Home
Systeembeheer
Consultancy
Connectivity
Training
Development

Klanten

Inloggen

Resources

Sans artikelen
Security artikelen

Software

Linux
Windows









[ terug ]
SecurityFocus Newsletter #309
----------------------------------------

This Issue is Sponsored By: SPI Dynamics

ALERT: How a Hacker Launches a SQL Injection Attack
It's as simple as placing additional SQL commands into a Web Form input box
giving hackers complete access to all your backend systems! Firewalls and IDS
will not stop such attacks because SQL Injections are NOT seen as intruders.
Download this *FREE* white paper from SPI Dynamics for a complete guide to
protection!

http://www.securityfocus.com/sponsor/SPIDynamics_sf-news_050614

------------------------------------------------------------------
I.    FRONT AND CENTER
       1. CardSystems made its choices clear
       2. The CardSystems blame game
II.   BUGTRAQ SUMMARY
       1. GoodTech SMTP Server RCPT TO Multiple Remote Buffer Overflow
Vulnerabilities
       2. RealChat User Impersonation Vulnerability
       3. ClamAV Multiple Integer Overflow Vulnerabilities
       4. SCO UnixWare RPC Portmapper Denial of Service Vulnerability
       5. Beehive Forum Webtag Multiple SQL Injection Vulnerabilities
       6. Sophos Anti-Virus Library Unspecified Remote Heap Overflow
Vulnerability
       7. Beehive Forum Webtag Multiple Cross-Site Scripting Vulnerabilities
       8. ECI Telecom B-FOCuS Router 312+ Unauthorized Access Vulnerability
       9. Hobbit Monitor Remote Denial Of Service Vulnerability
       10. FTPLocate Remote Command Execution Vulnerability
       11. Atomic Photo Album Apa_PHPInclude.INC.PHP Remote File Include
Vulnerability
       12. SAP Internet Graphics Server Directory Traversal Vulnerability
       13. 3Com OfficeConnect Wireless 11g Access Point Remote Information
Disclosure Vulnerability
       14. PHPFirstpost  Block.PHP Remote File Include Vulnerability
       15. Siemens Santis 50 Wireless Router Web Interface Denial Of Service
Vulnerability
       16. Netquery Multiple Remote Vulnerabilities
       17. Vim ModeLines Further Variant Arbitrary Command Execution
Vulnerability
       18. Gentoo Sandbox Multiple Insecure Temporary File Creation
Vulnerabilities
       19. Microsoft Windows Unspecified USB Driver Buffer Overflow
Vulnerability
       20. Ares Fileshare Remote Buffer Overflow Vulnerability
       21. PSToText Arbitrary Code Execution Vulnerability
       22. NetPBM PSToPNM Arbitrary Code Execution Vulnerability
       23. ProFTPD SQLShowInfo SQL Output Format String Vulnerability
       24. ProFTPD Shutdown Message Format String Vulnerability
       25. FTPShell Server Denial of Service Vulnerability
       26. VBZoom Forum Show.PHP SQL Injection Vulnerability
       27. Fetchmail POP3 Client Remote Denial of Service Vulnerabilities
       28. SPI Dynamics WebInspect Cross Application Script Injection
Vulnerability
       29. CartWIZ ViewCart.ASP Cross Site Scripting Vulnerability
       30. IBM Access Connections Shared Section Insecure Permissions
Vulnerability
       31. IBM Lotus Domino WebMail Information Disclosure Vulnerability
       32. IBM Lotus Domino Password Encryption Weakness
       33.  NETonE PHPBook Guestbook.PHP Cross Site Scripting Vulnerability
       34. Advanced Guestbook User-Agent HTML Injection Vulnerability
       35. PNG Counter Demo.PHP Cross-Site Scripting Vulnerability
       36. Hosting Controller Unauthorized Access Vulnerability
       37. FreeBSD IPsec Session AES-XCBC-MAC Authentication Constant Key Usage
Vulnerability
       38. Clever Copy Multiple Cross-Site Scripting Vulnerabilities
       39. BMForum Multiple Cross Site Scripting Vulnerabilities
       40. Clever Copy Private Message Unauthorized Access Vulnerability
       41. Novell GroupWise Client Remote Buffer Overflow Vulnerability
       42. Ethereal Multiple Protocol Dissector Vulnerabilities
       43. MDaemon Content Filter Directory Traversal Vulnerability
       44. Opera Web Browser Content-Disposition Header Download Dialog File
Extension Spoofing Vulnerability
       45. PHPList Admin Page SQL Injection Vulnerability
       46. Website Baker Browse.PHP Cross-Site Scripting Vulnerability
       47. Gforge Multiple Cross Site Scripting Vulnerabilities
       48. Website Baker Arbitrary File Upload Vulnerability
       49. Linksys WRT54G Wireless Router Default SSL Certificate and Private
Key Vulnerability
       50. @Mail Multiple Cross Site Scripting Vulnerabilities
       51. Thomson Web Skill Vantage Manager SQL Injection Vulnerability
       52. Opera Web Browser Image Dragging Cross-Domain Scripting and File
Retrieval Vulnerability
       53. Cisco IOS IPv6 Processing Arbitrary Code Execution Vulnerability
       54. Easypx41 Multiple Cross Site Scripting Vulnerabilities
       55. LibTiff Tiff Image Header Divide By Zero Denial of Service
Vulnerability
       56. HP NonStop Server DCE Core Services Remote Denial of Service
Vulnerability
       57. Novell eDirectory NMAS Authentication Bypass Vulnerability
       58. Gopher Insecure Temporary File Creation Vulnerability
       59. Easypx41 Multiple Variable Injection Vulnerabilities
       60. Ung Arbitrary Email Header Injection Vulnerability
       61. VBZooM Forum Multiple Cross-Site Scripting Vulnerabilities
       62. Simplicity oF Upload Download.PHP Remote File Include Vulnerability
       63. Kayako LiveResponse Multiple Input Validation Vulnerabilities
       64. PluggedOut CMS Multiple Input Validation Vulnerabilities
       65. PC-Experience/Toppe Unauthorized User Access Vulnerability
       66. PC-Experience/Toppe PM.PHP MSG Parameter Cross-Site Scripting
Vulnerability
       67. Ragnarok Online Control Panel Authentication Bypass Vulnerability
       68. Kismet Multiple Unspecified Remote Vulnerabilities
       69. Metasploit Framework Unspecified Remote Vulnerability
III.  SECURITYFOCUS NEWS
       1. Exploit writers team up to target Cisco routers
       2. Reading, rooting, 'rithmetic: Preschoolers learn programming
       3. Settlement reached in Cisco flaw dispute
       4. Cisco, ISS file suit against rogue researcher
       5. Infrared exploits open the door to hotel hacking
       6. Linux Bluetooth hackers hijack car audio
       7. Cisco details Black Hat vuln fix
       8. Sophos bug highlights wider anti-virus flaws
IV.   SECURITY JOBS LIST SUMMARY
       1. [SJ-JOB] Quality Assurance, Alexandria
       2. [SJ-JOB] Information Assurance Engineer, London/UK wide
       3. [SJ-JOB] Sales Representative, London /UK Wide
       4. [SJ-JOB] Security Consultant, Oakland
       5. [SJ-JOB] Security Consultant, London /UK Wide
       6. [SJ-JOB] Security Consultant, London /UK Wide
       7. [SJ-JOB] Security Consultant, London
       8. [SJ-JOB] Security Auditor, London /UK Wide
       9. [SJ-JOB] Certification & Accreditation Engineer, Washington Metro
       10. [SJ-JOB] Jr. Security Analyst, Washington Metro
       11. [SJ-JOB] Incident Handler, Dubai
       12. [SJ-JOB] Forensics Engineer, Reading
       13. [SJ-JOB] Security Architect, Herndon
       14. [SJ-JOB] Developer, North Sydney
       15. [SJ-JOB] Security Engineer, Dubai
       16. [SJ-JOB] VP, Information Security, Tokyo
       17. [SJ-JOB] Security Engineer, Chicago
       18. [SJ-JOB] Security Product Marketing Manager, Redwood City
       19. [SJ-JOB] Security Engineer, Detroit
       20. [SJ-JOB] Security Engineer, Seattle
       21. [SJ-JOB] Manager, Information Security, Chicago
       22. [SJ-JOB] Security Engineer, Columbia
       23. [SJ-JOB] Security Engineer, alexandria
       24. [SJ-JOB] Developer, Boulder
       25. [SJ-JOB] Security Engineer, San Francisco
V.    INCIDENTS LIST SUMMARY
VI.   VULN-DEV RESEARCH LIST SUMMARY
       1. font book crash os x
       2. Advice On FireFox Bug
VII.  MICROSOFT FOCUS LIST SUMMARY
       1. SecurityFocus Microsoft Newsletter #249
VIII. SUN FOCUS LIST SUMMARY
       1. Accessing Solaris 10 Local Zones from the Global Zone, security risk
IX.   LINUX FOCUS LIST SUMMARY
X.    UNSUBSCRIBE INSTRUCTIONS
XI.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. CardSystems made its choices clear
By Daniel Hanson
The last thing that many of us need is another example where a situation needs
to be solved by ill-conceived legislation that is proposed and passed in the
heat of something big.
http://www.securityfocus.com/columnists/343

