Home
Systeembeheer
Consultancy
Connectivity
Training
Development

Klanten

Inloggen

Resources

Sans artikelen
Security artikelen

Software

Linux
Windows









[ terug ]
SecurityFocus Newsletter #306
----------------------------------------

This Issue is Sponsored By: Black Hat

Attend the Black Hat Briefings & Training USA, July 23-28, 2005 in Las 
Vegas. World renowned security experts reveal tomorrow's threats today. Free of
vendor pitches, the Briefings are designed to be pragmatic regardless of your
security environment. Featuring 29 hands-on training courses and 10 conference
tracks, networking opportunities with over 2,000 delegates from 30+ nations. 

http://www.securityfocus.com/sponsor/BlackHat_sf-news_050705

------------------------------------------------------------------
I.    FRONT AND CENTER
       1. Rats in the security world
       2. Fighting EPO Viruses
       3. Who's to blame?
II.   BUGTRAQ SUMMARY
       1. TCP-IP Datalook Local Denial of Service Vulnerability
       2. ASPNuke Multiple Cross-Site Scripting Vulnerabilities
       3. ASPNuke Language_Select.ASP HTTP Response Splitting Vulnerability
       4. ASPNuke Comment_Post.ASP SQL Injection Vulnerability
       5. True North Software IA EMailServer Remote Format String Vulnerability
       6. PHP-Fusion SUBMIT.PHP HTML Injection Vulnerabilities
       7. ActiveBuyAndSell Multiple SQL Injection Vulnerabilities
       8. ActiveBuyAndSell SendPassword.ASP Cross-Site Scripting Vulnerability
       9. ASPPlayground.NET Remote Arbitrary File Upload Vulnerability
       10. Mensajeitor IP Parameter HTML Injection Vulnerability
       11. WebCalendar Assistant_Edit.PHP Unauthorized Access Vulnerability
       12. RealNetworks Real and RealOne Player Unspecified MP3 ActiveX Control
Execution Vulnerability
       13. Sun Solaris Runtime Linker LD_AUDIT Privilege Escalation
Vulnerability
       14. Adobe Acrobat/Adobe Reader Safari Frameworks Folder Permission
Escalation Vulnerability
       15. Adobe Acrobat/Adobe Reader Arbitrary File Execution Vulnerability
       16. Infradig Inframail Advantage Server Edition Multiple Remote Buffer
Overflow Vulnerabilities
       17. Community Server Forums SearchResults.ASPX Cross-Site Scripting
Vulnerability
       18. SofoTex BisonFTP Remote Denial Of Service Vulnerability
       19. Hosting Controller Error.ASP Cross-Site Scripting Vulnerability
       20. UBBDesign JCDex Lite Index.PHP Remote File Include Vulnerability
       21. Dynamic Biz Website Builder (QuickWeb) Login.ASP SQL Injection
Vulnerability
       22. Raritan Dominion SX Multiple Vulnerabilities
       23. PHPBB Viewtopic.PHP Remote Code Execution Vulnerability
       24. Microsoft Internet Explorer Javaprxy.DLL COM Object Instantiation
Heap Overflow Vulnerability
       25. XML-RPC for PHP Remote Code Injection Vulnerability
       26. Clam Anti-Virus ClamAV Cabinet File Parsing Remote Denial Of Service
Vulnerability
       27. Clam Anti-Virus ClamAV MS-Expand File Parsing Remote Denial Of
Service Vulnerability
       28. CGI-Club imTRBBS Remote Command Execution Vulnerability
       29. Cisco IOS AAA RADIUS Authentication Bypass Vulnerability
       30. Microsoft Update Rollup 1 for Windows 2000 SP4 Released - Multiple
Vulnerabilities Fixed
       31. Xoops XMLRPC Multiple SQL Injection Vulnerabilities
       32. Xoops Multiple Cross-Site Scripting Vulnerabilities
       33. Community Link Pro Login.CGI File Parameter Remote Command Execution
Vulnerability
       34. Raven Software Soldier Of Fortune 2 Ignore Command Remote Denial of
Service Vulnerability
       35. NateOn Messenger Directory Listing Disclosure Vulnerability
       36. FreeBSD IPFW Address Table Lookup Atomicity Error Firewall Rule
Bypass Vulnerability
       37. FreeBSD TCP Stack Established Connection Denial of Service
Vulnerability
       38. Crip Helper Script Insecure Temporary File Creation Vulnerability
       39. Apache HTTP Request Smuggling Vulnerability
       40. Comdev eCommerce Review Form HTML Injection Vulnerability
       41. Pavsta Auto Site SitePath Remote File Include Vulnerability
       42. Comdev eCommerce Index.PHP Cross-Site Scripting Vulnerability
       43. Drupal Arbitrary PHP Code Execution Vulnerability
       44. FSboard Directory Traversal Vulnerability
       45. Hitachi Hibun Viewer Unspecified Privilege Escalation Vulnerability
       46. Hitachi Hibun PCMCIA Disk Access Restriction Bypass Vulnerability
       47. SSH Secure Shell/Tectia Server on Windows Host Identification Key
Permission Vulnerability
       48. Mambo Open Source Multiple Unspecified Injection Vulnerabilities
       49. Mambo Open Source Session ID Spoofing Vulnerability
       50. Mambo Open Source MosDBTable Class Unspecified Vulnerability
       51. NetBSD CLCS / EMUXKI Audio Driver Local Denial of Service
Vulnerability
