue presents itself in the ASN.1 bit string decoding
routines, specifically the BERDecBitString() function. The issue manifests when
the affected function attempts to process a constructed bit string that contain
another nested constructed bit string.

This vulnerability is exposed in a number of security related operating system
components, including Kerberos (via UDP port 88), Microsoft IIS with SSL support
enabled and NTLMv2 authentication (via TCP ports 135, 139 and 445).  Other
components may also be affected, though a comprehensive list is not available at
this time.  Client applications, which use the library, will be affected,
including LSASS.EXE and CRYPT32.DLL (and any application that relies on
CRYPT32.DLL).  The vulnerable library is used frequently in components that
handle certificates such as Internet Explorer and Outlook.  Handling of signed
ActiveX components could also present an exposure.

It should be noted that because ASN.1 data will likely be encoded, for example
Kerberos, SSL, IPSec or Base64 encoded, the malicious integer values may be
obfuscated and as a result not easily detectable.

Issues related to this vulnerability were originally covered in BID 9626 and
9743, further information has been made available which identifies that this is
a distinct vulnerability in the library and so this specific issue has been
assigned an individual BID.

87. MediaWiki Unspecified HTML Tidy Cross-Site Scripting Vulnera...
BugTraq ID: 13301
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13301
Summary:
MediaWiki is prone to an unspecified cross-site scripting vulnerability.  An
attacker may leverage these issues to have arbitrary script code executed in the
browser of an unsuspecting user.  This may facilitate the theft of cookie-based
authentication credentials as well as other attacks.

Versions of MediaWiki prior to 1.4.2 are vulnerable.

88. ProfitCode Software PayProCart ChckOutAction Cross-Site Scri...
BugTraq ID: 13302
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13302
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

89. ProfitCode Software PayProCart Ckprvd Cross-Site Scripting V...
BugTraq ID: 13303
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13303
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

90. ProfitCode Software PayProCart PageID Cross-Site Scripting V...
BugTraq ID: 13304
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13304
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

91. ProfitCode Software PayProCart AdminShop HDoc Cross-Site Scr...
BugTraq ID: 13305
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13305
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

92. ProfitCode Software PayProCart AdminShop ModID Cross-Site Sc...
BugTraq ID: 13306
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13306
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

93. ProfitCode Software PayProCart AdminShop TaskID Cross-Site S...
BugTraq ID: 13307
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13307
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

94. ProfitCode Software PayProCart AdminShop ProMod Cross-Site S...
BugTraq ID: 13308
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13308
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

95. ProfitCode Software PayProCart AdminShop MMActionComm Cross-...
BugTraq ID: 13309
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13309
Summary:
PayProCart is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

96. Raz-Lee Security+++ Suite Input Validation Vulnerability
BugTraq ID: 13310
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13310
Summary:
Raz-Lee Security+++ Suite is prone to an input validation vulnerability. Reports
indicate that the software fails to filter potentially dangerous character
sequences from user requests. In particular, directory traversal sequences are
not filtered by the product.

This vulnerability may lead to a false sense of security, where an administrator
believes that they are immune to certain attacks, when in reality they are
vulnerable.

97. Palace Guard Software Secure/NET+ Input Validation Vulnerabi...
BugTraq ID: 13311
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13311
Summary:
Palace Guard Software Secure/NET+ is prone to an input validation vulnerability.
Reports indicate that the software fails to filter potentially dangerous
character sequences from user requests. In particular, directory traversal
sequences are not filtered by the product.

This vulnerability may lead to a false sense of security, where an administrator
believes that they are immune to certain attacks, when in reality they are
vulnerable.

98. PowerTech PowerLock Input Validation Vulnerability
BugTraq ID: 13312
Remote: Yes
Date Published: Apr 21 2005
Relevant URL: http://www.securityfocus.com/bid/13312
Summary:
PowerTech PowerLock is prone to an input validation vulnerability. Reports
indicate that the software fails to filter potentially dangerous character
sequences from user requests. In particular, directory traversal sequences are
not filtered by the product.

This vulnerability may lead to a false sense of security, where an administrator
believes that they are immune to certain attacks, when in reality they are
vulnerable.

99. KDE Kommander Unspecified Arbitrary Script Execution Vulnera...
BugTraq ID: 13313
Remote: Yes
Date Published: Apr 22 2005
Relevant URL: http://www.securityfocus.com/bid/13313
Summary:
KDE Kommander is prone to a vulnerability that could allow arbitrary script code
to be executed without user interaction.  Such code would execute in the
security context of the user running Kommander.

