Home
Systeembeheer
Consultancy
Connectivity
Training
Development

Klanten

Inloggen

Resources

Sans artikelen
Security artikelen

Software

Linux
Windows









[ terug ]
SecurityFocus Newsletter #315
----------------------------------------

This Issue is Sponsored By: CrossTec

Protect your corporate desktops with endpoint security! NetOp Desktop Firewall &
Policy Server lets you centrally manage which applications can run on your
enterprise PCs.  NetOp's tiny driver-centric design prevents unauthorized
programs and processes, including viruses, keyloggers, spyware and more from
executing -- without slowing down your systems. Try it FREE.

http://www.securityfocus.com/sponsor/Crosstec_sf-news_050913

------------------------------------------------------------------
I.    FRONT AND CENTER
       1. Embedded market ripe for picking
       2. Security lessons from Katrina
II.   BUGTRAQ SUMMARY
       1. KDE kcheckpass Local Privilege Escalation Vulnerability
       2. HP OpenView Event Correlation Services Unspecified Remote Privilege
Escalation Vulnerability
       3. OpenTTD Multiple Unspecified Format String Vulnerabilities
       4. MyBloggie login.php SQL Injection Vulnerability
       5. Rediff Bol Instant Messenger ActiveX Control Information Disclosure
Vulnerability
       6. Urban Multiple Unspecified Stack Buffer Overflow Vulnerabilities
       7. MAXdev MD-Pro Cross-Site Scripting Vulnerability
       8. Microsoft Windows Keyboard Event Privilege Escalation Weakness
       9. SqWebMail HTML Email Script Tag Script Injection Vulnerability
       10. Gentoo Net-SNMP Local Privilege Escalation Vulnerability
       11. Land Down Under Events.PHP HTML Injection Vulnerability
       12. Man2web Multiple Scripts Command Execution Vulnerability
       13. Unclassified NewsBoard Description Field HTML Injection Vulnerability
       14. Feedback Form Perl Script CHFeedBack.PL Unauthorized Mail Relay
Vulnerability
       15. MAXdev MD-Pro Arbitrary Remote File Upload Vulnerability
       16. MAXdev MD-Pro Multiple Cross-Site Scripting Vulnerabilities
       17. GuppY PrintFAQ.PHP Cross-Site Scripting Vulnerability
       18. GuppY Error.PHP HTML Injection Vulnerability
       19. MyBulletinBoard Forumdisplay.PHP Cross-Site Scripting Vulnerability
       20. Smb4k Insecure Temporary File Creation Vulnerability
       21. Symantec Brightmail AntiSpam Deeply Nested Zip File Denial Of Service
Vulnerability
       22. Symantec Brightmail AntiSpam Winmail.DAT Decomposer Denial Of Service
Vulnerability
       23. ALTools ALZip ACE Archive File Name Buffer Overflow Vulnerability
       24. CSystems WebArchiveX ActiveX Component Arbitrary File Read and Write
Vulnerabilities
       25. MyBulletinBoard Multiple SQL Injection Vulnerabilities
       26. PHPCommunityCalendar Multiple SQL Injection Vulnerabilities
       27. Microsoft IIS WebDAV HTTP Request Source Code Disclosure
Vulnerability
       28. PBLang Bulletin Board System SetCookie.PHP Directory Traversal
Vulnerability
       29. PBLang Bulletin Board System HTML Injection Vulnerability
       30. PHPCommunityCalendar Multiple Remote Cross-Site Scripting
Vulnerabilities
       31. SecureOL VE2 Physical Memory Secured Environment Access Vulnerability
       32. Distributed Checksum ClearingHouse DCCIFD Denial Of Service
Vulnerability