       52. Prevx Pro 2005 Intrusion Prevention System Multiple Vulnerabilities
       53. Golden FTP Server Pro Multiple Remote Vulnerabilities
       54. OpenLDAP TLS Plaintext Password Vulnerability
       55. PADL Software PAM_LDAP TLS Plaintext Password Vulnerability
       56. OSTicket Multiple Input Validation Vulnerabilities
       57. RaXnet Cacti Input Filter Multiple SQL Injection Vulnerabilities
       58. RaXnet Cacti Graph_Image.PHP Remote Command Execution Variant
Vulnerability
       59. RaXnet Cacti Config.PHP Design Error Vulnerability
III.  SECURITYFOCUS NEWS
       1. Flawed USC admissions site allowed access to applicant data
       2. Reverse engineering patches making disclosure a moot choice?
       3. Open-source projects get free checkup by automated tools
       4. Targeted Trojan-horse attacks hitting U.S., worldwide
       5. Sasser suspect goes on trial
       6. China signs anti-spam pact
       7. Warning over unpatched IE bug
       8. Net radio station silenced after phishing bust
IV.   SECURITY JOBS LIST SUMMARY
       1. [SJ-JOB] Channel / Business Development, Austin
       2. [SJ-JOB] Account Manager, London
       3. [SJ-JOB] Sales Engineer, New York
       4. [SJ-JOB] Sr. Security Engineer, Cupertino
       5. [SJ-JOB] Sales Representative, Dalls, Houston, other
       6. [SJ-JOB] Security Consultant, Orlando
       7. [SJ-JOB] Sr. Security Analyst, Rockville
       8. [SJ-JOB] Jr. Security Analyst, Leuven
       9. [SJ-JOB] Sr. Security Analyst, Tampa
       10. [SJ-JOB] Compliance Officer, Berkshire
       11. [SJ-JOB] Sales Engineer, Vancouver
       12. [SJ-JOB] Security System Administrator, London
       13. [SJ-JOB] Sales Engineer, Calgary
       14. [SJ-JOB] Sr. Security Analyst, Palo Alto
       15. [SJ-JOB] Manager, Information Security, Alexandria
       16. [SJ-JOB] Security Engineer, Burbank
       17. [SJ-JOB] Security Consultant, Seattle Area
       18. [SJ-JOB] Developer, McLean
       19. [SJ-JOB] Certification & Accreditation Engineer, Herndon
       20. [SJ-JOB] Security Engineer, Plano
       21. [SJ-JOB] Security Consultant, Chicago
       22. [SJ-JOB] Security Consultant, Bangalore
       23. [SJ-JOB] Security Consultant, Princeton
       24. [SJ-JOB] Quality Assurance, Columbia
       25. [SJ-JOB] Information Assurance Engineer, Washington
       26. [SJ-JOB] Technical Support Engineer, Herndon
       27. [SJ-JOB] Technical Support Engineer, London
       28. [SJ-JOB] Technical Support Engineer, Cupertino
       29. [SJ-JOB] Security Consultant, Toronto
       30. [SJ-JOB] Sr. Security Engineer, San Diego
       31. [SJ-JOB] Sr. Security Engineer, Charleston
       32. [SJ-JOB] Security Architect, Reading / London
       33. [SJ-JOB] Auditor, Plano
       34. [SJ-JOB] Channel / Business Development, santa clara
       35. [SJ-JOB] Manager, Information Security, New London area
       36. [SJ-JOB] Management, London
       37. [SJ-JOB] Security Architect, Los Angeles
       38. [SJ-JOB] Sr. Security Engineer, New York
       39. [SJ-JOB] Sr. Security Engineer, Los Angeles
       40. [SJ-JOB] Security Architect, New York
       41. [SJ-JOB] Account Manager, Minneapolis
       42. [SJ-JOB] Director, Information Security, London
       43. [SJ-JOB] Security Consultant, London - West
       44. [SJ-JOB] Sr. Security Analyst, Chicago
       45. [SJ-JOB] Security Consultant, Minneapolis
       46. [SJ-JOB] Sr. Security Analyst, Chicago
       47. [SJ-JOB] Security Engineer, Carson (LA County)
V.    INCIDENTS LIST SUMMARY
VI.   VULN-DEV RESEARCH LIST SUMMARY
       1. Call for Paritipation: C.I.P.H.E.R Contest
VII.  MICROSOFT FOCUS LIST SUMMARY
       1. what is file refcache.ser
       2. Blackhat Vegas 2005 Training
       3. SecurityFocus Microsoft Newsletter #246
       4. DOMAIN CONTROLLER STOLEN...WHAT NEXT?
       5. Local admin password
VIII. SUN FOCUS LIST SUMMARY
IX.   LINUX FOCUS LIST SUMMARY
X.    UNSUBSCRIBE INSTRUCTIONS
XI.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Rats in the security world
By Mark Burnett
I say it's now time we took a step back and exterminated some of these rats.
http://www.securityfocus.com/columnists/336

2. Fighting EPO Viruses
By Piotr Bania
This short article describes the so-called Entry-Point Obscuring (EPO) virus
coding technique, primarily through a direct analysis of the Win32.CTX.Phage
virus.
http://www.securityfocus.com/infocus/1841

3. Who's to blame?
By Kelly Martin
If there's one thing the security industry is really good at, it's pointing
fingers.
http://www.securityfocus.com/columnists/337


II.  BUGTRAQ SUMMARY
--------------------
1. TCP-IP Datalook Local Denial of Service Vulnerability
BugTraq ID: 14061
Remote: No
Date Published: 2005-06-26
Relevant URL: http://www.securityfocus.com/bid/14061
Summary:
TCP-IP Datalook is affected by a local denial of service vulnerability.