2. The CardSystems blame game
By Mark Rasch
On July 21, 2005, the United States House of Representatives Committee on
Financial Services, Subcommittee on Oversight held a hearing on "Credit Card
Data Processing: How Secure Is It?"
http://www.securityfocus.com/columnists/344


II.  BUGTRAQ SUMMARY
--------------------
1. GoodTech SMTP Server RCPT TO Multiple Remote Buffer Overflow Vulnerabilities
BugTraq ID: 14357
Remote: Yes
Date Published: 2005-07-23
Relevant URL: http://www.securityfocus.com/bid/14357
Summary:
GoodTech SMTP Server is susceptible to two remote buffer overflow
vulnerabilities when handling RCPT TO commands. This issue is due to a failure
of the application to properly bounds check user-supplied data prior to copying
it to fixed size memory buffers.

These vulnerabilities allow remote attackers to execute arbitrary machine code
with System level privileges in the context of the affected application.

2. RealChat User Impersonation Vulnerability
BugTraq ID: 14358
Remote: Yes
Date Published: 2005-07-23
Relevant URL: http://www.securityfocus.com/bid/14358
Summary:
RealChat is a commercial chat server written in Java, supporting multiple
platforms.

RealChat is susceptible to a user impersonation vulnerability. This issue is due
to a design error in the application.

This vulnerability allows attackers to spoof the source of chat messages.
Attackers may also spoof the avatar picture for users, making users receiving
spoofed messages more likely to attribute them to the perceived source.

3. ClamAV Multiple Integer Overflow Vulnerabilities
BugTraq ID: 14359
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14359
Summary:
ClamAV is susceptible to multiple integer overflow vulnerabilities.

Specifically, the vulnerabilities present themselves when the ClamAV antivirus
library handles malformed files.

