Home
Systeembeheer
Consultancy
Connectivity
Training
Development

Klanten

Inloggen

Resources

Sans artikelen
Security artikelen

Software

Linux
Windows









[ terug ]
SecurityFocus Newsletter #300
------------------------------

This Issue is Sponsored By: Cenzic

The Leader in Automated Application Security Assessment
Fed up with 1500 page reports brimming with excessive false positives and
few discovered vulnerabilities?  You deserve a much higher level of
accuracy.  Why not step up to a new breed of web application security
assessment product.  Cenzic Hailstorm® finds more vulnerabilities and
generates almost no false positives.  Now, for a limited time, you could
win a free copy of Cenzic Hailstorm to experience this accuracy for
yourself.  Just click the link below in order to enter the drawing.

http://www.securityfocus.com/sponsor/Cenzic_sf-news_050510

------------------------------------------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight Analyzer
is a free service that gives you the ability to track and manage attacks.
Analyzer automatically correlates attacks from various Firewall and network
based Intrusion Detection Systems, giving you a comprehensive view of your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Live CD Paradise
     2. Software Firewalls versus Wormhole Tunnels
     3. Bruce Schneier on Cryptography
II. BUGTRAQ SUMMARY
     1. DotText HTTP Referer HTML Injection Vulnerability
     2. JGS-Portal ID Variable SQL Injection Vulnerability
     3. PHPMyAdmin Insecure SQL Install Script Permissions Vulnerabi...
     4. ESRI ArcInfo Workstation Multiple Local Buffer Overflow And ...
     5. GlobalSCAPE Secure FTP Server Remote Buffer Overflow Vulnera...
     6. Linux Kernel it87 and via686a Drivers Insecure File Creation...
     7. Video Cam Server Directory Traversal Vulnerability
     8. Video Cam Server Path Disclosure Vulnerability
     9. Kerio Administration Port Denial of Service Vulnerability
     10. Video Cam Server Administrative Interface Authentication Byp...
     11. Mtp-Target Client Remote Format String Vulnerability
     12. ARPUS Ce/Ceterm Environment Variables Buffer Overflow Vulner...
     13. CodeToSell ViArt Shop Enterprise Multiple Cross-Site Scripti...
     14. Mtp-Target Server Memory Corruption Vulnerability
     15. ARPUS Ce/Ceterm Command Line Buffer Overflow Vulnerability
     16. ARPUS Ce/Ceterm Insecure Temporary File Creation Vulnerabili...
     17. MaxWebPortal Multiple SQL Injection Vulnerabilities
     18. Apple Mac OS X Default Pseudo-Terminal Permission Vulnerabil...
     19. HP OpenView Event Correlation Service Unspecified Remote Vul...
     20. HP OpenView Network Node Manager Unspecified Remote Vulnerab...
     21. Joshua Chamas Crypt::SSLeay Perl Module Insecure Entropy Sou...
     22. Open WebMail Remote Arbitrary Shell Command Execution Vulner...
     23. LibTomCrypt El Gamal Implementation Flaw Valid Signature Gen...
     24. SmartList ListManager Arbitrary List Addition Vulnerability
     25. PostgreSQL TSearch2 Design Error Vulnerability
     26. PostgreSQL Character Set Conversion Privilege Escalation Vul...
     27. GNUTLS Padding Denial of Service Vulnerability
     28. OSTicket Multiple Input Validation and Remote Code Injection...
     29. Golden FTP Server Pro Directory Traversal Vulnerability
     30. Apple Mac OS X Multiple Vulnerabilities
     31. SitePanel2 Multiple Input Validation Vulnerabilities
     32. WebCrossing WebX Cross-Site Scripting Vulnerability
     33. Invision Power Board Act Parameter Cross-Site Scripting Vuln...
     34. Gossamer Threads Links User.CGI Cross-Site Scripting Vulnera...
     35. ASP Inline Corporate Calendar Defer.ASP SQL Injection Vulner...
     36. Apple Mac OS X NetInfo Setup Tool Local Buffer Overflow Vuln...
     37. ASP Inline Corporate Calendar Details.ASP SQL Injection Vuln...
     38. Apple Mac OS X VPND Local Buffer Overflow Vulnerability
     39. Leafnode fetchnews Client Article Header Remote Denial of Se...
     40. Adobe SVG Viewer ActiveX Control SRC Information Disclosure ...
     41. Apple Mac OS X BlueTooth Directory Traversal Vulnerability
     42. Leafnode fetchnews Client Article Body Remote Denial of Serv...
     43. Interspire ArticleLive Multiple Remote Vulnerabilities
     44. Apple Mac OS X BlueTooth Arbitrary File Access Vulnerability
     45. SimpleCam Directory Traversal Vulnerability
     46. Apple Mac OS X Help Viewer URI Handler JavaScript Code Execu...
     47. NetWin DMail DList Remote Authentication Bypass Vulnerabilit...
     48. FishNet FishCart Multiple Cross-Site Scripting and SQL Injec...
     49. Apple Mac OS X AppleScript Editor Code Obfuscation Vulnerabi...
     50. YusASP Web Asset Manager Unauthorized Access Vulnerability
     51. Apple Mac OS X Terminal X-Man-Path Input Validation Vulnerab...
     52. Apple Mac OS X Terminal Window Title Escape Sequence Command...
     53. Ethereal Multiple Remote Protocol Dissector Vulnerabilities
     54. NetWin DMail DSMTP Remote Format String Vulnerability
     55. NASM IEEE_PUTASCII Remote Buffer Overflow Vulnerability
     56. MyBloggie Multiple Input Validation Vulnerabilities
     57. MRO Maximo Unauthorized Script Disclosure Vulnerability
     58. Oracle 10g DBMS_Scheduler Privilege Escalation Vulnerability
     59. Oracle 9i/10g Database Fine Grained Audit Logging Failure Vu...
     60. Microsoft May Advance Notification Unspecified Security Vuln...
     61. MidiCart PHP Search_List.PHP SearchString Parameter SQL Inje...
     62. MidiCart PHP Item_List.PHP MainGroup Parameter SQL Injection...
     63. MidiCart PHP Item_List.PHP SecondGroup Parameter SQL Injecti...
     64. MidiCart PHP Item_Show.PHP Code_No Parameter SQL Injection V...
     65. MidiCart PHP Search_List.PHP SearchString Parameter Cross-Si...
     66. MidiCart PHP Item_List.PHP SecondGroup Parameter Cross-Site ...
     67. MidiCart PHP Item_List.PHP Maingroup Parameter Cross-Site Sc...
     68. Software602 602 LAN Suite 2004 Directory Traversal Vulnerabi...
     69. BirdBlog BB Code HTML Injection Vulnerability
     70. 04WebServer Directory Traversal Vulnerability
     71. MegaBook Admin.CGI EntryID Cross-Site Scripting Vulnerabilit...
     72. RSA Security RSA Authentication Agent For Web Remote Heap Bu...
     73. FreeBSD IIR(4) Driver Incorrect Permissions Vulnerability
     74. FreeBSD Multiple Local Kernel Memory Disclosure Vulnerabilit...
     75. FreeBSD i386_get_ldt(2) Local Kernel Memory Disclosure Vulne...
     76. QMail Alloc() Remote Integer Overflow Vulnerability
     77. Invision Power Board Login.PHP SQL Injection Vulnerability
     78. RealNetworks RealPlayer Unspecified Code Execution Vulnerabi...
     79. Hosting Controller Unauthorized Account Registration Vulnera...
     80. Invision Power Board Search.PHP Highlite Parameter Cross-Sit...
     81. CJ Ultra Plus OUT.PHP SQL Injection Vulnerability
     82. Invision Power Board Topics.PHP Highlite Parameter Cross-Sit...
     83. QMail Commands() Function Remote Integer Overflow Vulnerabil...
     84. QMail Substdio_Put() Function Remote Integer Overflow Vulner...
     85. Apache HTDigest Realm Command Line Argument Buffer Overflow ...
     86. 4D WebStar Tomcat Plugin Remote Buffer Overflow Vulnerabilit...
     87. AutoTheme PostNuke Module Multiple Unspecified Vulnerabiliti...
     88. FreeRadius RLM_SQL.C SQL Injection Vulnerability
     89. FreeRadius RLM_SQL.C Buffer Overflow Vulnerability
     90. PHP Advanced Transfer Manager Arbitrary File Upload Vulnerab...
III. SECURITYFOCUS NEWS ARTICLES
     1. Microsoft fortifies monthly patches with interim advisories
     2. Microsoft unveils details of software security process
     3. Genome may be future step for virus writers
     4. Car virus myth debunked
     5. Firefox exploit targets zero day vulns
     6. Blair spam hack attack hits UK
IV. SECURITYFOCUS TOP 6 TOOLS
     1. LC 5 5
     2. Umbrella v0.6
     3. Auditor security collection 120305-01
     4. Ntprint 0.1a
     5. TFTP bruteforcer 0.1
     6. SNMP fuzzer 0.1.1
V. SECURITYJOBS LIST SUMMARY
     1. [SJ-JOB] Security Engineer, London, GB (Thread)
     2. [SJ-JOB] Developer, Boulder, US (Thread)
     3. [SJ-JOB] Security Researcher, Boulder, US (Thread)
     4. [SJ-JOB] Quality Assurance, Boston, US (Thread)
     5. [SJ-JOB] Account Manager, London, GB (Thread)
     6. [SJ-JOB] Director, Information Security, Atlanta, US (Thread)
     7. [SJ-JOB] Sr. Security Engineer, New York, US (Thread)
     8. [SJ-JOB] Security Engineer, San Jose, US (Thread)
     9. [SJ-JOB] Sales Representative, Los Angeles, US (Thread)
     10. [SJ-JOB] Manager, Information Security, Lexington Pa... (Thread)
     11. [SJ-JOB] Application Security Engineer, Southern Cal... (Thread)
     12. [SJ-JOB] VP / Dir / Mgr engineering, Boulder, US (Thread)
     13. [SJ-JOB] Sales Engineer, Lexington, US (Thread)
     14. [SJ-JOB] Security Engineer, Petach-Tikva, IL (Thread)
     15. [SJ-JOB] Security Engineer, Dearborn, US (Thread)
     16. [SJ-JOB] Forensics Engineer, London, GB (Thread)
     17. [SJ-JOB] Manager, Information Security, Oxford, GB (Thread)
     18. [SJ-JOB] Sales Engineer, Wildwood, US (Thread)
     19. [SJ-JOB] Auditor, Wildwood, US (Thread)
     20. [SJ-JOB] Auditor, Dallas, US (Thread)
     21. [SJ-JOB] Quality Assurance, Southern California, US (Thread)
     22. [SJ-JOB] Auditor, Los Angeles, US (Thread)
     23. [SJ-JOB] Security Engineer, Southern California, US (Thread)
     24. [SJ-JOB] Auditor, San Francisco, US (Thread)
     25. [SJ-JOB] Quality Assurance, San Jose, US (Thread)
     26. [SJ-JOB] Quality Assurance, San Mateo, US (Thread)
     27. [SJ-JOB] Developer, San Mateo, US (Thread)
     28. [SJ-JOB] Auditor, Houston, US (Thread)
     29. [SJ-JOB] Security Consultant, Houston, US (Thread)
     30. [SJ-JOB] Security Consultant, Cambridge, US (Thread)
     31. [SJ-JOB] Sales Engineer, Chicago, US (Thread)
     32. [SJ-JOB] Security Engineer, Maumee, US (Thread)
     33. [SJ-JOB] Security Engineer, Knoxville, US (Thread)
     34. [SJ-JOB] Security Consultant, Chicago, US (Thread)
     35. [SJ-JOB] Sr. Security Analyst, Boston, US (Thread)
     36. [SJ-JOB] Product Strategist, Atlanta, US (Thread)
     37. [SJ-JOB] Security Architect, Bethesda, US (Thread)
     38. [SJ-JOB] Channel / Business Development, San Francis... (Thread)
     39. [SJ-JOB] Director, Information Security, South, GB (Thread)
     40. [SJ-JOB] Sr. Security Analyst, Washington, US (Thread)
     41. [SJ-JOB] Sr. Security Analyst, Parsippany, US (Thread)
     42. [SJ-JOB] Security Consultant, Tallahassee, US (Thread)
     43. [SJ-JOB] Sales Engineer, Washington D.C. area, US (Thread)
     44. [SJ-JOB] Sales Engineer, Louisville, US (Thread)
     45. [SJ-JOB] Security Researcher, Redwood Shores, US (Thread)
     46. [SJ-JOB] Security Architect, Menlo Park, US (Thread)
     47. [SJ-JOB] Manager, Information Security, Flemington, ... (Thread)
     48. [SJ-JOB] Security Engineer, Warren, US (Thread)
     49. [SJ-JOB] Security System Administrator, San Francisc... (Thread)
     50. [SJ-JOB] Technical Support Engineer, Manhattan, US (Thread)
VI. INCIDENTS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.
VII. VULN-DEV RESEARCH LIST SUMMARY
     1. Announcement: The Web Security Mailing List (Thread)
     2. top (procps-2.0.7-25) vulnerability (Thread)
     3. tools for analyzing java code (Thread)
     4. Missing string length check in Horde (Thread)
VIII. MICROSOFT FOCUS LIST SUMMARY
     1. To disable SMB packet and secure channel signing enf... (Thread)
     2. Visa PCI Firewall Requirements and Windows Networks (Thread)
     3. SecurityFocus Microsoft Newsletter #239 (Thread)
IX. SUN FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.
X. LINUX FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.
XI. UNSUBSCRIBE INSTRUCTIONS
XII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Live CD Paradise
By Scott Granneman
Whether you need to sniff for wireless networks or carry Nessus, Nmap and
the Metasploit Framework with you in your pocket, there's a security-based
Live CD out there for you.
http://www.securityfocus.com/columnists/323