Specifically, an attacker can send a specially crafted packet to the listening
port of TCP-IP Datalook and cause a crash.

TCP-IP Datalook 1.3 is reported to be affected by this issue.  Other versions
may be vulnerable as well.



2. ASPNuke Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14062
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14062
Summary:
ASPNuke is prone to multiple cross-site scripting vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.


3. ASPNuke Language_Select.ASP HTTP Response Splitting Vulnerability
BugTraq ID: 14063
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14063
Summary:
ASPNuke is prone to an HTTP response splitting vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent
how Web content is served, cached or interpreted. This could aid in various
attacks that attempt to entice client users into a false sense of trust.

4. ASPNuke Comment_Post.ASP SQL Injection Vulnerability
BugTraq ID: 14064
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14064
Summary:
ASPNuke is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

5. True North Software IA EMailServer Remote Format String Vulnerability
BugTraq ID: 14065
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14065
Summary:
True North Software IA eMailServer is prone to a remote format string
vulnerability. This issue is likely due to a failure of the application to
properly sanitize user-supplied input before using it as the format specifier in
a formatted printing function.

Reports indicate that immediate consequences of successful exploitation is a
denial of service.

IA eMailServer version 5.2.2. Build: 1051, is prone to this issue. Previous
versions might also be affected.


6. PHP-Fusion SUBMIT.PHP HTML Injection Vulnerabilities
BugTraq ID: 14066
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14066
Summary:
PHP-Fusion is susceptible to HTML injection vulnerabilities affecting the
'submit.php' script.

These issues may allow an attacker to inject malicious HTML and script code into
the vulnerable application. An unsuspecting user or administrator viewing the
resulting pages will have the attacker-supplied script code executed within
their browser in the context of the vulnerable Web site. 


7. ActiveBuyAndSell Multiple SQL Injection Vulnerabilities
BugTraq ID: 14067
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14067
Summary:
ActiveBuyandSell is prone to multiple SQL injection vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

These issues are reported to affect ActiveBuyandSell 6.x versions; other
versions may also be vulnerable.

8. ActiveBuyAndSell SendPassword.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 14068
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14068
Summary:
ActiveBuyandSell is prone to a cross-site scripting vulnerability.  This issue
is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

This issue is reported to affect ActiveBuyandSell version 6.2; other versions
may also be affected.

9. ASPPlayground.NET Remote Arbitrary File Upload Vulnerability
BugTraq ID: 14070
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14070
Summary:
ASPPlayground.NET is prone to a remote arbitrary file upload vulnerability.

This may allow remote attackers to upload arbitrary files including malicious
scripts and possibly execute the script on the affected server. 

This issue can ultimately facilitate unauthorized access in the context of the
Web server. 


10. Mensajeitor IP Parameter HTML Injection Vulnerability
BugTraq ID: 14071
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14071
Summary:
Mensajeitor is prone to an HTML injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.



11. WebCalendar Assistant_Edit.PHP Unauthorized Access Vulnerability
BugTraq ID: 14072
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14072
Summary:
WebCalendar is affected by an unauthorized access vulnerability.

WebCalendar is affected by an unauthorized access vulnerability.  The issue is
due to a failure in the application to perform proper authentication before
permitting access to the 'assistant_edit.php' script.

The vendor has addressed this issue in WebCalendar version 1.0.0; earlier
versions are reported vulnerable.

12. RealNetworks Real and RealOne Player Unspecified MP3 ActiveX Control
Execution Vulnerability
BugTraq ID: 14073
Remote: Yes
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14073
Summary:
NGSSoftware report that a vulnerability affects RealPlayer for Windows. Reports
indicate that the issue may be exploited to overwrite an arbitrary file or
execute an ActiveX control using a specially formatted malicious MP3 file.

Details about this vulnerability have been withheld until a later date (Sep
27th, 2005). This BID will be updated as soon as this information is made
available.


13. Sun Solaris Runtime Linker LD_AUDIT Privilege Escalation Vulnerability
BugTraq ID: 14074
Remote: No
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14074
Summary:
The Sun Solaris runtime linker is susceptible to a privilege escalation
vulnerability.

Runtime linkers in most operating systems are designed to ignore LD_*
environment variables when executing setuid or setgid binaries. The manual page
describing ld.so for Sun Solaris also states that certain precautions are taken
when setuid or setgid binaries are executed. Reportedly these precautions are
not properly followed when LD_AUDIT is utilized.

This vulnerability allows local attackers to gain superuser privileges on
affected computers.

14. Adobe Acrobat/Adobe Reader Safari Frameworks Folder Permission Escalation
Vulnerability
BugTraq ID: 14075
Remote: No
Date Published: 2005-06-27
Relevant URL: http://www.securityfocus.com/bid/14075
Summary:
Adobe Acrobat and Adobe Reader running on Mac OS X are affected by a folder
permission escalation vulnerability.

The vulnerability exists in the Adobe Reader and Acrobat updater.  

A successful attack can allow local attackers to add potentially malicious
Frameworks leading to various attacks including potential privilege escalation.

15. Adobe Acrobat/Adobe Reader Arbitrary File Execution Vulnerability
BugTraq ID: 14076
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14076
Summary:
Adobe Acrobat and Adobe Reader running on Mac OS X are affected by a
vulnerability that can allow remote attackers to execute arbitrary files on a
computer.

This issue arises when a PDF file containing malicious JavaScript code is
handled by the applications.