This may allow attackers to control the flow of execution, and potentially
execute attacker-supplied code in the context of the affected application.

ClamAV 0.86.1 and prior versions are reported to be affected.

4. SCO UnixWare RPC Portmapper Denial of Service Vulnerability
BugTraq ID: 14360
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14360
Summary:
SCO UnixWare is reported prone to a denial of service vulnerability.

Reportedly, this issue arises when the application handles multiple invalid
portmap requests.

UnixWare 7.x versions are reported to be affected.

5. Beehive Forum Webtag Multiple SQL Injection Vulnerabilities
BugTraq ID: 14361
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14361
Summary:
Beehive Forum is prone to multiple SQL injection vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied input
before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

6. Sophos Anti-Virus Library Unspecified Remote Heap Overflow Vulnerability
BugTraq ID: 14362
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14362
Summary:
An unspecified remote heap overflow vulnerability exists in Sophos Anti-Virus
Library. This issue is due to a failure of the library to properly bounds check
user-supplied input prior to copying data to an internal memory buffer.

No further information is known at this time. This BID will be updated as
further information becomes available.

7. Beehive Forum Webtag Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14363
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14363
Summary:
Beehive Forum is prone to multiple cross-site scripting vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.

8. ECI Telecom B-FOCuS Router 312+ Unauthorized Access Vulnerability
BugTraq ID: 14364
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14364
Summary:
B-FOCuS Router 312+ is affected by a vulnerability that can allow unauthorized
attackers to gain access to an affected device.

An attacker can disclose the administrator password through the Web interface of
the device.

This can lead to a complete compromise of the router.

9. Hobbit Monitor Remote Denial Of Service Vulnerability
BugTraq ID: 14365
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14365
Summary:
Hobbit Monitor is affected by a remote denial of service vulnerability.  This
issue is due to a failure in the application to handle exceptional conditions.

The application fails to deal with data received in a proper manner.  An
attacker can exploit this vulnerability by sending malicious data to the
affected application and crash it, denying service to legitimate users.

10. FTPLocate Remote Command Execution Vulnerability
BugTraq ID: 14367
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14367
Summary:
FtpLocate is prone to a remote arbitrary command execution vulnerability. This
issue presents itself due to insufficient sanitization of user-supplied data.

An attacker can supply arbitrary commands and have them executed in the context
of the server.

This issue may facilitate unauthorized remote access to the computer running the
hosting Web server.


11. Atomic Photo Album Apa_PHPInclude.INC.PHP Remote File Include Vulnerability
BugTraq ID: 14368
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14368
Summary:
Atomic Photo Album is susceptible to a remote PHP file include vulnerability.
This issue is due to a failure in the application to properly sanitize
user-supplied input.

An attacker may exploit this issue to execute arbitrary PHP code on an affected
computer with the privileges of the Web server process. This may facilitate
unauthorized access.


12. SAP Internet Graphics Server Directory Traversal Vulnerability
BugTraq ID: 14369
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14369
Summary:
Internet Graphics Server is affected by a directory traversal vulnerability. 
This issue is due to a failure in the application to properly sanitize
user-supplied input.

A remote unauthorized user can disclose the contents of arbitrary local files
through the use of directory traversal strings '../'.  Exploitation of this
vulnerability could lead to a loss of confidentiality.

13. 3Com OfficeConnect Wireless 11g Access Point Remote Information Disclosure
Vulnerability
BugTraq ID: 14370
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14370
Summary:
3Com OfficeConnect Wireless 11g Access Point 3CRWE454G72 is reported prone to an
information disclosure vulnerability.

Information gathered through this attack may allow an attacker to carry out
further attacks against the device or other network users.

3Com OfficeConnect Wireless 11g Access Point 3CRWE454G72 firmware versions prior
to 1.03.12 are reported prone to this vulnerability.


14. PHPFirstpost  Block.PHP Remote File Include Vulnerability
BugTraq ID: 14371
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14371
Summary:
Phpfirstpost is susceptible to a remote PHP file include vulnerability. This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may exploit this issue to execute arbitrary PHP code on an affected
computer with the privileges of the Web server process. This may facilitate
unauthorized access.


15. Siemens Santis 50 Wireless Router Web Interface Denial Of Service
Vulnerability
BugTraq ID: 14372
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14372
Summary:
Siemens Santis 50 Wireless router Web interface is affected by a remote denial
of service vulnerability.

An attacker can exploit this issue to deny service to the Web interface and gain
access to privileged functions of the telnet CLI.  These functions enable the
attacker to discover information about the configuration of the device and
connections.  The attacker can also erase the FLASH contents.

Information obtained may be used in further attacks against the vulnerable
device or the network it operates on.

This issue may also affect the Ericsson HN294dp and Dynalink RTA300W routers. 
Both devices are believed to use the same hardware as the Siemens Santis 50
Wireless router; this has not been confirmed by Symantec.


16. Netquery Multiple Remote Vulnerabilities
BugTraq ID: 14373
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14373
Summary:
Netquery is affected by multiple remote vulnerabilities.  These issues can allow
remote attackers to execute arbitrary commands, disclose sensitive information
and carry out cross-site scripting attacks.

Netquery 3.1 is affected by these vulnerabilities.


17. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability
BugTraq ID: 14374
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14374
Summary:
Vim is susceptible to an arbitrary command execution vulnerability with
ModeLines. This issue is due to insufficient sanitization of user-supplied
input.

By modifying a text file to include ModeLines containing the 'glob()', or
'expand()' functions with shell metacharacters, attackers may cause arbitrary
commands to be executed.