This issue was reported to affect Quanta 3.1.x and KDE from 3.2 to 3.4.0.

100. MailEnable HTTPMail Connector Unspecified Security Vulnerabi...
BugTraq ID: 13314
Remote: Yes
Date Published: Apr 22 2005
Relevant URL: http://www.securityfocus.com/bid/13314
Summary:
MailEnable is prone to an unspecified vulnerability in the HTTPMail connector. 
Details of this issue are not available, however, it may result in a denial of
service condition.

This issue may be related to BID 13040 or 12833 but this is currently
unconfirmed.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Microsoft's reveals hardware security plans, concerns remain
By: Robert Lemos

The next version of Windows will have security features to take advantage of
trusted computing hardware, but worries remain that companies may use the
technology to lock users into their products.
http://www.securityfocus.com/news/11005

2. Privacy watchdog warns job seekers to beware
By: Robert Lemos

Would-be workers need to be more cautious with resume services and posting their
personal information online. Online fraudsters and scammers are waiting. 
http://www.securityfocus.com/news/10976

3. Teenagers struggle with privacy, security issues
By: Robert Lemos

High-school students have a message for parents: We understand the technology
better than you. Security and privacy? We're dealing with it.
http://www.securityfocus.com/news/10940

4. Web attacks soar
By: John Leyden, The Register

Web server attacks and website defacements rose 36 per cent last year, according
to an independent report. zone-h, the Estonian security firm best known for its
defacement archive, recorded 392,545 web attacks globally in 2004, up from
251,000 in 2003.
http://www.securityfocus.com/news/11028

5. Failing UK cyber defences need overhaul
By: John Leyden, The Register

The UK's National Infrastructure Security Co-ordination Centre (NISCC) needs
more powers to enforce security best practices in order to safeguard the
nation's critical systems against cyber-attack, according to a former chairman
of the Metropolitan Police Authority.

http://www.securityfocus.com/news/11027

6. MoD suppliers' laptop turns up on rubbish tip
By: John Leyden, The Register

An Oxfordshire-based security company claims to have found sensitive MoD-related
files on a laptop bought from council rubbish dump.
http://www.securityfocus.com/news/11014

IV. SECURITYFOCUS TOP 6 TOOLS
-----------------------------
1. LC 5 5
By: @stake
Relevant URL: http://www.atstake.com/products/lc/
Platforms: Windows 2000, Windows 95/98, Windows NT
Summary: 

LC 5 is the latest version of L0phtCrack, the award-winning password auditing
and recovery application used by thousands of companies worldwide.

Using multiple assessment methods, LC 5 reduces security risk by helping
administrators to:

    * Identify and remediate security vulnerabilities that result from the use
of weak or easily guessed passwords
    * Recover Windows and Unix account passwords to access user and
administrator accounts whose passwords are lost or to streamline migration of
users to another authentication system
    * Rapidly process accounts using pre-computed password tables* that contain
trillions of passwords

2. Umbrella v0.6
By: Umbrella
Relevant URL: http://umbrella.sourceforge.net/
Platforms: Linux
Summary: 

Umbrella is a security mechanism that implements a combination of Process-Based
Access Control (PBAC) and authentication of binaries through Digital Signed
Binaries (DSB). The scheme is designed for Linux-based consumer electronic
devices ranging from mobile phones to settop boxes.

Umbrella is implemented on top of the Linux Security Modules (LSM) framework.
The PBAC scheme is enforced by a set of restrictions on each process.

3. Auditor security collection 120305-01
By: Max Moser
Relevant URL: http://www.remote-exploit.org/
Platforms: Os Independent
Summary: 

The Auditor security collection is a Live-System based on KNOPPIX. With no
installation whatsoever, the analysis platform is started directly from the
CD-Rom and is fully accessible within minutes. Independent of the hardware in
use, the Auditor security collection offers a standardised working environment,
so that the build-up of know-how and remote support is made easier.

4. Ntprint 0.1a
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

Small NTP fingerprinter to find a remote host OS via an NTP server.

5. TFTP bruteforcer 0.1
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

Fast TFTP bruteforcer to guess the names of files stored on remote TFTP servers
(such as router configs).

6. SNMP fuzzer 0.1.1
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

SNMP fuzzing tool to discover SNMP implementation vulnerabilities and perform
SNMP agent stress testing.