       33. Cisco IOS Firewall Authentication Proxy Buffer Overflow Vulnerability
       34. Open WebMail OpenWebmail-main.PL Cross-Site Scripting Vulnerability
       35. Eset Software NOD32 Antivirus ARJ Archive Handling Remote Buffer
Overflow Vulnerability
       36. Class-1 Forum SQL Injection Vulnerability
       37. FreeRADIUS Multiple Remote Vulnerabilities
       38. Stylemotion WEB//NEWS Multiple SQL Injection Vulnerabilities
       39. AMember Remote File Include Vulnerability
       40. Mimicboard2 Multiple HTML Injection Vulnerabilities
       41. Mimicboard2 Mimic2.Dat Unauthorized Access Vulnerability.
       42. Microsoft September Advance Notification Unspecified Security
Vulnerabilities
       43. Check Point SecurePlatform NGX Firewall Rules Bypass Vulnerability
       44. MyBulletinBoard Forumdisplay.PHP Fid Parameter Cross-Site Scripting
Vulnerability
       45. Cisco CSS 11500 Series SSL Authentication Bypass Vulnerability
       46. Mozilla/Netscape/Firefox Browsers Domain Name Remote Buffer Overflow
Vulnerability
       47. Linux Kernel Sendmsg() Local Buffer Overflow Vulnerability
       48. MyBulletinBoard RateThread.PHP SQL Injection Vulnerability
       49. Linux Kernel Raw_sendmsg() Kernel Memory Access Vulnerability
       50. Sun Java System Web Proxy Server Unspecified Remote Denial Of Service
Vulnerability
       51. Sawmill Unspecified Cross-Site Scripting Vulnerability
       52. Linux Kernel SCSI ProcFS Denial Of Service Vulnerability
       53. Linux Kernel Netfilter Ipt_recent Remote Denial of Service
Vulnerability
       54. Ipswitch Whatsup Small Business 2004 File Disclosure Vulnerability
       55. Linux Kernel EXT2/EXT3 File System Access Control Bypass
Vulnerability
       56. GNU Mailutils Imap4D Search Command Remote Format String
Vulnerability
       57. KillProcess Local Privilege Escalation Vulnerability
       58. Zebedee Remote Denial Of Service Vulnerability
       59. Ipswitch Whatsup Gold Map.ASP Cross-Site Scripting Vulnerability
       60. IBM OS/400 Malformed SNMP Requests Remote Denial Of Service
Vulnerability
       61. Ipswitch Whatsup Gold Cross-Site Scripting Vulnerability
       62. IBM OS/400 Multiple OSP-CERT Vulnerabilities
III.  SECURITYFOCUS NEWS
       1. Big debate over small packets
       2. Katrina's destruction attracts online fraudsters
       3. Hidden-code flaw in Windows renews worries over stealthly malware
       4. Zotob suspects arrested in Turkey and Morocco
       5. Bot herder websites in internet take-down
       6. Users play fast and loose with corporate PCs
       7. Mozilla disables IDN to guard against Firefox flaw
       8. MS pulls upcoming Windows security patch
IV.   SECURITY JOBS LIST SUMMARY
       1. [SJ-JOB] Security Product Marketing Manager, Any Location
       2. [SJ-JOB] Security Product Manager, Islandia
       3. [SJ-JOB] Security Product Marketing Manager, Any Location
       4. [SJ-JOB] Information Assurance Engineer, Waltham
       5. [SJ-JOB] Security Product Marketing Manager, Any Location
       6. [SJ-JOB] Security Product Marketing Manager, South San Francisco
       7. [SJ-JOB] Security Product Manager, Framingham
       8. [SJ-JOB] Security Product Manager, Waltham
       9. [SJ-JOB] Security Product Marketing Manager, Atlanta
       10. [SJ-JOB] Security Engineer, Vienna
       11. [SJ-JOB] Management, Columbia