This vulnerability allows an attacker to execute arbitrary commands with the
privileges of the vim user. This gives an attacker the ability to gain remote
access to computers running the vulnerable software.

This issue is similar to BIDs 6384 and 11941.

18. Gentoo Sandbox Multiple Insecure Temporary File Creation Vulnerabilities
BugTraq ID: 14375
Remote: No
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14375
Summary:
Sandbox is reported prone to multiple local insecure temporary file creation
vulnerabilities.  These issues are due to design errors that cause the
application to fail to verify the existence of files before writing to them.

This application runs with superuser privileges, allowing local attackers to
overwrite arbitrary files. This may cause system-wide crashes, denying service
to legitimate users. It may also be possible to gain elevated privileges by
exploiting this vulnerability, but this has not been confirmed.

19. Microsoft Windows Unspecified USB Driver Buffer Overflow Vulnerability
BugTraq ID: 14376
Remote: No
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14376
Summary:
An unspecified buffer overflow vulnerability affects USB drivers in Microsoft
Windows operating systems. This issue is due to a failure of the affected driver
to properly bounds check input provided by USB devices.

This issue presents itself when USB devices are attached to computers running
affected device drivers. Upon insertion, the operating system automatically
loads the appropriate device driver to handle the new hardware. By maliciously
altering the data returned to the operating system, it is possible to overflow
memory used in the affected USB device driver.

The information currently available is insufficient to provide a more in-depth
technical description. This BID will be updated as more details become
available.

An attacker may leverage this issue to execute arbitrary machine code with
System privileges on affected computers, or cause the affected computer to
crash. This would occur by attaching a malicious USB device to affected
computers, without the need for an account on the computer.

20. Ares Fileshare Remote Buffer Overflow Vulnerability
BugTraq ID: 14377
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14377
Summary:
Ares Fileshare is affected by a remote buffer overflow vulnerability.

This vulnerability arises when the application handles long search strings.

A successful attack can result in memory corruption leading to arbitrary code
execution in the context of the user running the application.

Ares FileShare 1.1 is affected by this vulnerability.

21. PSToText Arbitrary Code Execution Vulnerability
BugTraq ID: 14378
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14378
Summary:
pstotext is susceptible to an arbitrary command execution vulnerability. This
issue is due to a failure of the application to ensure that GhostScript is
executed in a secure manner.

This issue allows attackers to create malicious PostScript files, that when
parsed by the affected utility, allow arbitrary commands to be executed. This
occurs in the context of the user running the affected utility.

22. NetPBM PSToPNM Arbitrary Code Execution Vulnerability
BugTraq ID: 14379
Remote: Yes
Date Published: 2005-07-25
Relevant URL: http://www.securityfocus.com/bid/14379
Summary:
pstopnm is susceptible to an arbitrary command execution vulnerability. This
issue is due to a failure of the application to ensure that GhostScript is
executed in a secure manner.

This issue allows attackers to create malicious PostScript files, that when
parsed by the affected utility, allow arbitrary commands to be executed. This
occurs in the context of the user running the affected utility.

This vulnerability was reported in version 10.0 of netpbm. Other versions may
also be affected.

23. ProFTPD SQLShowInfo SQL Output Format String Vulnerability
BugTraq ID: 14380
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14380
Summary:
A format string vulnerability exists in ProFTPD.  This issue is exposed when the
SQLShowInfo directive is enabled.  If the attacker can influence data in the
backend SQL database, it is possible to exploit this issue by inserting a
malicious format string into data that will be queried by ProFTPD.

Successful exploitation will result in arbitrary code execution in the context
of the server.

24. ProFTPD Shutdown Message Format String Vulnerability
BugTraq ID: 14381
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14381
Summary:
A format string vulnerability exists in ProFTPD.  This issue is exposed when the
server prints a shutdown message containing certain variables such as the
current directory.  If an attacker could create a directory on the server, it
may be possible to trigger this issue.

Successful exploitation will result in arbitrary code execution in the context
of the server.

25. FTPShell Server Denial of Service Vulnerability
BugTraq ID: 14382
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14382
Summary:
FTPshell server is prone to a denial of service vulnerability.  This issue is
due to a failure in the application to handle exceptional conditions.

The problem presents itself when an attacker opens and closes, without using the
'quit' command, a connection to the application multiple times.  This will cause
the application to terminate.  An attacker can exploit this vulnerability to
deny service to legitimate users.

26. VBZoom Forum Show.PHP SQL Injection Vulnerability
BugTraq ID: 14383
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14383
Summary:
VBZooM Forum is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

27. Fetchmail POP3 Client Remote Denial of Service Vulnerabilities
BugTraq ID: 14384
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14384
Summary:
Fetchmail is affected by multiple remote denial of service vulnerabilities.

These issues were introduced due to a fix that was released for BID 14349
(Fetchmail POP3 Client Buffer Overflow Vulnerability).

Specifically, malformed responses from a malicious server can cause the client
to crash.

These issues affect Fetchmail 6.2.5.1.

28. SPI Dynamics WebInspect Cross Application Script Injection Vulnerability
BugTraq ID: 14385
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14385
Summary:
WebInspect is vulnerable to a cross-application script injection vulnerability.
This issue is due to a failure of the application to properly sanitize
user-supplied data prior to including it in content rendered in an Internet
Explorer COM object.

This vulnerability allows attackers to execute arbitrary script code in the
context of the vulnerable application. By exploiting the knowledge of
predictable files on the targeted system, attackers may also cause arbitrary
script code to be executed in the "Local Machine" zone, facilitating remote
machine code installation and execution.