V. SECURITYJOBS LIST SUMMARY
----------------------------
1. [SJ-JOB] Jr. Security Analyst, Sierra Vista, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396825

2. [SJ-JOB] Disaster Recovery Coordinator, Arlington, U... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396824

3. [SJ-JOB] Manager, Information Security, Mt Laurel, U... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396823

4. [SJ-JOB] Security Consultant, Chicago, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396822

5. [SJ-JOB] Security Engineer, Burbank, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396820

6. [SJ-JOB] Security Engineer, Mountain View, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396819

7. [SJ-JOB] Security Engineer, Penninsula,CA, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396817

8. [SJ-JOB] Information Assurance Engineer, McLean, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396816

9. [SJ-JOB] Security Product Manager, San Francisco - B... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396813

10. [SJ-JOB] Security Engineer, New York City, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396811

11. [SJ-JOB] Manager, Information Security, Haywards Hea... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396809

12. [SJ-JOB] Disaster Recovery Coordinator, Haywards Hea... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396808

13. [SJ-JOB] Security Consultant, Haywards Heath, GB (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396803

14. [SJ-JOB] Security Researcher, San Jose, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396672

15. [SJ-JOB] Sr. Security Analyst, Harrisburg , US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396671

16. [SJ-JOB] Manager, Information Security, Indianapolis... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396669

17. [SJ-JOB] Manager, Information Security, Saint Louis,... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396668

18. [SJ-JOB] CSO, Saint Louis, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396667

19. [SJ-JOB] Director, Computer Security, Saint Louis, U... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396666

20. [SJ-JOB] Sr. Security Engineer, Saint Louis, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396665

21. [SJ-JOB] Application Security Engineer, Chicago, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396664

22. [SJ-JOB] Product Strategist, Seattle, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396663

23. [SJ-JOB] Security Product Marketing Manager, San Jos... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396662

24. [SJ-JOB] Sr. Security Engineer, San Jose, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396661

25. [SJ-JOB] Manager, Information Security, Charlotte, U... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396660

26. [SJ-JOB] Sales Representative, Atlanta, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396659

27. [SJ-JOB] Sales Representative, Dallas, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396658

28. [SJ-JOB] Sales Representative, Mountain View, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396624

29. [SJ-JOB] Sr. Security Engineer, Santa Barbara, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396620

30. [SJ-JOB] Security Consultant, Dallas, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396611

31. [SJ-JOB] Security System Administrator, New York, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396608

32. [SJ-JOB] Security Consultant, new York, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396585

33. [SJ-JOB] Manager, Information Security, New York, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396579

34. [SJ-JOB] Security Engineer, London, GB (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396578

35. [SJ-JOB] Sr. Security Engineer, New York, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396576

36. [SJ-JOB] Director, Information Security, Reston, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396574

37. [SJ-JOB] Security Architect, Chicago, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396573

38. [SJ-JOB] VP, Information Security, Reston, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396572

39. [SJ-JOB] Security Architect, Bethesda, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396570

40. [SJ-JOB] Security System Administrator, Dublin , IE (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396197

41. [SJ-JOB] Sr. Security Engineer, Atlanta, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396196

42. [SJ-JOB] Security Engineer, Dublin, IE (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396195

43. [SJ-JOB] Developer, Ann Arbor, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396192

44. [SJ-JOB] Quality Assurance, Ann Arbor, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396191

45. [SJ-JOB] Security System Administrator, Mountain Vie... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396190

46. [SJ-JOB] Sr. Security Analyst, Brussels, BE (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396188

47. [SJ-JOB] Security Engineer, Portland, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396186

48. [SJ-JOB] Account Manager, Herndon, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396185

49. [SJ-JOB] Account Manager, Houston, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396184

50. [SJ-JOB] Account Manager, Dallas, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/396183

VI. INCIDENTS LIST SUMMARY
--------------------------
1. New variant against phpBB2? (Thread)
Relevant URL:

http://www.securityfocus.com/archive/75/396869

VII. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. why chmod race conditions are bad (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/396657

2. Recon 2005 - Speakers list (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/396606

3. MS05-021 Microsoft Exchange X-LINK2STATE Heap Overfl... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/396338

VIII. MICROSOFT FOCUS LIST SUMMARY
----------------------------------
1. SecurityFocus Microsoft Newsletter #237 (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/396307

2. Windows Server 2003 Service Pack 1 (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/396218

IX. SUN FOCUS LIST SUMMARY
--------------------------
NO NEW POSTS FOR THE WEEK 2005-04-19 to 2005-04-26.

X. LINUX FOCUS LIST SUMMARY
---------------------------
1. Any way to automatically change arbitrary headers of... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/91/396758
[ terug ]