Exploitation of this issue can lead to various attacks including execution of
arbitrary code with the privileges of the user running Adobe Acrobat or Adobe
Reader.

16. Infradig Inframail Advantage Server Edition Multiple Remote Buffer Overflow
Vulnerabilities
BugTraq ID: 14077
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14077
Summary:
Infradig Inframail Advantage Server Edition is affected by multiple remote
buffer overflow vulnerabilities.  These issues arise due to a lack of boundary
checks performed by the application and may allow remote attackers to execute
machine code in the context of the server process. 

The following specific issues were identified:

A remote buffer overflow vulnerability affects the FTP server component of
Inframail Advantage Server Edition.

Another remote buffer overflow vulnerability affects the mail server component
of Inframail Advantage Server Edition.

Infradig Inframail Advantage Server Edition 6.0 version 6.37 is reportedly
affected by this issue.

17. Community Server Forums SearchResults.ASPX Cross-Site Scripting
Vulnerability
BugTraq ID: 14078
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14078
Summary:
Community Server Forums is prone to a cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

18. SofoTex BisonFTP Remote Denial Of Service Vulnerability
BugTraq ID: 14079
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14079
Summary:
SofoTex BisonFTP is prone to a remote denial of service vulnerability. Reports
indicate that the issue may only be exploited after successful authentication.

A remote attacker may exploit this issue to deny service for legitimate users.


19. Hosting Controller Error.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 14080
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14080
Summary:
Hosting Controller is prone to a cross-site scripting vulnerability. This issue
is due to a failure in the application to properly sanitize user-supplied input
to the 'error.asp' script. 

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site. This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

20. UBBDesign JCDex Lite Index.PHP Remote File Include Vulnerability
BugTraq ID: 14081
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14081
Summary:
JCDex Lite is prone to a remote file include vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary server-side script code
on an affected computer with the privileges of the Web server process. This may
facilitate unauthorized access.

21. Dynamic Biz Website Builder (QuickWeb) Login.ASP SQL Injection Vulnerability
BugTraq ID: 14083
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14083
Summary:
Dynamic Biz Website Builder (QuickWeb) is prone to an SQL injection
vulnerability.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation. 

Dynamic Biz Website Builder (QuickWeb) 1.0 is reportedly vulnerable.

22. Raritan Dominion SX Multiple Vulnerabilities
BugTraq ID: 14084
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14084
Summary:
Raritan Dominion SX is reportedly prone to multiple vulnerabilities.

Reportedly, the server contains two default accounts that are not protected with
a password.  This can allow a remote attacker to gain unauthorized access to the
server.

Another issue can allow an attacker to potentially gain elevated privileges on
an affected computer as the shadow password file is world readable.

Raritan Dominion SX16, SX32, SX4, SX8, and SXA-48 are reportedly vulnerable. 
The researcher responsible for reporting these issues has stated that DSX32
running firmware version 2.4.6 was tested and is vulnerable to these issues.

This BID will be updated when more details are available.

23. PHPBB Viewtopic.PHP Remote Code Execution Vulnerability
BugTraq ID: 14086
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14086
Summary:
The 'viewtopic.php' phpBB script is prone to a remote PHP script injection
vulnerability.  This issue is due to a failure of the application to properly
sanitize user-supplied URI parameters before using them to construct dynamically
generated web pages.

This issue may allow a remote attacker to execute arbitrary commands in the
context of the web server that is hosting the vulnerable software.

24. Microsoft Internet Explorer Javaprxy.DLL COM Object Instantiation Heap
Overflow Vulnerability
BugTraq ID: 14087
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14087
Summary:
Microsoft Internet Explorer is prone to a heap-based buffer overflow
vulnerability.  The vulnerability is exposed when the 'javaprxy.dll' COM object
is instantiated by a malicious Web page.  

This issue may potentially be exploited to execute arbitrary code in the context
of the client.

The issue was reported in Internet Explorer 6.0 releases on Windows XP SP2. 
Other versions may also be affected.



25. XML-RPC for PHP Remote Code Injection Vulnerability
BugTraq ID: 14088
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14088
Summary:
XML-RPC for PHP is affected by a remote code injection vulnerability.

An attacker may exploit this issue to execute arbitrary commands or code in the
context of the Web server.  This may facilitate various attacks including
unauthorized remote access.

XML-RPC for PHP 1.1 and prior versions are affected by this issue.  Other
applications using this library are also affected.


26. Clam Anti-Virus ClamAV Cabinet File Parsing Remote Denial Of Service
Vulnerability
BugTraq ID: 14089
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14089
Summary:
A remote denial of service vulnerability affects ClamAV.  This issue is due to a
failure of the application to properly handle malicious Cab file content.

An attacker may leverage this issue to crash the Clam Anti-Virus daemon,
potentially leaving an affected computer open to infection by malicious code.

27. Clam Anti-Virus ClamAV MS-Expand File Parsing Remote Denial Of Service
Vulnerability
BugTraq ID: 14090
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14090
Summary:
A remote denial of service vulnerability affects ClamAV.  This issue is due to a
failure of the application to properly handle MS-Expand files.

An attacker may leverage this issue to cause the Clam Anti-Virus daemon to cease
functioning correctly, leaving an affected computer open to infection by
malicious code.

28. CGI-Club imTRBBS Remote Command Execution Vulnerability
BugTraq ID: 14091
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14091
Summary:
imTRBBS is affected by a remote command execution vulnerability.

Specifically, an attacker can supply arbitrary commands prefixed with the '|'
character through the 'im_trbbs.cgi' script that will be executed in the context
of the Web server running the application.