       12. [SJ-JOB] Developer, Columbia
       13. [SJ-JOB] Developer, Columbia
       14. [SJ-JOB] Security Consultant, Columbia
       15. [SJ-JOB] Sales Representative, Geneva
       16. [SJ-JOB] Sr. Security Engineer, Washington, DC
       17. [SJ-JOB] Sales Representative, Dubai
       18. [SJ-JOB] Instructor, Austin
       19. [SJ-JOB] Certification & Accreditation Engineer, Washington
       20. [SJ-JOB] Quality Assurance, Islandia
       21. [SJ-JOB] Sr. Security Engineer, Herndon
       22. [SJ-JOB] Sr. Security Engineer, Framingham
       23. [SJ-JOB] Sr. Security Engineer, Islandia
       24. [SJ-JOB] Sr. Security Engineer, Herndon
       25. [SJ-JOB] Security Product Marketing Manager, Lexington
       26. [SJ-JOB] Sales Engineer, Bay Area
       27. [SJ-JOB] Security Architect, Schaumburg
       28. [SJ-JOB] Technical Support Engineer, Seattle
       29. [SJ-JOB] Sr. Security Engineer, Waltham
       30. [SJ-JOB] Database Security Engineer, Seattle
       31. [SJ-JOB] Privacy Officer, Schaumburg
       32. [SJ-JOB] Product Strategist, North/North East England
       33. [SJ-JOB] Information Assurance Analyst, Washington, DC
       34. [SJ-JOB] Chief Scientist, San Jose
       35. [SJ-JOB] Security Engineer, San Jose
       36. [SJ-JOB] Sr. Product Manager, Belcamp
       37. [SJ-JOB] Security Product Marketing Manager, Islandia
       38. [SJ-JOB] Account Manager, Islandia
       39. [SJ-JOB] Security Director, Framingham
       40. [SJ-JOB] Security Product Marketing Manager, Islandia
       41. [SJ-JOB] Developer, Tampa
       42. [SJ-JOB] Sales Engineer, Belcamp
       43. [SJ-JOB] Security Engineer, Belcamp
       44. [SJ-JOB] Security Engineer, Bala Cynwyd
       45. [SJ-JOB] Security Auditor, Tokyo
       46. [SJ-JOB] Sales Engineer, New York
       47. [SJ-JOB] Information Assurance Analyst, Richmond
       48. [SJ-JOB] Security Consultant, London or Cambridge
       49. [SJ-JOB] Sr. Product Manager, San Diego
       50. [SJ-JOB] Security Auditor, Alexandria
       51. [SJ-JOB] Sr. Security Engineer, Islandia
       52. [SJ-JOB] Sr. Security Engineer, Waltham
       53. [SJ-JOB] Sr. Security Engineer, Islandia
       54. [SJ-JOB] Sr. Security Engineer, Waltham
       55. [SJ-JOB] Sr. Security Engineer, Islandia
       56. [SJ-JOB] Sales Representative, Washington
       57. [SJ-JOB] Security Consultant, Riyadh
       58. [SJ-JOB] CISO, Los Angeles
       59. [SJ-JOB] Sr. Security Engineer, Any US location
       60. [SJ-JOB] Sr. Security Engineer, Ft Lauderdale
       61. [SJ-JOB] Security Product Manager, Plano
       62. [SJ-JOB] Security Consultant, Tampa
V.    INCIDENTS LIST SUMMARY
VI.   VULN-DEV RESEARCH LIST SUMMARY
       1. Snort <= 2.4.0 SACK TCP Option Error Handling
       2. "tinyurl" url masking
       3. MS05-039
       4. Windows Multi-Languages OPcodes DB
VII.  MICROSOFT FOCUS LIST SUMMARY
       1. runas vs network connections etc etc....
       2. SecurityFocus Microsoft Newsletter #255
VIII. SUN FOCUS LIST SUMMARY
IX.   LINUX FOCUS LIST SUMMARY
       1. scanning for windows spywear with linux
X.    UNSUBSCRIBE INSTRUCTIONS
XI.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Embedded market ripe for picking
By Daniel Hanson
Perhaps an embedded version of windows in every device isn't such a bad thing
after all.
http://www.securityfocus.com/columnists/353