2. Software Firewalls versus Wormhole Tunnels
By Bob Rudis and Phil Kostenbader
This article explains how the PCAP library on Windows can be used to render
software firewalls and client VPN environments ineffective, easily
bypassing traditional security measures.
http://www.securityfocus.com/infocus/1831

3. Bruce Schneier on Cryptography
By Federico Biancuzzi
An interview with Bruce Schneier on some current trends in cryptography.
http://www.securityfocus.com/columnists/324

II. BUGTRAQ SUMMARY
-------------------
1. DotText HTTP Referer HTML Injection Vulnerability
BugTraq ID: 13450
Remote: Yes
Date Published: Apr 30 2005
Relevant URL: http://www.securityfocus.com/bid/13450
Summary:
DotText (.Text) is prone to an HTML injection vulnerability.  This issue may be
exploited by submitting a client HTTP Referer field that contains hostile HTML
and script code.

HTML injection may allow for theft of cookie-based authentication credentials or
other attacks.

2. JGS-Portal ID Variable SQL Injection Vulnerability
BugTraq ID: 13451
Remote: Yes
Date Published: Apr 30 2005
Relevant URL: http://www.securityfocus.com/bid/13451
Summary:
JGS-Portal is prone to an SQL injection.  This issue may potentially be
exploited to compromise the software or gain unauthorized access to the
database. 