This issue is reported to affect imTRBBS version 1.02; other versions may also
be vulnerable.

29. Cisco IOS AAA RADIUS Authentication Bypass Vulnerability
BugTraq ID: 14092
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14092
Summary:
Cisco IOS Remote Authentication Dial In User Service (RADIUS) is prone to a
remote authentication bypass vulnerability. 

The issue manifests when Cisco IOS is configured to employ AAA RADIUS
authentication and is configured to use 'none' as a fallback method.

A remote attacker may exploit this issue to bypass authentication and gain
unauthorized access to the affected service.

30. Microsoft Update Rollup 1 for Windows 2000 SP4 Released - Multiple
Vulnerabilities Fixed
BugTraq ID: 14093
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14093
Summary:
Microsoft has released Update Rollup 1 for Windows 2000 SP4.  This release
addresses a number of bugs, including some potential security vulnerabilities
and weaknesses and includes various security enhancements and roll-ups for
previous security updates.  In addition to many previously released security
patches, the Update Rollup also includes fixes for many issues that may
potentially impact security properties of various operating system components.


31. Xoops XMLRPC Multiple SQL Injection Vulnerabilities
BugTraq ID: 14094
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14094
Summary:
Xoops is prone to multiple SQL injection vulnerabilities.  These issues are due
to a failure in the application to properly sanitize user-supplied input before
using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

The vendor has addressed this issue in Xoops version 2.0.12; earlier versions
are reported vulnerable.



32. Xoops Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14096
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14096
Summary:
Xoops is prone to multiple cross-site scripting vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.

The vendor has addressed these issues in Xoops version 2.0.12; earlier versions
are reported vulnerable.


33. Community Link Pro Login.CGI File Parameter Remote Command Execution
Vulnerability
BugTraq ID: 14097
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14097
Summary:
Community Link Pro is prone to a remote arbitrary command execution
vulnerability.  This issue presents itself due to insufficient sanitization of
user-supplied data. 

Due to this, an attacker can prefix arbitrary commands with the '|' character
and have them executed in the context of the server.


34. Raven Software Soldier Of Fortune 2 Ignore Command Remote Denial of Service
Vulnerability
BugTraq ID: 14098
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14098
Summary:
A remote denial of service vulnerability affects Raven Software Soldier Of
Fortune 2.

The problem presents itself specifically when the affected server application
receives an excessively large value through a '/ignore' command from a malicious
client.

An attacker may leverage this issue to cause an affected server to crash,
denying service to legitimate users.

35. NateOn Messenger Directory Listing Disclosure Vulnerability
BugTraq ID: 14100
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14100
Summary:
NateOn messenger is prone to a remote directory listing information disclosure
vulnerability. The issue manifests due to an unspecified input validation issue.

An attacker may exploit this issue to gain directory listings for a target user.
Information that is harvested in this manner may be used to aid in further
attacks against a target user.


36. FreeBSD IPFW Address Table Lookup Atomicity Error Firewall Rule Bypass
Vulnerability
BugTraq ID: 14102
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14102
Summary:
FreeBSD IPFW is prone to an atomicity error that might result in erroneous
lookup table matching under certain circumstances. Reports indicate the issue
exists on SMP (Symmetric Multi-Processor) based platforms, or on UP (Uni
Processor) platforms that have a system kernel configured with 'PREEMPTION'
functionality enabled. (Note: This is not a default configuration).

This issue may be leveraged to aid in attacks launched against target computers
that are protected by the affected firewall.


37. FreeBSD TCP Stack Established Connection Denial of Service Vulnerability
BugTraq ID: 14104
Remote: Yes
Date Published: 2005-06-29
Relevant URL: http://www.securityfocus.com/bid/14104
Summary:
FreeBSD TCP stack is affected by a remote denial of service vulnerability.

This issue arises when an affected computer with an established connection
receives a TCP packet with the SYN flag set and accepts it.

A successful attack can deny service for a target connection. 

All FreeBSD releases are vulnerable to this issue.


38. Crip Helper Script Insecure Temporary File Creation Vulnerability
BugTraq ID: 14105
Remote: No
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14105
Summary:
The crip helper scripts create temporary files in an insecure manner.  An
attacker will local access could potentially exploit this issue to overwrite
files in the context of the application.

Exploitation would most likely result in loss of data or a denial of service if
critical files are overwritten in the attack.  There is also an unconfirmed
potential for privilege escalation if the attacker can write custom data in the
attack.

This issue is known to affect crip 3.5.  Other releases may also be affected.

39. Apache HTTP Request Smuggling Vulnerability
BugTraq ID: 14106
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14106
Summary:
Apache is prone to an HTTP request smuggling attack.

A specially crafted request with a 'Transfer-Encoding: chunked' header and a
'Content-Length' can cause the server to forward a reassembled request with the
original 'Content-Length' header.  Due to this, the malicious request may
piggyback with the valid HTTP request.

It is possible that this attack may result in cache poisoning, cross-site
scripting, session hijacking and other attacks. 

This issue was originally described in BID 13873 (Multiple Vendor Multiple HTTP
Request Smuggling Vulnerabilities).  Due to the availability of more details and
vendor confirmation, it is being assigned a new BID.

40. Comdev eCommerce Review Form HTML Injection Vulnerability
BugTraq ID: 14107
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14107
Summary:
Comdev eCommerce is prone to an HTML injection vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input before
using it in dynamically generated content.