2. Security lessons from Katrina
By Mark Rasch
>From this disaster, there are a few lessons IT staff, and IT security staff, as
well as senior management should learn.
http://www.securityfocus.com/columnists/354


II.  BUGTRAQ SUMMARY
--------------------
1. KDE kcheckpass Local Privilege Escalation Vulnerability
BugTraq ID: 14736
Remote: No
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14736
Summary:
KDE kcheckpass is prone to a local privilege escalation vulnerability. 
Successful exploitation could allow an attacker to gain superuser privileges.

All KDE versions from 3.2.0 to 3.4.2 inclusive are vulnerable to this issue.


2. HP OpenView Event Correlation Services Unspecified Remote Privilege
Escalation Vulnerability
BugTraq ID: 14737
Remote: Yes
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14737
Summary:
HP OpenView Event Correlation Services is prone to an unspecified remote
privilege escalation vulnerability.

Specific details about this issue are not currently available.  This record will
be updated when more information becomes available.


3. OpenTTD Multiple Unspecified Format String Vulnerabilities
BugTraq ID: 14738
Remote: Yes
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14738
Summary:
OpenTTD is prone to multiple format string vulnerabilities.  Successful
exploitation could cause the application to fail or allow remote arbitrary code
execution.


4. MyBloggie login.php SQL Injection Vulnerability
BugTraq ID: 14739
Remote: Yes
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14739
Summary:
myBloggie is prone to a SQL injection vulnerability in the 'login.php' script.

This vulnerability could permit remote attackers to pass malicious input to
database queries, resulting in modification of query logic or other attacks.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.


5. Rediff Bol Instant Messenger ActiveX Control Information Disclosure
Vulnerability
BugTraq ID: 14740
Remote: Yes
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14740
Summary:
Rediff Bol Instant Messenger is prone to an information disclosure
vulnerability.  A malicious ActiveX control could allow an attacker to obtain
the contents of a vulnerable user's Windows Address Book.


6. Urban Multiple Unspecified Stack Buffer Overflow Vulnerabilities
BugTraq ID: 14741
Remote: No
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14741
Summary:
Urban is prone to multiple unspecified stack-based buffer overflows.  Successful
exploitation could allow arbitrary code execution.


7. MAXdev MD-Pro Cross-Site Scripting Vulnerability
BugTraq ID: 14742
Remote: Yes
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14742
Summary:
Cross-site scripting vulnerabilities reportedly affect MD-Pro  The
vulnerabilities exist in the "wl-search.php" and "dl-search.php" scripts and are
due to input validation errors.  Successful exploitation may allow for attacks
against other users of the application or others hosted on the same domain. 
Session hijacking, content spoofing and other attacks may be possible.

8. Microsoft Windows Keyboard Event Privilege Escalation Weakness
BugTraq ID: 14743
Remote: No
Date Published: 2005-09-05
Relevant URL: http://www.securityfocus.com/bid/14743
Summary:
Microsoft Windows is prone to a privilege escalation weakness.  This issue is
due to a design error when desktop applications handle keyboard events sent
through the keybd_event() function.  The specific issue is that programs may
send keyboard events to higher privileged desktop applications.

This poses a local security risk as malicious keyboard events may be sent to a
desktop application such as 'explorer.exe' that is running as a higher
privileged user.  These keyboard events will be interpreted in the context of
the target user.  This issue could likely be abused after exploitation of a
latent remote code execution vulnerability in a service to elevate privileges. 
In this scenario, a user with higher privileges than the service must be logged
into the desktop.

9. SqWebMail HTML Email Script Tag Script Injection Vulnerability
BugTraq ID: 14744
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14744
Summary:
SqWebMail is affected by a vulnerability that may allow remote attackers to
inject and execute arbitrary script code in a user's browser.

This may allow for various attacks including session hijacking due to the theft
of user credentials.

SqWebMail 5.0.4 is reportedly vulnerable to this issue. It is possible that
other versions are affected as well.

10. Gentoo Net-SNMP Local Privilege Escalation Vulnerability
BugTraq ID: 14745
Remote: No
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14745
Summary:
Gentoo Net-SNMP is affected by a local privilege escalation vulnerability.

A local attacker with portage group privileges may create a shared object that
would be loaded by Net-SNMP Perl modules, potentially resulting in arbitrary
code execution in the context of the user running the Perl script.

Gentoo Net-SNMP versions prior to 5.2.1.2-r1 are affected by this vulnerability.
 This issue does not affect the Net-SNMP suite.

11. Land Down Under Events.PHP HTML Injection Vulnerability
BugTraq ID: 14746
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14746
Summary:
Land Down Under is prone to an HTML injection vulnerability. 
This issue is due to a failure in the application to properly sanitize
user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

12. Man2web Multiple Scripts Command Execution Vulnerability
BugTraq ID: 14747
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14747
Summary:
man2web is affected by a command execution vulnerability affecting multiple
scripts.