The consequences of exploitation will depend on the nature of the vulnerable SQL
query and the capabilities of the underlying database implementation.

3. PHPMyAdmin Insecure SQL Install Script Permissions Vulnerabi...
BugTraq ID: 13452
Remote: No
Date Published: Apr 30 2005
Relevant URL: http://www.securityfocus.com/bid/13452
Summary:
PHPMyAdmin sets insecure default permissions on the SQL install script.  As a
result, local attackers may gain unauthorized access to database credentials. 

This issue was reported in a Gentoo advisory.  It is not known if the
vulnerability is limited to Gentoo installations of PHPMyAdmin.

4. ESRI ArcInfo Workstation Multiple Local Buffer Overflow And ...
BugTraq ID: 13453
Remote: No
Date Published: Apr 30 2005
Relevant URL: http://www.securityfocus.com/bid/13453
Summary:
ESRI ArcInfo Workstation is prone to multiple local buffer overflow and format
string vulnerabilities.  These vulnerabilities exist in various setuid/setgid
utilities installed by ArcInfo Workstation.  

The vulnerabilities may be exploited to execute arbitrary code with elevated
privileges.

It is believed that the vulnerabilities affect all ArcInfo Workstation
installations on UNIX platforms.

5. GlobalSCAPE Secure FTP Server Remote Buffer Overflow Vulnera...
BugTraq ID: 13454
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13454
Summary:
GlobalSCAPE Secure FTP Server is susceptible to a remote buffer overflow
vulnerability. This issue is due to a failure of the application to properly
bounds check user-supplied input data prior to copying it to an insufficiently
sized memory buffer.

This vulnerability allows remote attackers to execute arbitrary machine code in
the context of the vulnerable server application.

6. Linux Kernel it87 and via686a Drivers Insecure File Creation...
BugTraq ID: 13455
Remote: No
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13455
Summary:
The Linux kernel it87 and via686a drivers create an insecure file that could
allow a local user to cause a denial of service condition.  This occurs because
the created file's permissions allow both read and write.

This issue was reported to affect kernel version 2.6.11.7; earlier versions may
also be affected.

7. Video Cam Server Directory Traversal Vulnerability
BugTraq ID: 13456
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13456
Summary:
Video Cam Server is prone to a directory traversal vulnerability that could
allow attackers to read files outside the Web root.

8. Video Cam Server Path Disclosure Vulnerability
BugTraq ID: 13457
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13457
Summary:
Video Cam Server is prone to a path disclosure issue when invalid data is
submitted.

This issue can allow an attacker to access sensitive data that may be used to
launch further attacks against a vulnerable computer.

9. Kerio Administration Port Denial of Service Vulnerability
BugTraq ID: 13458
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13458
Summary:
Various Kerio products are vulnerable to a denial of service vulnerability with
regards to the administration port.

This issue is due to a failure of the application to properly handle exceptional
conditions with regards to specifically malformed data.

A remote attacker may leverage these issues, without requiring
authentication, to exhaust resources on an affected computer, effectively
denying service for legitimate users.

The vendor has addressed this issue in Kerio MailServer 6.0.9, Kerio
WinRoute Firewall 6.0.11, and Kerio Personal Firewall 4.1.3; earlier
versions of these products are reported vulnerable.

10. Video Cam Server Administrative Interface Authentication Byp...
BugTraq ID: 13459
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13459
Summary:
Video Cam Server is prone to an authentication bypass vulnerability. This
vulnerability exists because Video Cam Server fails to control access to the
administrative interface.

11. Mtp-Target Client Remote Format String Vulnerability
BugTraq ID: 13460
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13460
Summary:
A remote format string vulnerability affects Mtp-Target Client.  This issue is
due to a failure of the application to securely call a formatted printing
function.

An attacker may leverage this issue to execute arbitrary code with the
privileges of an unsuspecting user that activated the vulnerable client
application.

12. ARPUS Ce/Ceterm Environment Variables Buffer Overflow Vulner...
BugTraq ID: 13461
Remote: No
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13461
Summary:
ARPUS Ce/Ceterm is prone to buffer overflows in local environment variables.  In
many cases, the application runs with the setuid bit set, allowing arbitrary
code to be executed with root privileges.

Ce/Ceterm will run as setuid root in many cases.  Versions of Ce/Ceterm from 2.6
onwards do not need to be setuid in order to function properly.

13. CodeToSell ViArt Shop Enterprise Multiple Cross-Site Scripti...
BugTraq ID: 13462
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13462
Summary:
ViArt Shop is affected by multiple cross-site scripting and HTML injection
vulnerabilities.  These issues are due to a failure in the application to
properly sanitize user-supplied input before using it in dynamically generated
content.

Attacker-supplied HTML and script code would be able to access properties of the
site, potentially allowing for theft of cookie-based authentication credentials.
An attacker could also exploit this issue to control how the site is rendered to
the user; other attacks are also possible.

These issues are reported to affect ViArt Shop Enterprise version 2.1.6; other
versions may also be vulnerable.

14. Mtp-Target Server Memory Corruption Vulnerability
BugTraq ID: 13463
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13463
Summary:
The Mtp-Target server is prone to a memory corruption vulnerability. The issue
exists because a comparison fails to ensure that an integer value parameter
retrieved from a client is signed. A check is made to ensure that the
user-supplied value is less than 1000000 bytes. If the value passed is
FFFFFFFFh, it is interpreted as a signed -1 and the check passes. The value is
later used as an unsigned integer in a memory allocation operation. An
allocation of 4.29 GB of data is attempted and the service crashes.

Immediate consequences of exploitation of this vulnerability are a denial of
service.

15. ARPUS Ce/Ceterm Command Line Buffer Overflow Vulnerability
BugTraq ID: 13464
Remote: No
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13464
Summary:
ARPUS Ce/Ceterm is prone to a buffer overflow vulnerability when processing
command line arguments.  In many cases, the application runs with the setuid bit
set, allowing arbitrary code to be executed with root privileges.

Ce/Ceterm will run as setuid root in many cases.  Versions of Ce/Ceterm from 2.6
onwards do not need to be setuid in order to function properly.

16. ARPUS Ce/Ceterm Insecure Temporary File Creation Vulnerabili...
BugTraq ID: 13465
Remote: No
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13465
Summary:
ARPUS Ce/Ceterm is prone to an insecure temporary file creation vulnerability. 
This issue is due to a design error that causes a file to be insecurely opened 
or created and subsequently written to.

An attacker may leverage this issue to corrupt arbitrary files with root
privileges.

17. MaxWebPortal Multiple SQL Injection Vulnerabilities
BugTraq ID: 13466
Remote: Yes
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13466
Summary:
MaxWebPortal is reportedly affected by multiple SQL injection vulnerabilities. 
These issues are due to a failure in the application to properly sanitize
user-supplied input before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

18. Apple Mac OS X Default Pseudo-Terminal Permission Vulnerabil...
BugTraq ID: 13467
Remote: No
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13467
Summary:
Apple Mac OS X is susceptible to a default permissions vulnerability in its
pseudo terminal system. This vulnerability is due to a design error when
allocating new pseudo terminals.

This vulnerability allows local users to sniff potentially sensitive data from
other users. It also allows them to send arbitrary data to other users'
terminals, potentially allowing them to exploit latent vulnerabilities in
software utilizing the pseudo terminal.

Apple Mac OS X versions prior to 10.4 are reportedly susceptible to this
vulnerability.