Attacker-supplied HTML and script code can be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

41. Pavsta Auto Site SitePath Remote File Include Vulnerability
BugTraq ID: 14108
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14108
Summary:
Pavsta Auto File is prone to a remote file include vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary server-side script code
on an affected computer with the privileges of the Web server process. This may
facilitate unauthorized access.

42. Comdev eCommerce Index.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 14109
Remote: Yes
Date Published: 2005-06-28
Relevant URL: http://www.securityfocus.com/bid/14109
Summary:
Comdev eCommerce is prone to a cross-site scripting vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied input to
the 'index.php' script. 

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site. This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

43. Drupal Arbitrary PHP Code Execution Vulnerability
BugTraq ID: 14110
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14110
Summary:
Drupal is prone to a vulnerability that permits the execution of arbitrary PHP
code.  This issue is due to a failure in the application to properly sanitize
user-supplied input.

The application's filter mechanism fails to properly sanitize user-supplied
input to 'comments' and 'postings'.

The vendor has addressed this issue in Drupal versions 4.6.2 and 4.5.4; earlier
versions are reported vulnerable.



44. FSboard Directory Traversal Vulnerability
BugTraq ID: 14111
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14111
Summary:
FSboard is prone to a directory traversal vulnerability. 

This could allow a remote attacker to read files outside the Web root. This
could only be used to access files to which the Web server has permission.

All versions of FSboard are vulnerable to this issue at the moment.

45. Hitachi Hibun Viewer Unspecified Privilege Escalation Vulnerability
BugTraq ID: 14113
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14113
Summary:
Hitachi Hibun is prone to an unspecified privilege escalation vulnerability, the
details of this issue are not available, however reports indicate that the issue
may be leveraged through the view function of Hibun Viewer from a client
computer.

This BID will be updated when further information is made available.


46. Hitachi Hibun PCMCIA Disk Access Restriction Bypass Vulnerability
BugTraq ID: 14114
Remote: No
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14114
Summary:
Hitachi Hibun is prone to an access restriction bypass vulnerability. The issue
exists because Hibun recognizes an external drive that is connected to a
computer through PCMCIA, as an internal disk.

An attacker may exploit this issue to obtain sensitive information that may aid
in further attacks against a target computer, user, or network.


47. SSH Secure Shell/Tectia Server on Windows Host Identification Key Permission
Vulnerability
BugTraq ID: 14116
Remote: No
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14116
Summary:
SSH Secure Shell/Tectia Server on Windows platforms are prone to a vulnerability
that could disclose private keys to other users of the computer.  This is due to
insecure default permissions on the file containing the private key.

A malicious user who obtains the host identification key could potentially use
the key in attacks against clients.

SSH Secure Shell was re-branded Tectia Server as of Tectia Server release 4.0.

48. Mambo Open Source Multiple Unspecified Injection Vulnerabilities
BugTraq ID: 14117
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14117
Summary:
Mambo is prone to multiple unspecified injection vulnerabilities.  These issues
are most likely due to a failure in the application to properly sanitize
user-supplied input.

Successful exploitation of these vulnerabilities could lead to unauthorized
access; other attacks may also be possible.

The vendor has addressed these issues in Mambo version 4.5.2.2 and later;
earlier versions are reported vulnerable.

49. Mambo Open Source Session ID Spoofing Vulnerability
BugTraq ID: 14119
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14119
Summary:
Mambo is prone to a session ID spoofing vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input.

The vendor has addressed this issue in Mambo 4.5.2.2 and later; earlier versions
are reported vulnerable.



50. Mambo Open Source MosDBTable Class Unspecified Vulnerability
BugTraq ID: 14120
Remote: Yes
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14120
Summary:
Mambo is prone to an unspecified vulnerability. Vendor reports indicate that the
issue exists due to a problem with the bind method in the Mambo mosDBTable
class.

The potential impact of this issue is currently unknown. This BID will be
updated when further information is made available.


51. NetBSD CLCS / EMUXKI Audio Driver Local Denial of Service Vulnerability
BugTraq ID: 14122
Remote: No
Date Published: 2005-06-30
Relevant URL: http://www.securityfocus.com/bid/14122
Summary:
NetBSD has reported a local denial of service condition due to a kernel-level
bug in the clcs and emuxki audio drivers.  NetBSD versions 1.6 to 2.0.2 are
affected.  

Local users with access to the audio device can cause a kernel failure on
systems with specific hardware.  The devices associated with the drivers are:

CS4280/4281, SB Live, or SB PC 512 

This is a vulnerability on multi-user systems where local users have access to
the audio device.  In anticipation of systems where users do not, multimedia
applications may be installed with setuid permissions.  These may provide
channels of attack if they themselves have vulnerabilities of their own.

52. Prevx Pro 2005 Intrusion Prevention System Multiple Vulnerabilities
BugTraq ID: 14123
Remote: No
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14123
Summary:
Prevx Pro 2005 Intrusion Prevention System is affected by multiple
vulnerabilities.

Local attackers can bypass security features of the application.  This may lead
to various attacks against the affected computer.

All versions of Prevx Pro 2005 are considered to be vulnerable at the moment.

53. Golden FTP Server Pro Multiple Remote Vulnerabilities
BugTraq ID: 14124
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14124
Summary:
Golden FTP Server Pro is affected by multiple remote vulnerabilities.

The following specific issues were identified:

Golden FTP Server Pro is susceptible to a directory traversal vulnerability.  A
remote attacker may disclose file names and user names from the application
directory.

An attacker can disclose the absolute path of a share by attempting to retrieve
a file that does not exist.