29. CartWIZ ViewCart.ASP Cross Site Scripting Vulnerability
BugTraq ID: 14386
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14386
Summary:
CartWIZ is prone to a cross-site scripting vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.


30. IBM Access Connections Shared Section Insecure Permissions Vulnerability
BugTraq ID: 14387
Remote: No
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14387
Summary:
IBM Access Connections utilizes Shared Sections in an insecure manner. It
creates a Shared Section memory region with insecure permissions allowing local
attackers to gain inappropriate access to it.

Attackers may read the data stored in the memory region, gaining access to
potentially sensitive information. They may also write arbitrary data to the
shared memory segment, potentially crashing the processes using the segment and
denying service to legitimate users.

31. IBM Lotus Domino WebMail Information Disclosure Vulnerability
BugTraq ID: 14388
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14388
Summary:
IBM Lotus Domino WebMail is affected by an information disclosure vulnerability.

An attacker can disclose a user's password hash.

They may subsequently carry out brute force attacks to crack the password and
gain access to the user's account.

32. IBM Lotus Domino Password Encryption Weakness
BugTraq ID: 14389
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14389
Summary:
IBM Lotus Domino is affected by a password encryption weakness.  This issue
arises due to a design error.

Reportedly, the algorithm used by Lotus Domino to encrypt user passwords does
not use a salt value.

This can aid in brute force attacks by significantly reducing the time needed to
crack a password.  Attackers may also pre-compute password hashes before
targeting a vulnerable computer.

All versions of Lotus Domino are considered to be affected by this weakness.

33.  NETonE PHPBook Guestbook.PHP Cross Site Scripting Vulnerability
BugTraq ID: 14390
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14390
Summary:
NETonE PHPBook is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input to
the 'admin' parameter of the 'guestbook.php' script.

This may facilitate the theft of cookie-based authentication credentials as well
as other attacks.


34. Advanced Guestbook User-Agent HTML Injection Vulnerability
BugTraq ID: 14391
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14391
Summary:
Advanced Guestbook is prone to an HTML injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

35. PNG Counter Demo.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 14392
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14392
Summary:
PNG Counter is prone to a cross-site scripting vulnerability.  This issue is due
to a failure of the application to properly sanitize user-supplied URI input
that will be output in dynamically generated Web pages.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user. The attacker would need to entice the
unsuspecting user to follow a malicious link containing script code embedded in
the affected parameter. This may facilitate the theft of cookie-based
authentication credentials as well as other attacks.

PNG Counter 1.0 is vulnerable to this issue.

36. Hosting Controller Unauthorized Access Vulnerability
BugTraq ID: 14393
Remote: Yes
Date Published: 2005-07-26
Relevant URL: http://www.securityfocus.com/bid/14393
Summary:
Hosting Controller is prone to an unauthorized access vulnerability.

An attacker can manipulate the application to navigate beyond their folder and
view the folders for all resellers and Web admin utilizing this instance of the
Hosting Controller application.  This would result in information disclosure and
a loss of confidentiality.  Information obtained may also aid in further
attacks.


37. FreeBSD IPsec Session AES-XCBC-MAC Authentication Constant Key Usage
Vulnerability
BugTraq ID: 14394
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14394
Summary:
FreeBSD is affected by a vulnerability that may allow remote unauthorized
attackers to establish an IPsec session.

The vulnerability presents itself when the 'AES-XCBC-MAC' algorithm is used for
authentication without any other method of IPsec encryption.

A successful attack can allow an attacker to forge packets and potentially
establish an IPsec session.  This can lead to various other attacks.

38. Clever Copy Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14395
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14395
Summary:
Clever Copy is prone to multiple cross-site scripting vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.

39. BMForum Multiple Cross Site Scripting Vulnerabilities
BugTraq ID: 14396
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14396
Summary:
BMForum is prone to multiple cross-site scripting vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site. This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.


40. Clever Copy Private Message Unauthorized Access Vulnerability
BugTraq ID: 14397
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14397
Summary:
Clever Copy is affected by an unauthorized access vulnerability.  This issue is
due to a failure in the application to perform proper access validation checks
before granting access to private message functions.

An attacker can exploit this vulnerability to delete or view arbitrary private
messages of an valid user.

41. Novell GroupWise Client Remote Buffer Overflow Vulnerability
BugTraq ID: 14398
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14398
Summary:
Novell GroupWise Client is affected by a remote buffer overflow vulnerability.

Specifically, this vulnerability arises when a user attempts to log in to a
GroupWise post office that contains a malicious 'GWVW02??.INI' file.

This can facilitate unauthorized access in the context of the user.

This issue affects all versions of Novell GroupWise 6.5 client dated prior to
July 15, 2005.

42. Ethereal Multiple Protocol Dissector Vulnerabilities
BugTraq ID: 14399
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14399
Summary:
Many vulnerabilities in Ethereal have been disclosed by the vendor. The reported
issues are in various protocol dissectors.

These issues include:
- Buffer overflow vulnerabilities
- Format string vulnerabilities
- Null pointer dereference denial of service vulnerabilities
- Infinite loop denial of service vulnerabilities
- Memory exhaustion denial of service vulnerabilities
- Unspecified denial of service vulnerabilities

These issues could allow remote attackers to execute arbitrary machine code in
the context of the vulnerable application. Attackers could also crash the
affected application.

Various vulnerabilities affect differing versions of Ethereal, from 0.8.5,
through to 0.10.11.