19. HP OpenView Event Correlation Service Unspecified Remote Vul...
BugTraq ID: 13469
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13469
Summary:
HP OpenView Event Correlation Service is prone to unspecified remote
vulnerabilities that could result in a denial of service or arbitrary code
execution with elevated privileges.  Specific details about this vulnerability
are not currently available.

20. HP OpenView Network Node Manager Unspecified Remote Vulnerab...
BugTraq ID: 13470
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13470
Summary:
HP OpenView Network Node Manager is prone to unspecified remote vulnerabilities
that could result in a denial of service or arbitrary code execution with
elevated privileges.  Specific details about this vulnerability are not
currently available.

21. Joshua Chamas Crypt::SSLeay Perl Module Insecure Entropy Sou...
BugTraq ID: 13471
Remote: No
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13471
Summary:
Crypt::SSLeay is prone to a security vulnerability. Reports indicate that the
library employs a file from a world writable location for its fallback entropy
source. The module defaults to this file if a proper entropy source is not set.

If the affected library is using the insecure file as a source of entropy, a
local attacker may replace the contents of the file with known text. This known
text is then employed to seed cryptographic operations. This may lead to weak
cryptographic operations.

22. Open WebMail Remote Arbitrary Shell Command Execution Vulner...
BugTraq ID: 13472
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13472
Summary:
Open WebMail is prone to a remote shell command execution vulnerability.  This
issue presents itself due to insufficient sanitization of user-supplied data.

This issue has been addressed in releases of Open WebMail dated after Apr 30,
2005.

23. LibTomCrypt El Gamal Implementation Flaw Valid Signature Gen...
BugTraq ID: 13473
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13473
Summary:
LibTomCrypt is prone to a security vulnerability that exists in the signature
generation functionality. The issue may be leveraged by an attacker to generate
legitimate signatures without requiring a valid private key.

The vulnerability manifests due to a mathematical flaw in the LibTomCrypt
implementation of the El Gamal signature algorithm.

This vulnerability exists in LibTomCrypt versions 1.02 and earlier.

24. SmartList ListManager Arbitrary List Addition Vulnerability
BugTraq ID: 13474
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13474
Summary:
Smartlist could allow arbitrary email addresses to be added to a mailing list. 
This issue is due to a vulnerability in the confirm add-on function of
Smartlist.  The function can be tricked, thus permitting the addition of
arbitrary addresses to the list.

25. PostgreSQL TSearch2 Design Error Vulnerability
BugTraq ID: 13475
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13475
Summary:
The PostgreSQL 'contrib/tsearch2' module is prone to a security vulnerability.
The issue manifests because the module does not correctly declare several
functions.

Although unconfirmed, it is conjectured that this issue allows a remote user
that can write SQL queries to the affected database to call these functions,
when they should not be accessible directly from SQL commands.

This vulnerability affects PostgreSQL 7.4 and later.

26. PostgreSQL Character Set Conversion Privilege Escalation Vul...
BugTraq ID: 13476
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13476
Summary:
PostgreSQL character set conversion functions could allow an unprivileged user
to supply malicious arguments.  This may result in arbitrary queries executing
with the privileges of the conversion functions.

27. GNUTLS Padding Denial of Service Vulnerability
BugTraq ID: 13477
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13477
Summary:
GnuTLS is prone to a denial of service vulnerability.  A remote attacker can
send specifically designed data to cause a flaw in the parsing, leading to
denial of service conditions.

This issue has been addressed in GnuTLS versions 1.0.25 and 1.2.3; earlier
versions are vulnerable.

28. OSTicket Multiple Input Validation and Remote Code Injection...
BugTraq ID: 13478
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13478
Summary:
osTicket is affected by multiple input validation vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied
input.

Reportedly the application permits the inclusion of remote code that could be
run under the permissions of the affected Web server.

The application is vulnerable to multiple cross-site scripting vulnerabilities. 
Attacker-supplied HTML and script code would be able to access properties of the
site, potentially allowing for theft of cookie-based authentication credentials;
other attacks are also possible.

If the file upload feature is enabled then a directory traversal vulnerability
is possible.  This vulnerability could be exploited to retrieve sensitive or
privileged information normally accessible to the Web server.

The application is prone to HTML injection vulnerabilities.  Attacker-supplied
HTML and script code would be able to access properties of the site, potentially
allowing for theft of cookie-based authentication credentials.  An attacker
could also exploit this issue to control how the site is rendered to the user;
other attacks are also possible.

The application is also prone to multiple SQL injection vulnerabilities. 
Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

29. Golden FTP Server Pro Directory Traversal Vulnerability
BugTraq ID: 13479
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13479
Summary:
Golden FTP Server Pro is susceptible to a directory traversal vulnerability.

It is conjectured that this vulnerability allows a remote attacker to read files
outside of the FTP document root directory. An attacker may read files with the
privileges of the FTP server process.

30. Apple Mac OS X Multiple Vulnerabilities
BugTraq ID: 13480
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13480
Summary:
Multiple security vulnerabilities are reported to affect Apple Mac OS X.  These
issues were disclosed in the referenced vendor advisory.

Apache htdigest is prone to a buffer overflow that could be leveraged through a
CGI application.

Appkit is prone to an integer overflow when handling TIFF files.

Appkit is also prone to a denial of service due to an unhandled exception in
NXSeek().

AppleScript is prone to a code obfuscation issue.

The Bluetooth file exchange service may allow downloaded files to be disclosed.

Bluetooth is also prone to a directory traversal vulnerability.

chfn/chpass/chsh programs could allow privilege escalation.

Finder handles .DS_Store files in an insecure manner that could allow local
attackers to overwrite files and allow privilege escalation.

The Foundation framework is prone to a buffer overflow in environmental
variables.

The Help Viewer is prone to a cross-zone scripting vulnerability.

LDAP allows passwords to initially be stored in plain text when using an LDAP
server not running on OS X.

The XFree86 libXpm library is prone to a stack overflow when parsing malformed
image files.

The XFree86 libXpm library also contains multiple routines that are prone to
integer overflows.

lukemftpd could allow authenticated users to escape chroot.

The NetInfo Setup Tool (NeST) is prone to a buffer overflow.

When the HTTP proxy service is enabled through Server Admin, it is also
available for users outside the local network.

Sudo versions prior to 1.6.8p2 do not adequately sanitize their environments.

Terminal allows malicious content to inject data when it is displayed.

Terminal also allows escape characters embedded in x-man-path URI's to insert
commands into a Terminal session.

vpnd is prone to a buffer overflow that could allow a local user to obtain root
privileges.

31. SitePanel2 Multiple Input Validation Vulnerabilities
BugTraq ID: 13481
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13481
Summary:
SitePanel2 is affected by multiple input validation vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input.

Multiple cross-site scripting issues affect the application.  An attacker may
leverage these issues to have arbitrary script code executed in the browser of
an unsuspecting user.  This may facilitate the theft of cookie-based
authentication credentials as well as other attacks.

SitePanel2 is prone to a directory traversal vulnerability.  This vulnerability
could be exploited to retrieve sensitive or privileged information normally
accessible to the Web server.

The application is also vulnerable to file include, upload and deletion
vulnerabilities.  These issues could permit the execution of arbitrary code in
the context of the affected Web site or the deletion of arbitrary files
accessible to the application.

32. WebCrossing WebX Cross-Site Scripting Vulnerability
BugTraq ID: 13482
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13482
Summary:
WebCrossing is prone to a cross-site scripting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

33. Invision Power Board Act Parameter Cross-Site Scripting Vuln...
BugTraq ID: 13483
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13483
Summary:
Invision Power Board is prone to a cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

It is reported this issue may only be exploitable through Microsoft Internet
Explorer; this has not been confirmed.