These issues may aid in other attacks against the affected computer.

Golden FTP Server Pro 2.60 is affected by these vulnerabilities.

54. OpenLDAP TLS Plaintext Password Vulnerability
BugTraq ID: 14125
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14125
Summary:
OpenLDAP is affected by a password disclosure vulnerability when used with TLS.

This issue arises when a connection to a slave is established using TLS and the
client is referred to a master.  TLS is not used with this connection, which can
allow an attacker to sniff network traffic and obtain user credentials.

OpenLDAP 2.1.25 is known to be vulnerable at the moment.  Other versions may be
affected as well.

55. PADL Software PAM_LDAP TLS Plaintext Password Vulnerability
BugTraq ID: 14126
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14126
Summary:
PAM_LDAP is affected by a password disclosure vulnerability when used with TLS.

This issue arises when a connection to a slave is established using TLS and the
client is referred to a master.  TLS is not used with this connection, which can
allow an attacker to sniff network traffic and obtain user credentials.

PAM_LDAP build 166 is known to be vulnerable at the moment. Other versions may
be affected as well.

56. OSTicket Multiple Input Validation Vulnerabilities
BugTraq ID: 14127
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14127
Summary:
osTicket is affected by multiple input validation vulnerabilities.  These issues
arise due to insufficient sanitization of user-supplied data.

The following specific issues were identified:

The application is prone to an SQL injection vulnerability.  Successful
exploitation could result in a compromise of the application, disclosure or
modification of data, or may permit an attacker to exploit vulnerabilities in
the underlying database implementation.

osTicket is also prone to a local file include vulnerability.  An attacker may
leverage this issue to execute arbitrary server-side script code that resides on
an affected computer with the privileges of the Web server process. This may
potentially facilitate unauthorized access. 

osTicket 1.3.1 beta and prior versions are affected.

57. RaXnet Cacti Input Filter Multiple SQL Injection Vulnerabilities
BugTraq ID: 14128
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14128
Summary:
RaXnet Cacti is prone to multiple SQL injection vulnerabilities.  These issues
are due to a bug in the input filters that lead to a failure in the application
to properly sanitize user-supplied input, before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.




58. RaXnet Cacti Graph_Image.PHP Remote Command Execution Variant Vulnerability
BugTraq ID: 14129
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14129
Summary:
RaXnet Cacti is prone to a remote command execution vulnerability that manifests
in the 'graph_image.php' script. The issue is due to a bug in the input filters
that leads to a failure in the application to properly sanitize user-supplied
input. 

This issue can facilitate various attacks including unauthorized access to an
affected computer.


59. RaXnet Cacti Config.PHP Design Error Vulnerability
BugTraq ID: 14130
Remote: Yes
Date Published: 2005-07-01
Relevant URL: http://www.securityfocus.com/bid/14130
Summary:
A design error affects RaXnet Cacti that can allow an attacker to prevent
'session_start()', and 'addslashes()' from being called. 

The affected 'session_start()' and 'addslashes()' calls are nested inside an
'if' control statement that depends on an attacker-controlled value. Reports
indicate that this value may be controlled through a URI parameter when
'register_globals' is set.

A remote attacker may exploit these issues to gain administrative access to the
affected software.



III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Flawed USC admissions site allowed access to applicant data
By: Robert Lemos
A programming error in the University of Southern California's online
application system left prospective student information publicly accessible.
http://www.securityfocus.com/news/11239

2. Reverse engineering patches making disclosure a moot choice?
By: Robert Lemos
Tools to detect the differences in code caused by patching a program are getting
better, allowing both security researchers and potential attackers to quickly
pinpoint vulnerabilities.
http://www.securityfocus.com/news/11235

3. Open-source projects get free checkup by automated tools
By: Robert Lemos
The source code for the Unix-like operating systems FreeBSD is the latest
community software to have coding problems flagged by an automated analysis
tool.
http://www.securityfocus.com/news/11230

4. Targeted Trojan-horse attacks hitting U.S., worldwide
By: Robert Lemos
The U.K.'s incident response team warned of stealthy attacks aimed at that
nation's businesses and government agencies, but security firms say the attacks
have targeted companies and organizations across the globe, including the U.S. 
http://www.securityfocus.com/news/11222

5. Sasser suspect goes on trial
By: John Leyden
The German teenager accused of creating the infamous Sasser worm is due to stand
trial for computer sabotage offences later today (Tuesday, 5 July).
http://www.securityfocus.com/news/11238

6. China signs anti-spam pact
By: Tim Richardson
China - the world's second biggest producer of spam behind the US - has signed
up to an international agreement to crack down on unsolicited email.
http://www.securityfocus.com/news/11236

7. Warning over unpatched IE bug
By: John Leyden
An unpatched vulnerability in Internet Explorer creates a means for hackers to
take over vulnerable Windows PCs, security researchers warn.
http://www.securityfocus.com/news/11237

8. Net radio station silenced after phishing bust
By: Jan Libbenga
A Norwegian internet radio station was shut down temporarily earlier this week
because one of its employees allegedly ran an eBay phishing scam.
http://www.securityfocus.com/news/11234

IV.  SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Channel / Business Development, Austin
http://www.securityfocus.com/archive/77/404256

2. [SJ-JOB] Account Manager, London
http://www.securityfocus.com/archive/77/404257

3. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/404259

4. [SJ-JOB] Sr. Security Engineer, Cupertino
http://www.securityfocus.com/archive/77/404260

5. [SJ-JOB] Sales Representative, Dalls, Houston, other
http://www.securityfocus.com/archive/77/404258