43. MDaemon Content Filter Directory Traversal Vulnerability
BugTraq ID: 14400
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14400
Summary:
MDaemon server is prone to a directory traversal vulnerability due to improper
sanitization of user input.

Failure to sanitize the filename and path may result in compromise of the file
system outside of the application's quarantine directory.


44. Opera Web Browser Content-Disposition Header Download Dialog File Extension
Spoofing Vulnerability
BugTraq ID: 14402
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14402
Summary:
Opera Web Browser is prone to a vulnerability that can allow remote attackers to
spoof file extensions through the download dialog.

An attacker may exploit this issue by crafting a malformed HTTP
'Content-Disposition' header that spoofs file extensions to trick vulnerable
users into opening and executing a malicious file.

Opera Web Browser versions prior to 8.02 are affected by this issue.

45. PHPList Admin Page SQL Injection Vulnerability
BugTraq ID: 14403
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14403
Summary:
PHPList is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied data before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

46. Website Baker Browse.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 14404
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14404
Summary:
Website Baker is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

47. Gforge Multiple Cross Site Scripting Vulnerabilities
BugTraq ID: 14405
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14405
Summary:
Gforge is prone to multiple cross-site scripting vulnerabilities. These issues
are due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  These may facilitate the theft of cookie-based authentication credentials
as well as other attacks.


48. Website Baker Arbitrary File Upload Vulnerability
BugTraq ID: 14406
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14406
Summary:
Website Baker is prone to a remote arbitrary file upload vulnerability.  The
issue presents itself due to a lack of sanitization performed on media files
that are uploaded.

This issue can ultimately facilitate unauthorized access in the context of the
Web server.

It should be noted the upload feature is normally accessible to administrators
only, but can be activated for all users.

49. Linksys WRT54G Wireless Router Default SSL Certificate and Private Key
Vulnerability
BugTraq ID: 14407
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14407
Summary:
Linksys WRT54G wireless routers contain a default SSL certificate and private
key.

This constant certificate/key pair is always used to access the device.

This can allow an attacker to obtain the certificate/key pair and carry out
various attacks.

A complete compromise of the device is possible.

50. @Mail Multiple Cross Site Scripting Vulnerabilities
BugTraq ID: 14408
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14408
Summary:
@Mail is prone to multiple cross-site scripting vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage these issues to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  These
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.


51. Thomson Web Skill Vantage Manager SQL Injection Vulnerability
BugTraq ID: 14409
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14409
Summary:
Thomson Web Skill Vantage Manager is prone to an SQL injection vulnerability. 
This issue is due to a failure in the application to properly sanitize
user-supplied input before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.  Reports indicate
successful exploitation of this vulnerability will grant the attacker full
administrative privileges within the affected application.

52. Opera Web Browser Image Dragging Cross-Domain Scripting and File Retrieval
Vulnerability
BugTraq ID: 14410
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14410
Summary:
Opera Web Browser is prone to a vulnerability that may allow an attacker to
carry out cross-domain scripting attacks and retrieve files from the local
computer.

Opera Web Browser versions prior to 8.02 are affected by this issue.

53. Cisco IOS IPv6 Processing Arbitrary Code Execution Vulnerability
BugTraq ID: 14414
Remote: Yes
Date Published: 2005-07-27
Relevant URL: http://www.securityfocus.com/bid/14414
Summary:
A remote arbitrary code execution vulnerability affects the IPv6 processing
functionality of Cisco IOS.

A successful attack may allow a remote attacker to execute arbitrary code and
gain unauthorized access to the device.  An attacker can also leverage this
issue to cause an affected device to reload, denying service to legitimate
users.

This issue may be related to BID 12368 (Cisco IOS IPv6 Processing Remote Denial
Of Service Vulnerability).

Cisco has stated that exploitation of this vulnerability in Cisco IOS XR may
cause the IPv6 neighbor discovery process to restart.  If exploited repeatedly,
this could result in a prolonged denial of service affecting IPv6 traffic
travelling through the device.

54. Easypx41 Multiple Cross Site Scripting Vulnerabilities
BugTraq ID: 14416
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14416
Summary:
Easypx41 is prone to cross-site scripting vulnerabilities.

An attacker may leverage these issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  These
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.


55. LibTiff Tiff Image Header Divide By Zero Denial of Service Vulnerability
BugTraq ID: 14417
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14417
Summary:
LibTIFF is affected by a vulnerability that may cause a denial of service in
applications utilizing the library.  This issue is due to a failure in the
library to sufficiently validate specific header values.

An attacker can exploit this vulnerability to cause a denial of service, or loss
of data in applications utilizing the affected library.

This issue is known to affect the CUPS printing system and the Evolution email
client; other applications using the LibTIFF library may also be affected.

This issue may be related to BID 12874 - ImageMagick TIFF Image File Unspecified
Denial Of Service Vulnerability.

56. HP NonStop Server DCE Core Services Remote Denial of Service Vulnerability
BugTraq ID: 14418
Remote: Yes
Date Published: 2005-07-28
Relevant URL: http://www.securityfocus.com/bid/14418
Summary:
HP NonStop Server running DCE Core Services is affected by a remote denial of
service vulnerability.

A successful attack may cause DCED to terminate requiring services that depend
on DCED to be restarted.

HP NonStop Servers running T8403 DCE Core Services revision ABH or prior on
G06.14 through G06.26 are vulnerable.


57. Novell eDirectory NMAS Authentication Bypass Vulnerability
BugTraq ID: 14419
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14419
Summary:
Novell eDirectory is prone to an issue that could result in unauthorized access
to a user's account.