34. Gossamer Threads Links User.CGI Cross-Site Scripting Vulnera...
BugTraq ID: 13484
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13484
Summary:
Gossamer Threads Links is prone to a cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

Links versions 2.x, and 2.2.x, as well as Links-SQL version 3.0 are all reported
vulnerable to this issue.

35. ASP Inline Corporate Calendar Defer.ASP SQL Injection Vulner...
BugTraq ID: 13485
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13485
Summary:
ASP Inline Corporate Calendar is prone to an SQL injection vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

36. Apple Mac OS X NetInfo Setup Tool Local Buffer Overflow Vuln...
BugTraq ID: 13486
Remote: No
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13486
Summary:
NeST is prone to a local buffer overflow vulnerability.

The vulnerability presents itself when the application handles excessive string
values through a command line parameter.

An attacker can gain superuser privileges by exploiting this issue.

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple
Vulnerabilities).  Due to the availability of more information, this issue is
being assinged a new BID.

37. ASP Inline Corporate Calendar Details.ASP SQL Injection Vuln...
BugTraq ID: 13487
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13487
Summary:
ASP Inline Corporate Calendar is prone to an SQL injection vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

38. Apple Mac OS X VPND Local Buffer Overflow Vulnerability
BugTraq ID: 13488
Remote: No
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13488
Summary:
Apple Mac OS X vpnd is prone to a local buffer overflow vulnerability.

The vulnerability presents itself when the application handles excessive string
values supplied through the '-i' command line parameter.

An attacker can gain superuser privileges by exploiting this issue. 

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple
Vulnerabilities). Due to the availability of more information, this issue is
being assinged a new BID.

39. Leafnode fetchnews Client Article Header Remote Denial of Se...
BugTraq ID: 13489
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13489
Summary:
Fetchnews is prone to a remote denial of service vulnerability that may allow a
remote attacker to cause the software to hang.

The vulnerability manifests when an upstream news server terminates the
connection abruptly after fetchnews has requested an article header and before
the data transfer is complete.

This vulnerability affects Leafnode 1.9.48 to 1.11.1. The vendor has advised
that versions 1.11.2 and newer are not vulnerable to this issue.

40. Adobe SVG Viewer ActiveX Control SRC Information Disclosure ...
BugTraq ID: 13490
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13490
Summary:
The Adobe SVG Viewer ActiveX control is prone to an information disclosure
vulnerability. Reports indicate that the Adobe SVG Viewer ActiveX control may be
employed to disclose the existence of a target file.

Information that is harvested by leveraging this vulnerability may be used to
aid in further attacks.

This vulnerability affects Adobe SVG Viewer version 3.02 and earlier.

41. Apple Mac OS X BlueTooth Directory Traversal Vulnerability
BugTraq ID: 13491
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13491
Summary:
Apple Mac OS X is prone to a directory traversal vulnerability.  Due to
insufficient sanitization of input, the Bluetooth file and object exchange
services could be used by a remote attacker to access files outside the default
file exchange directory.

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple
Vulnerabilities).  Due to the availability of more information, this
issue is being assigned a new BID.

42. Leafnode fetchnews Client Article Body Remote Denial of Serv...
BugTraq ID: 13492
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13492
Summary:
Fetchnews is prone to a remote denial of service vulnerability that may allow a
remote attacker to cause the software to hang.

The vulnerability manifests when an upstream news server terminates the
connection abruptly after fetchnews has requested an article body and before the
data transfer is complete.

This vulnerability affects Leafnode 1.9.48 to 1.11.1. The vendor has advised
that versions 1.11.2 and newer are not vulnerable to this issue.

43. Interspire ArticleLive Multiple Remote Vulnerabilities
BugTraq ID: 13493
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13493
Summary:
Interspire ArticleLive is reportedly prone to multiple vulnerabilities.  These
issues may allow a remote attacker to gain administrative access to the
application and carry out various cross-site scripting attacks.

Interspire ArticleLive 2005 is reportedly affected by these issues.

44. Apple Mac OS X BlueTooth Arbitrary File Access Vulnerability
BugTraq ID: 13494
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13494
Summary:
Apple Mac OS X is prone to an arbitrary file access vulnerability.

The Bluetooth file exchange service may allow existing files to be disclosed or
new files to be uploaded.  The service saves files in a shared folder by default
that may be accessed by other applications and users.

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple
Vulnerabilities).  Due to the availability of more information, this issue is
being assigned a new BID.

45. SimpleCam Directory Traversal Vulnerability
BugTraq ID: 13495
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13495
Summary:
SimpleCam is prone to a directory traversal vulnerability that could allow
attackers to read files outside the Web root.

46. Apple Mac OS X Help Viewer URI Handler JavaScript Code Execu...
BugTraq ID: 13496
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13496
Summary:
Apple Mac OS X is prone to a JavaScript execution vulnerability.  This issue
exists in the Help Viewer URI handler.  A maliciously crafted JavaScript file
loaded by the Help Viewer would be executed with local privileges.

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple
Vulnerabilities). Due to the availability of more information, this issue is
being assigned a new BID.

47. NetWin DMail DList Remote Authentication Bypass Vulnerabilit...
BugTraq ID: 13497
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13497
Summary:
The mailing list server (dlist.exe) included with DMail is reportedly affected
by an authentication bypass vulnerability.

Due to a design error, an attacker can bypass authentication and gain
unauthorized access.

A successful attack can allow the attacker to gain access to sensitive
information and carry out a denial of service attack.

DMail 3.1a running on the Windows platform is reportedly affected by this issue.
 Other versions may be vulnerable as well.

48. FishNet FishCart Multiple Cross-Site Scripting and SQL Injec...
BugTraq ID: 13499
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13499
Summary:
FishCart is prone to multiple cross-site scripting and SQL injection
vulnerabilities.  These issues are due to a failure in the application to
properly sanitize user-supplied input.

Successful exploitation of the SQL injection issues could result in a compromise
of the application, disclosure or modification of data, or may permit an
attacker to exploit vulnerabilities in the underlying database implementation.

An attacker may leverage the cross-site scripting issues to have arbitrary
script code executed in the browser of an unsuspecting user.  This may
facilitate the theft of cookie-based authentication credentials as well as other
attacks.

49. Apple Mac OS X AppleScript Editor Code Obfuscation Vulnerabi...
BugTraq ID: 13500
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13500
Summary:
Mac OS X AppleScript editor is prone to a code obfuscation vulnerability. 
Scripts created using the applescript: URI mechanism could display code
differently than the actual code that will execute if it is downloaded,
compiled, and run.

This issue was initially reported in BID 13480 (Apple Mac OS X Multiple
Vulnerabilities). Due to the availability of more information, this issue is
being assigned a new BID.

50. YusASP Web Asset Manager Unauthorized Access Vulnerability
BugTraq ID: 13501
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13501
Summary:
YusASP Web Asset Manager is prone to an unauthorized access vulnerability.  The
application does not perform any authentication regarding access to the
application scripts.

This could permit an attacker to manage the content in the remote site; this
could lead to the eventual compromise of the site as well.

51. Apple Mac OS X Terminal X-Man-Path Input Validation Vulnerab...
BugTraq ID: 13502
Remote: No
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13502
Summary:
Apple Mac OS X Terminal is reported prone to an input validation vulnerability.

Apple Terminal allows escape characters embedded in x-man-path URI's to insert
commands into a target Terminal session.

52. Apple Mac OS X Terminal Window Title Escape Sequence Command...
BugTraq ID: 13503
Remote: No
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13503
Summary:
Apple Mac OS X Terminal is reported prone to an input validation vulnerability.