6. [SJ-JOB] Security Consultant, Orlando
http://www.securityfocus.com/archive/77/404273

7. [SJ-JOB] Sr. Security Analyst, Rockville
http://www.securityfocus.com/archive/77/404271

8. [SJ-JOB] Jr. Security Analyst, Leuven
http://www.securityfocus.com/archive/77/404274

9. [SJ-JOB] Sr. Security Analyst, Tampa
http://www.securityfocus.com/archive/77/404275

10. [SJ-JOB] Compliance Officer, Berkshire
http://www.securityfocus.com/archive/77/404243

11. [SJ-JOB] Sales Engineer, Vancouver
http://www.securityfocus.com/archive/77/404248

12. [SJ-JOB] Security System Administrator, London
http://www.securityfocus.com/archive/77/404272

13. [SJ-JOB] Sales Engineer, Calgary
http://www.securityfocus.com/archive/77/404242

14. [SJ-JOB] Sr. Security Analyst, Palo Alto
http://www.securityfocus.com/archive/77/404244

15. [SJ-JOB] Manager, Information Security, Alexandria
http://www.securityfocus.com/archive/77/404241

16. [SJ-JOB] Security Engineer, Burbank
http://www.securityfocus.com/archive/77/404171

17. [SJ-JOB] Security Consultant, Seattle Area
http://www.securityfocus.com/archive/77/404239

18. [SJ-JOB] Developer, McLean
http://www.securityfocus.com/archive/77/404240

19. [SJ-JOB] Certification & Accreditation Engineer, Herndon
http://www.securityfocus.com/archive/77/404169

20. [SJ-JOB] Security Engineer, Plano
http://www.securityfocus.com/archive/77/404170

21. [SJ-JOB] Security Consultant, Chicago
http://www.securityfocus.com/archive/77/404238

22. [SJ-JOB] Security Consultant, Bangalore
http://www.securityfocus.com/archive/77/404163

23. [SJ-JOB] Security Consultant, Princeton
http://www.securityfocus.com/archive/77/404166

24. [SJ-JOB] Quality Assurance, Columbia
http://www.securityfocus.com/archive/77/404142

25. [SJ-JOB] Information Assurance Engineer, Washington
http://www.securityfocus.com/archive/77/404144

26. [SJ-JOB] Technical Support Engineer, Herndon
http://www.securityfocus.com/archive/77/404148

27. [SJ-JOB] Technical Support Engineer, London
http://www.securityfocus.com/archive/77/404146

28. [SJ-JOB] Technical Support Engineer, Cupertino
http://www.securityfocus.com/archive/77/404160

29. [SJ-JOB] Security Consultant, Toronto
http://www.securityfocus.com/archive/77/404139

30. [SJ-JOB] Sr. Security Engineer, San Diego
http://www.securityfocus.com/archive/77/404123

31. [SJ-JOB] Sr. Security Engineer, Charleston
http://www.securityfocus.com/archive/77/404131

32. [SJ-JOB] Security Architect, Reading / London
http://www.securityfocus.com/archive/77/404106

33. [SJ-JOB] Auditor, Plano
http://www.securityfocus.com/archive/77/404116

34. [SJ-JOB] Channel / Business Development, santa clara
http://www.securityfocus.com/archive/77/404118

35. [SJ-JOB] Manager, Information Security, New London area
http://www.securityfocus.com/archive/77/404093

36. [SJ-JOB] Management, London
http://www.securityfocus.com/archive/77/404094

37. [SJ-JOB] Security Architect, Los Angeles
http://www.securityfocus.com/archive/77/404096

38. [SJ-JOB] Sr. Security Engineer, New York
http://www.securityfocus.com/archive/77/404090

39. [SJ-JOB] Sr. Security Engineer, Los Angeles
http://www.securityfocus.com/archive/77/404091

40. [SJ-JOB] Security Architect, New York
http://www.securityfocus.com/archive/77/404092

41. [SJ-JOB] Account Manager, Minneapolis
http://www.securityfocus.com/archive/77/403765

42. [SJ-JOB] Director, Information Security, London
http://www.securityfocus.com/archive/77/403745

43. [SJ-JOB] Security Consultant, London - West
http://www.securityfocus.com/archive/77/403746

44. [SJ-JOB] Sr. Security Analyst, Chicago
http://www.securityfocus.com/archive/77/403747

45. [SJ-JOB] Security Consultant, Minneapolis
http://www.securityfocus.com/archive/77/403748

46. [SJ-JOB] Sr. Security Analyst, Chicago
http://www.securityfocus.com/archive/77/403790

47. [SJ-JOB] Security Engineer, Carson (LA County)
http://www.securityfocus.com/archive/77/403783

V.   INCIDENTS LIST SUMMARY
---------------------------
VI.  VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. Call for Paritipation: C.I.P.H.E.R Contest
http://www.securityfocus.com/archive/82/403776

VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. what is file refcache.ser
http://www.securityfocus.com/archive/88/404249

2. Blackhat Vegas 2005 Training
http://www.securityfocus.com/archive/88/403786

3. SecurityFocus Microsoft Newsletter #246
http://www.securityfocus.com/archive/88/403852

4. DOMAIN CONTROLLER STOLEN...WHAT NEXT?
http://www.securityfocus.com/archive/88/403683

5. Local admin password
http://www.securityfocus.com/archive/88/403594

VIII. SUN FOCUS LIST SUMMARY
----------------------------
IX. LINUX FOCUS LIST SUMMARY
----------------------------
[ terug ]