An unauthorized attacker can change a user's password because the application
fails to verify responses to challenge questions.

eDirectory NMAS versions prior to 2.3.8 are affected.

58. Gopher Insecure Temporary File Creation Vulnerability
BugTraq ID: 14420
Remote: No
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14420
Summary:
Gopher is prone to an unspecified insecure temporary file creation
vulnerability.  This issue is likely due to a design error that causes the
application to fail to verify the existence of a file before writing to it.

The details available regarding this issue are not sufficient to provide an in
depth technical description. This BID will be updated when more information
becomes available.

An attacker may leverage this issue to overwrite arbitrary files with the
privileges of an unsuspecting user that activates the vulnerable application.

59. Easypx41 Multiple Variable Injection Vulnerabilities
BugTraq ID: 14421
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14421
Summary:
Easypx41 is prone to multiple variable injection vulnerabilities.

An attacker can manipulate multiple script input variables and bypass access
controls to retrieve sensitive and privileged information.  Information obtained
may aid in further attacks against the vulnerable application or the underlying
system.


60. Ung Arbitrary Email Header Injection Vulnerability
BugTraq ID: 14422
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14422
Summary:
UNG is prone to a vulnerability regarding the injection of arbitrary email
headers, and subsequently allows uncontrolled delivery of Web based email
submissions.

The application would essentially become a mail relay, allowing malicious users
to deliver unwanted mail to targeted email addresses.


61. VBZooM Forum Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14423
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14423
Summary:
VBZooM Forum is prone to multiple cross-site scripting vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.

62. Simplicity oF Upload Download.PHP Remote File Include Vulnerability
BugTraq ID: 14424
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14424
Summary:
Simplicity oF Upload is susceptible to a remote file include vulnerability. This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may exploit this issue to execute arbitrary PHP code on an affected
computer with the privileges of the Web server process. This may facilitate
unauthorized access.


63. Kayako LiveResponse Multiple Input Validation Vulnerabilities
BugTraq ID: 14425
Remote: Yes
Date Published: 2005-07-30
Relevant URL: http://www.securityfocus.com/bid/14425
Summary:
Kayako LiveResponse is prone to multiple cross-site scripting, SQL injection,
and HTML injection vulnerabilties.  These issues are all related to input
validation errors.

The cross-site scripting and HTML injection vulnerabilities may allow for theft
of cookie-based authentication credentials or other attacks.  The SQL injection
vulnerabilities may permit a remote attacker to compromise the software or
launch attacks other attacks against the database.

64. PluggedOut CMS Multiple Input Validation Vulnerabilities
BugTraq ID: 14426
Remote: Yes
Date Published: 2005-07-30
Relevant URL: http://www.securityfocus.com/bid/14426
Summary:
PluggedOut CMS is prone to multiple cross-site scripting and SQL injection
vulnerabilities.

Exploitation could allow for theft of cookie-based authentication credentials or
unauthorized access to database data.  Other attacks are also possible.


65. PC-Experience/Toppe Unauthorized User Access Vulnerability
BugTraq ID: 14427
Remote: Yes
Date Published: 2005-07-30
Relevant URL: http://www.securityfocus.com/bid/14427
Summary:
PC-Experience and Toppe may let remote attackers gain unauthorized access to
arbitrary user accounts.  This is due to an access validation error related to
cookie authentication.

66. PC-Experience/Toppe PM.PHP MSG Parameter Cross-Site Scripting Vulnerability
BugTraq ID: 14428
Remote: Yes
Date Published: 2005-07-30
Relevant URL: http://www.securityfocus.com/bid/14428
Summary:
PC-Experience and Toppe are prone to cross-site scripting attacks.  This may let
a remote attacker gain access to cookie-based authentications of other
PC-Experience/Toppe users.


67. Ragnarok Online Control Panel Authentication Bypass Vulnerability
BugTraq ID: 14429
Remote: Yes
Date Published: 2005-07-30
Relevant URL: http://www.securityfocus.com/bid/14429
Summary:
Ragnarok Online Control Panel (ROCP) is prone to a vulnerability that may let
remote attackers bypass user authentication.  This issue is related to how PHP
variables are handled, letting an attacker influence a variable that is used to
check user authentication.

Exploitation could yield administrative access to the ROCP site.

This issue may be exclusive to sites hosting ROCP with Apache Web server.  This
has not been confirmed.

68. Kismet Multiple Unspecified Remote Vulnerabilities
BugTraq ID: 14430
Remote: Yes
Date Published: 2005-07-29
Relevant URL: http://www.securityfocus.com/bid/14430
Summary:
Kismet is prone to three unspecified remote vulnerabilities.  These issues could
be exploited to completely compromise a computer running Kismet to sniff
wireless network traffic.

There is no further information available at this time.

69. Metasploit Framework Unspecified Remote Vulnerability
BugTraq ID: 14431
Remote: Yes
Date Published: 2005-07-30
Relevant URL: http://www.securityfocus.com/bid/14431
Summary:
Metasploit Framework is prone to an unspecified vulnerability. This issue allows
remote attackers to compromise the computer of users using the affected
application.

This vulnerability is likely exploited by returning malicious data to the
application in unknown network connections, causing arbitrary code to be
executed in the context of the scanning application.

UPDATE: This BID has been retired as it been determined that the issue is not a
vulnerability.  Additional information has been provided that states the issue
is a due to insufficient filtering of potentially malicious terminal escape
sequences when logging external input.  These escape sequences are not
interpreted at any point by the application, and only pose a threat if rendered
with an external viewer within a terminal emulator program that will interpret
them.  In that instance, this 
presents a security vulnerability in the terminal emulator program.  As
Metasploit does not interpret the malicious input itself, it is not within the
scope of the application to filter this type of input.  This is not a
vulnerability in Metasploit since it does not impact security properties of the
application itself.