Apple Terminal window title feature may be abused to execute arbitrary commands
on a system running the vulnerable software.

It is possible to exploit this issue if an attacker can cause malicious escape
sequences to be displayed in a terminal window of the vulnerable terminal.

53. Ethereal Multiple Remote Protocol Dissector Vulnerabilities
BugTraq ID: 13504
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13504
Summary:
Many vulnerabilities in Ethereal have been disclosed by the vendor. The reported
issues are in various protocol dissectors.

These issues include:
 - Buffer overflow vulnerabilities
 - Format string vulnerabilities
 - Null pointer dereference denial of service vulnerabilities
 - Segmentation fault denial of service vulnerabilities
 - Infinite loop denial of service vulnerabilities
 - Memory exhaustion denial of service vulnerabilities
 - Double-free vulnerabilities
 - Unspecified denial of service vulnerabilities

These issues could allow remote attackers to execute arbitrary machine code in
the context of the vulnerable application. Attackers could also crash the
affected application.

Various vulnerabilities affect differing versions of Ethereal, from 0.8.14,
through to 0.10.10.

This BID will be split into individual BIDs for each separate issue.

BID 13567 has been created for the DISTCC issue.

54. NetWin DMail DSMTP Remote Format String Vulnerability
BugTraq ID: 13505
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13505
Summary:
The SMTP server (dsmtp.exe) shipped with DMail is reportedly prone to a remote
format string vulnerability.

Specifically, this issue arises when the application handles malicious data
passed through various administrative commands.

A successful attack may result in crashing the server or lead to arbitrary code
execution. This may facilitate unauthorized access or privilege escalation in
the context the server.

It should be noted that exploitation of this vulnerability requires the attacker
to have the DMail administrative password.

55. NASM IEEE_PUTASCII Remote Buffer Overflow Vulnerability
BugTraq ID: 13506
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13506
Summary:
NASM is prone to a remote buffer overflow vulnerability.  This issue affects the
'ieee_putascii()' function.

It is likely that an attacker exploits this issue by crafting a malicious source
file to be assembled by the application.  This file is sent to an affected user
and if the user loads the file in NASM, the attack may result in arbitrary code
execution.

The attacker may then gain unauthorized access in the context of the user
running NASM.

56. MyBloggie Multiple Input Validation Vulnerabilities
BugTraq ID: 13507
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13507
Summary:
myBloggie is affected by multiple vulnerabilities.

An attacker may leverage these issues to carry out cross-site scripting, HTML
injection and SQL injection attacks against the affected application. This may
result in the theft of authentication credentials, destruction or disclosure of
sensitive data, and potentially other attacks.  The integrity of a site may be
compromised by deleting arbitrary comments as well.

57. MRO Maximo Unauthorized Script Disclosure Vulnerability
BugTraq ID: 13508
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13508
Summary:
MRO Maximo is affected by an unauthorized script disclosure vulnerability.  This
issue manifests because the files contained in the 'maximo_installation'
directory are not recognized as server-side executable scripts.

This issue may be exploited by a remote attacker to download and view MRO Maximo
scripts.

This issue was reported to affect MRO Maximo versions 4 and 5.

58. Oracle 10g DBMS_Scheduler Privilege Escalation Vulnerability
BugTraq ID: 13509
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13509
Summary:
Oracle database is prone to a privilege escalation vulnerability.  A user with
'create job' privileges can switch the 'session_user' to 'SYS'.  This will
facilitate privilege escalation.

This issue is reported to be addressed in the 10.0.1.14 patch set for Oracle.

59. Oracle 9i/10g Database Fine Grained Audit Logging Failure Vu...
BugTraq ID: 13510
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13510
Summary:
Oracle 9i/10g Database is prone to a logging failure vulnerability that exists
in Fine Grained Audit (FGA) functionality.

Reports indicate that FGA may be disabled inadvertently, without notifying the
database administrator. This results in FGA failing to log queries subsequent to
the logging failure, this occurs for all database users and may result in a
false sense of security.

60. Microsoft May Advance Notification Unspecified Security Vuln...
BugTraq ID: 13511
Remote: Unknown
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13511
Summary:
Microsoft has released advanced notification for one security bulletin that will
be released on May 10, 2005.  

This advisory will relate to the Microsoft Windows platform.  The maximum
severity rating of this bulletin is 'Important'.

61. MidiCart PHP Search_List.PHP SearchString Parameter SQL Inje...
BugTraq ID: 13512
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13512
Summary:
MidiCart PHP is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

62. MidiCart PHP Item_List.PHP MainGroup Parameter SQL Injection...
BugTraq ID: 13513
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13513
Summary:
MidiCart PHP is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

63. MidiCart PHP Item_List.PHP SecondGroup Parameter SQL Injecti...
BugTraq ID: 13514
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13514
Summary:
MidiCart PHP is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

64. MidiCart PHP Item_Show.PHP Code_No Parameter SQL Injection V...
BugTraq ID: 13515
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13515
Summary:
MidiCart PHP is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

65. MidiCart PHP Search_List.PHP SearchString Parameter Cross-Si...
BugTraq ID: 13516
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13516
Summary:
MidiCart PHP is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

66. MidiCart PHP Item_List.PHP SecondGroup Parameter Cross-Site ...
BugTraq ID: 13517
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13517
Summary:
MidiCart PHP is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

67. MidiCart PHP Item_List.PHP Maingroup Parameter Cross-Site Sc...
BugTraq ID: 13518
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13518
Summary:
MidiCart PHP is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

68. Software602 602 LAN Suite 2004 Directory Traversal Vulnerabi...
BugTraq ID: 13519
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13519
Summary:
602 LAN Suite 2004 is reported prone to a directory traversal vulnerability. 

It is reported that an attacker can exploit this issue to detect the presence of
files on a computer and potentially cause a denial of service condition.

A successful attack may aid in further attacks against the system or lead to a
crash due to resource exhaustion.

69. BirdBlog BB Code HTML Injection Vulnerability
BugTraq ID: 13520
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13520
Summary:
BirdBlog is prone to an HTML injection vulnerability.  BB code is not properly
santized before being rendered as content.

HTML injection may allow for theft of cookie-based authentication credentials or
other attacks.

This issue was addressed in BirdBlog 1.3.1; all earlier versions are likely
affected.

70. 04WebServer Directory Traversal Vulnerability
BugTraq ID: 13521
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13521
Summary:
04WebServer is prone to a directory traversal vulnerability that could allow
attackers to read files one folder outside the Web root.

71. MegaBook Admin.CGI EntryID Cross-Site Scripting Vulnerabilit...
BugTraq ID: 13522
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13522
Summary:
MegaBook is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

This issue is reported to affect MegaBook version 2.0; other versions may also
be vulnerable.

72. RSA Security RSA Authentication Agent For Web Remote Heap Bu...
BugTraq ID: 13524
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13524
Summary:
A remote heap-based buffer overflow vulnerability exists in RSA Authentication
Agent for Web. This issue is due to a failure of the application to properly
bounds check user-supplied input data prior to copying it into a fixed-sized
heap buffer memory region.

This vulnerability allows remote attackers to execute arbitrary machine code in
the context of the vulnerable server application. This reportedly occurs with
'LocalSystem' privileges, allowing the attacker to gain complete control of the
targeted computer.

Versions 5.0, 5.2, and 5.3 of RSA Authentication Agent for Web are vulnerable to
this issue.

73. FreeBSD IIR(4) Driver Incorrect Permissions Vulnerability
BugTraq ID: 13525
Remote: No
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13525
Summary:
FreeBSD iir(4) driver is prone to an incorrect permissions vulnerability.

A local unprivileged attacker can gain access to a device and carry out ioctl
calls.  This can allow local attackers to delete or disclose potentially
sensitive data.

74. FreeBSD Multiple Local Kernel Memory Disclosure Vulnerabilit...
BugTraq ID: 13526
Remote: No
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13526
Summary:
FreeBSD is prone to multiple local kernel memory disclosure vulnerabilities.
These issues are due to a failure of the kernel to properly clear previously
used memory buffers prior to copying these buffers to user-space.

These vulnerabilities allow local attackers to gain access to potentially
sensitive kernel memory. Access to this data may aid the malicious users in
further attacks.

Versions of FreeBSD prior to 5.4-RELEASE are reported vulnerable to this issue.

75. FreeBSD i386_get_ldt(2) Local Kernel Memory Disclosure Vulne...
BugTraq ID: 13527
Remote: No
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13527
Summary:
The i386_get_ldt(2) system call is prone to a kernel memory disclosure
vulnerability.

An attacker can supply a negative or excessive value as an argument to the
affected system call and read arbitrary portions of kernel memory.

Information disclosed through this attack may be used to launch other attacks
against a computer and potentially aid in a complete compromise.

76. QMail Alloc() Remote Integer Overflow Vulnerability
BugTraq ID: 13528
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13528
Summary:
QMail is susceptible to a remote integer overflow vulnerability in the alloc()
function.

Specifically, the alloc() function can be coerced into overflowing an integer
value, resulting in an incorrect memory allocation occurring. This may only be
possible in environments where more than 4 gigabytes of virtual memory is
available, such as 64 bit systems.

It is conjectured that remote code executing may be possible.

77. Invision Power Board Login.PHP SQL Injection Vulnerability
BugTraq ID: 13529
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13529
Summary:
Invision Power Board is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied data
before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

This issue reportedly affects Invision Power Board versions prior to 2.0.4.

78. RealNetworks RealPlayer Unspecified Code Execution Vulnerabi...
BugTraq ID: 13530
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13530
Summary:
RealNetworks RealPlayer is a media player that is available for various
operating systems, including Microsoft Windows, Linux, and Mac OS.

An unspecified vulnerability affects RealNetworks RealPlayer.  The cause of this
issue is currently unknown.

The potential impact of this issue is that an attacker may execute code in the
context of the user running the affected software; this BID will be updated as
more information is released.

79. Hosting Controller Unauthorized Account Registration Vulnera...
BugTraq ID: 13531
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13531
Summary:
Hosting Controller is reported prone to a vulnerability that allows unauthorized
remote attackers to register an account.

The attacker can create a user and host content on a target computer.  This
issue may lead to other attacks against the computer as well.

Hosting Controller version 6.1 Hotfix 1.9 was reported to be vulnerable.  It is
possible that other versions are affected as well.

80. Invision Power Board Search.PHP Highlite Parameter Cross-Sit...
BugTraq ID: 13532
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13532
Summary:
Invision Power Board is prone to a cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

This issue has been addressed in Invision Power Board version 2.0.4; earlier
versions are vulnerable.

81. CJ Ultra Plus OUT.PHP SQL Injection Vulnerability
BugTraq ID: 13533
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13533
Summary:
CJ Ultra Plus is prone to an SQL injection vulnerability.

This issue affects the 'out.php' script and could permit remote attackers to
pass malicious input to database queries, resulting in modification of query
logic or other attacks.

82. Invision Power Board Topics.PHP Highlite Parameter Cross-Sit...
BugTraq ID: 13534
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13534
Summary:
Invision Power Board is prone to a cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user.  This may facilitate the theft of
cookie-based authentication credentials as well as other attacks.

This issue has been addressed in Invision Power Board version 2.0.4; earlier
versions are vulnerable.

83. QMail Commands() Function Remote Integer Overflow Vulnerabil...
BugTraq ID: 13535
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13535
Summary:
QMail is susceptible to a remote integer overflow vulnerability in the
commands() function.

Specifically, the commands() function can be coerced into overflowing an integer
value, resulting in overwriting an unintended location with a NULL byte. This
may only be possible in environments where more than 4 gigabytes of virtual
memory is available, such as 64 bit systems.

It is conjectured that remote code executing may be possible.

84. QMail Substdio_Put() Function Remote Integer Overflow Vulner...
BugTraq ID: 13536
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13536
Summary:
QMail is susceptible to a remote integer overflow vulnerability in the
substdio_put() function.

Specifically, the substdio_put() function can be coerced into overflowing an
integer value, resulting in writing data to an unintended location. This may
only be possible in environments where more than 4 gigabytes of virtual memory
is available, such as 64 bit systems.

It is conjectured that remote code executing may be possible.

85. Apache HTDigest Realm Command Line Argument Buffer Overflow ...
BugTraq ID: 13537
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13537
Summary:
A buffer overflow vulnerability exists in the htdigest utility included with
Apache. The vulnerability is due to improper bounds checking when copying
user-supplied realm data into local buffers.

By supplying an overly long realm value to the command line options of htdigest,
it is possible to trigger an overflow condition. This may cause memory to be
corrupted with attacker-specified values.

This issue could be exploited by a remote attacker; potentially resulting in the
execution of arbitrary system commands within the context of the web server
process.

86. 4D WebStar Tomcat Plugin Remote Buffer Overflow Vulnerabilit...
BugTraq ID: 13538
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13538
Summary:
The Tomcat Plugin supplied with the HTTP server is reportedly prone to a remote
buffer overflow vulnerability. 

A successful attack can result in a crash or arbitrary code execution allowing
the attacker to gain unauthorized access to the affected computer.

The Tomcat Plugin is enabled by default.

4D WebStar 5.3.3 and 5.4 were reported to be vulnerable.

87. AutoTheme PostNuke Module Multiple Unspecified Vulnerabiliti...
BugTraq ID: 13539
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13539
Summary:
AutoTheme for PostNuke is reported prone to multiple unspecified
vulnerabilities.  The causes and impacts of these issues were not specified.

Due to a lack of details, further information is not currently available.  This
BID will be updated and divided into individuals BIDs when more information
becomes available.

AutoTheme 1.7 and AT-Lite .8 for PostNuke are vulnerable to these issues.

88. FreeRadius RLM_SQL.C SQL Injection Vulnerability
BugTraq ID: 13540
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13540
Summary:
FreeRadius is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

89. FreeRadius RLM_SQL.C Buffer Overflow Vulnerability
BugTraq ID: 13541
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13541
Summary:
FreeRadius is prone to a buffer overflow vulnerability.  This issue is due to a
failure in the application to do proper bounds checking on user-supplied data.

Remote code execution may be possible; this has not been confirmed.

90. PHP Advanced Transfer Manager Arbitrary File Upload Vulnerab...
BugTraq ID: 13542
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13542
Summary:
PHP Advanced Transfer Manager is prone to a vulnerability regarding the
uploading of arbitrary files.

If successfully exploited, an attacker can execute arbitrary script code on a
vulnerable server. This can lead to unauthorized access in the context of the
affected server.