III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Exploit writers team up to target Cisco routers
By: Robert Lemos
Security researchers and hackers, angered by Cisco attempts to quash a recent
flaw finder's presentation, aim to reproduce and extend attacks on the
networking giant's Internet products.
http://www.securityfocus.com/news/11263

2. Reading, rooting, 'rithmetic: Preschoolers learn programming
By: Robert Lemos
One educator argues that kids should be taught computer programming and hacking
skills from preschool to reinforce creativity and technology learning.
http://www.securityfocus.com/news/11262

3. Settlement reached in Cisco flaw dispute
By: Robert Lemos
A researcher who showed off a way to remotely compromise Cisco routers has to
turn over all materials and agreed not to further disseminate information on the
flaws or the technique he used to run code on the popular network hardware.
http://www.securityfocus.com/news/11260

4. Cisco, ISS file suit against rogue researcher
By: Robert Lemos
UPDATE: The two companies file a restraining against the management of the Black
Hat Conference and a security expert who told conference attendees that
attackers can broadly compromise Cisco routers.
http://www.securityfocus.com/news/11259

5. Infrared exploits open the door to hotel hacking
By: John Leyden
Insecure hotel infra-red systems create a means for hackers to read other
guest's emails, watch porno films for free and put false charges onto other
guest's accounts.
http://www.securityfocus.com/news/11265

6. Linux Bluetooth hackers hijack car audio
By: John Leyden
Linux hackers have demonstrated a way to inject or record audio signals from
passing cars running insecure Bluetooth hands-free units.
http://www.securityfocus.com/news/11266

7. Cisco details Black Hat vuln fix
By: John Leyden
Cisco last week urged users of its networking kit to upgrade their software
following the discovery of a vulnerability that might be exploited to launch
denial of service attacks.
http://www.securityfocus.com/news/11264

8. Sophos bug highlights wider anti-virus flaws
By: John Leyden
Users of Sophos’s anti-virus products were warned this week of a
potentially serious security vulnerability.
http://www.securityfocus.com/news/11261

IV.  SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Quality Assurance, Alexandria
http://www.securityfocus.com/archive/77/406949

2. [SJ-JOB] Information Assurance Engineer, London/UK wide
http://www.securityfocus.com/archive/77/406945

3. [SJ-JOB] Sales Representative, London /UK Wide
http://www.securityfocus.com/archive/77/406947

4. [SJ-JOB] Security Consultant, Oakland
http://www.securityfocus.com/archive/77/406950

5. [SJ-JOB] Security Consultant, London /UK Wide
http://www.securityfocus.com/archive/77/406946

6. [SJ-JOB] Security Consultant, London /UK Wide
http://www.securityfocus.com/archive/77/406846

7. [SJ-JOB] Security Consultant, London
http://www.securityfocus.com/archive/77/406893

8. [SJ-JOB] Security Auditor, London /UK Wide
http://www.securityfocus.com/archive/77/406862

9. [SJ-JOB] Certification & Accreditation Engineer, Washington Metro
http://www.securityfocus.com/archive/77/406879

10. [SJ-JOB] Jr. Security Analyst, Washington Metro
http://www.securityfocus.com/archive/77/406888

11. [SJ-JOB] Incident Handler, Dubai
http://www.securityfocus.com/archive/77/406675

12. [SJ-JOB] Forensics Engineer, Reading
http://www.securityfocus.com/archive/77/406671

13. [SJ-JOB] Security Architect, Herndon
http://www.securityfocus.com/archive/77/406673

14. [SJ-JOB] Developer, North Sydney
http://www.securityfocus.com/archive/77/406674

15. [SJ-JOB] Security Engineer, Dubai
http://www.securityfocus.com/archive/77/406672

16. [SJ-JOB] VP, Information Security, Tokyo
http://www.securityfocus.com/archive/77/406662

17. [SJ-JOB] Security Engineer, Chicago
http://www.securityfocus.com/archive/77/406661

18. [SJ-JOB] Security Product Marketing Manager, Redwood City
http://www.securityfocus.com/archive/77/406659

19. [SJ-JOB] Security Engineer, Detroit
http://www.securityfocus.com/archive/77/406658

20. [SJ-JOB] Security Engineer, Seattle
http://www.securityfocus.com/archive/77/406657

21. [SJ-JOB] Manager, Information Security, Chicago
http://www.securityfocus.com/archive/77/406663

22. [SJ-JOB] Security Engineer, Columbia
http://www.securityfocus.com/archive/77/406653

23. [SJ-JOB] Security Engineer, alexandria
http://www.securityfocus.com/archive/77/406654

24. [SJ-JOB] Developer, Boulder
http://www.securityfocus.com/archive/77/406669

25. [SJ-JOB] Security Engineer, San Francisco
http://www.securityfocus.com/archive/77/406670

V.   INCIDENTS LIST SUMMARY
---------------------------
VI.  VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. font book crash os x
http://www.securityfocus.com/archive/82/406961

2. Advice On FireFox Bug
http://www.securityfocus.com/archive/82/406966

VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #249
http://www.securityfocus.com/archive/88/406595

VIII. SUN FOCUS LIST SUMMARY
----------------------------
1. Accessing Solaris 10 Local Zones from the Global Zone, security risk
http://www.securityfocus.com/archive/92/406952

IX. LINUX FOCUS LIST SUMMARY
----------------------------
[ terug ]