This issue reportedly affects PHP Advanced Transfer Manager version 1.21;
earlier versions may also be vulnerable.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Microsoft fortifies monthly patches with interim advisories
By: Robert Lemos

Customers may want patches less often, but they want notification of events that
affect their security now. Microsoft complies with informational advisories.
http://www.securityfocus.com/news/11132

2. Microsoft unveils details of software security process
By: Robert Lemos

The software giant says it made more than 400 significant feature changes to
Windows XP, including eliminating two classes of bugs, during its effort to
harden the operating system.
http://www.securityfocus.com/news/11115

3. Genome may be future step for virus writers
By: Robert Lemos

Advances in genetic circuits promise to allow virus writers to code bioweapons
nearly as easily as computer viruses are created today. Are we ready?
http://www.securityfocus.com/news/11082

4. Car virus myth debunked
By: John Leyden, The Register

Rumours that the Bluetooth systems of cars are at risk from infection from
mobile phone viruses have been debunked.
http://www.securityfocus.com/news/11129

5. Firefox exploit targets zero day vulns
By: John Leyden, The Register

Security researchers have discovered two unpatched vulnerabilities in Firefox,
the popular alternative web browser.
http://www.securityfocus.com/news/11119

6. Blair spam hack attack hits UK
By: John Leyden, The Register

Virus writers are using claims that Tony Blair's email address has been hacked
as a ruse to trick punters into visiting sites hosting malware.
http://www.securityfocus.com/news/11118

IV. SECURITYFOCUS TOP 6 TOOLS
-----------------------------
1. LC 5 5
By: @stake
Relevant URL: http://www.atstake.com/products/lc/
Platforms: Windows 2000, Windows 95/98, Windows NT
Summary: 

LC 5 is the latest version of L0phtCrack, the award-winning password auditing
and recovery application used by thousands of companies worldwide.

Using multiple assessment methods, LC 5 reduces security risk by helping
administrators to:

    * Identify and remediate security vulnerabilities that result from the use
of weak or easily guessed passwords
    * Recover Windows and Unix account passwords to access user and
administrator accounts whose passwords are lost or to streamline migration of
users to another authentication system
    * Rapidly process accounts using pre-computed password tables* that contain
trillions of passwords

2. Umbrella v0.6
By: Umbrella
Relevant URL: http://umbrella.sourceforge.net/
Platforms: Linux
Summary: 

Umbrella is a security mechanism that implements a combination of Process-Based
Access Control (PBAC) and authentication of binaries through Digital Signed
Binaries (DSB). The scheme is designed for Linux-based consumer electronic
devices ranging from mobile phones to settop boxes.

Umbrella is implemented on top of the Linux Security Modules (LSM) framework.
The PBAC scheme is enforced by a set of restrictions on each process.

3. Auditor security collection 120305-01
By: Max Moser
Relevant URL: http://www.remote-exploit.org/
Platforms: Os Independent
Summary: 

The Auditor security collection is a Live-System based on KNOPPIX. With no
installation whatsoever, the analysis platform is started directly from the
CD-Rom and is fully accessible within minutes. Independent of the hardware in
use, the Auditor security collection offers a standardised working environment,
so that the build-up of know-how and remote support is made easier.

4. Ntprint 0.1a
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

Small NTP fingerprinter to find a remote host OS via an NTP server.

5. TFTP bruteforcer 0.1
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

Fast TFTP bruteforcer to guess the names of files stored on remote TFTP servers
(such as router configs).

6. SNMP fuzzer 0.1.1
By: Arhont Team
Relevant URL: http://www.arhont.com/index-5.html
Platforms: Perl (any system supporting perl)
Summary: 

SNMP fuzzing tool to discover SNMP implementation vulnerabilities and perform
SNMP agent stress testing.

V. SECURITYJOBS LIST SUMMARY
----------------------------
1. [SJ-JOB] Security Engineer, London, GB (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397654

2. [SJ-JOB] Developer, Boulder, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397652

3. [SJ-JOB] Security Researcher, Boulder, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397648

4. [SJ-JOB] Quality Assurance, Boston, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397647

5. [SJ-JOB] Account Manager, London, GB (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397645

6. [SJ-JOB] Director, Information Security, Atlanta, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397644

7. [SJ-JOB] Sr. Security Engineer, New York, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397642

8. [SJ-JOB] Security Engineer, San Jose, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397635

9. [SJ-JOB] Sales Representative, Los Angeles, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397634

10. [SJ-JOB] Manager, Information Security, Lexington Pa... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397629

11. [SJ-JOB] Application Security Engineer, Southern Cal... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397628

12. [SJ-JOB] VP / Dir / Mgr engineering, Boulder, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397627

13. [SJ-JOB] Sales Engineer, Lexington, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397453

14. [SJ-JOB] Security Engineer, Petach-Tikva, IL (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397452

15. [SJ-JOB] Security Engineer, Dearborn, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397451

16. [SJ-JOB] Forensics Engineer, London, GB (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397450

17. [SJ-JOB] Manager, Information Security, Oxford, GB (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397449

18. [SJ-JOB] Sales Engineer, Wildwood, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397448

19. [SJ-JOB] Auditor, Wildwood, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397447

20. [SJ-JOB] Auditor, Dallas, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397446

21. [SJ-JOB] Quality Assurance, Southern California, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397445

22. [SJ-JOB] Auditor, Los Angeles, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397444

23. [SJ-JOB] Security Engineer, Southern California, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397443

24. [SJ-JOB] Auditor, San Francisco, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397441

25. [SJ-JOB] Quality Assurance, San Jose, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397440

26. [SJ-JOB] Quality Assurance, San Mateo, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397439

27. [SJ-JOB] Developer, San Mateo, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397438

28. [SJ-JOB] Auditor, Houston, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397437

29. [SJ-JOB] Security Consultant, Houston, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397436

30. [SJ-JOB] Security Consultant, Cambridge, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397435

31. [SJ-JOB] Sales Engineer, Chicago, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397434

32. [SJ-JOB] Security Engineer, Maumee, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397396

33. [SJ-JOB] Security Engineer, Knoxville, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397394

34. [SJ-JOB] Security Consultant, Chicago, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397393

35. [SJ-JOB] Sr. Security Analyst, Boston, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397392

36. [SJ-JOB] Product Strategist, Atlanta, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397391

37. [SJ-JOB] Security Architect, Bethesda, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397389

38. [SJ-JOB] Channel / Business Development, San Francis... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397388

39. [SJ-JOB] Director, Information Security, South, GB (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397387

40. [SJ-JOB] Sr. Security Analyst, Washington, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397386

41. [SJ-JOB] Sr. Security Analyst, Parsippany, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397385

42. [SJ-JOB] Security Consultant, Tallahassee, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397384

43. [SJ-JOB] Sales Engineer, Washington D.C. area, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397383

44. [SJ-JOB] Sales Engineer, Louisville, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397382

45. [SJ-JOB] Security Researcher, Redwood Shores, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397381

46. [SJ-JOB] Security Architect, Menlo Park, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397380

47. [SJ-JOB] Manager, Information Security, Flemington, ... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397379

48. [SJ-JOB] Security Engineer, Warren, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397378

49. [SJ-JOB] Security System Administrator, San Francisc... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397377

50. [SJ-JOB] Technical Support Engineer, Manhattan, US (Thread)
Relevant URL:

http://www.securityfocus.com/archive/77/397376

VI. INCIDENTS LIST SUMMARY
--------------------------
NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.

VII. VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. Announcement: The Web Security Mailing List (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/397775

2. top (procps-2.0.7-25) vulnerability (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/397774

3. tools for analyzing java code (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/397692

4. Missing string length check in Horde (Thread)
Relevant URL:

http://www.securityfocus.com/archive/82/397691

VIII. MICROSOFT FOCUS LIST SUMMARY
----------------------------------
1. To disable SMB packet and secure channel signing enf... (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/397882

2. Visa PCI Firewall Requirements and Windows Networks (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/397837

3. SecurityFocus Microsoft Newsletter #239 (Thread)
Relevant URL:

http://www.securityfocus.com/archive/88/397473

IX. SUN FOCUS LIST SUMMARY
--------------------------
NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.

X. LINUX FOCUS LIST SUMMARY
---------------------------
NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.
[ terug ]