A remote attacker can supply arbitrary commands to the application through HTTP
GET requests that may be executed with the privileges of an affected Web server.

This can facilitate a remote compromise.


13. Unclassified NewsBoard Description Field HTML Injection Vulnerability
BugTraq ID: 14748
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14748
Summary:
Unclassified NewsBoard is prone to an HTML injection vulnerability. This is due
to a lack of proper sanitization of user-supplied input before using it in
dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.


14. Feedback Form Perl Script CHFeedBack.PL Unauthorized Mail Relay
Vulnerability
BugTraq ID: 14749
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14749
Summary:
chfeedback.pl is prone to a vulnerability that allows the application to be
abused as a mail relay.

An attacker can exploit this issue to inject arbitrary SMTP headers by using CR
and LF sequences.  

If successful, it becomes possible to abuse the application as a mail relay.
Email may be sent to arbitrary computers. This could be exploited by spammers or
other malicious parties.

15. MAXdev MD-Pro Arbitrary Remote File Upload Vulnerability
BugTraq ID: 14750
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14750
Summary:
MAXdev MD-Pro is prone to an arbitrary remote file upload vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

This issue is due to a design error in the application that uses a blacklist
technique, saying what file extensions can not be uploaded, versus a whitelist
design that would only permit certain file extensions.  An attacker can exploit
this vulnerability to upload arbitrary files including malicious scripts and
possibly execute the script on the affected server.

This can ultimately facilitate unauthorized access in the context of the Web
server.

16. MAXdev MD-Pro Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14751
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14751
Summary:
MAXdev MD-Pro is prone to multiple cross-site scripting vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.

17. GuppY PrintFAQ.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 14752
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14752
Summary:
GuppY is prone to a cross-site scripting vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

18. GuppY Error.PHP HTML Injection Vulnerability
BugTraq ID: 14753
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14753
Summary:
GuppY is prone to an HTML injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

19. MyBulletinBoard Forumdisplay.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 14754
Remote: Yes
Date Published: 2005-09-06
Relevant URL: http://www.securityfocus.com/bid/14754
Summary:
MyBulletinBoard is prone to a cross-site scripting vulnerability. This is due to
a lack of proper sanitization of user-supplied input to the application.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting administrative user in the context of the
affected site.  This may facilitate the theft of cookie-based authentication
credentials as well as other attacks.


20. Smb4k Insecure Temporary File Creation Vulnerability
BugTraq ID: 14756
Remote: No
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14756
Summary:
Smb4k is prone to an insecure temporary file creation vulnerability.  Successful
exploitation of this issue could allow a local attacker to gain access to
sensitive information.


21. Symantec Brightmail AntiSpam Deeply Nested Zip File Denial Of Service
Vulnerability
BugTraq ID: 14757
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14757
Summary:
Symantec Brightmail AntiSpam is prone to a denial of service vulnerability. 
This issue occurs when the application antivirus scanner/cleaner processes
deeply nested zip files.

22. Symantec Brightmail AntiSpam Winmail.DAT Decomposer Denial Of Service
Vulnerability
BugTraq ID: 14758
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14758
Summary:
Symantec Brightmail AntiSpam is prone to a denial of service vulnerability. 
This issue may occur when the application processes a specially crafted message.

Exploitation could crash the decomposer component of the application.

23. ALTools ALZip ACE Archive File Name Buffer Overflow Vulnerability
BugTraq ID: 14759
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14759
Summary:
ALTools ALZip is prone to a buffer overflow when handling ACE archives that
contain files with overly long names.  

This may be exploited to execute arbitrary code in the context of the user who
is running the application.  The vulnerability is considered remotely
exploitable in nature since malicious ACE archives will likely originate from an
external, untrusted source. 

24. CSystems WebArchiveX ActiveX Component Arbitrary File Read and Write
Vulnerabilities
BugTraq ID: 14760
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14760
Summary:
WebArchiveX is affected by two vulnerabilities that can allow remote attackers
to read and write arbitrary files.  These issues arise due to a design error as
the control is marked "Safe for Scripting" and provides various remotely
accessible methods.

WebArchiveX.dll 5.5.0.76 installs prior to September 6th, 2005 are affected by
these issues.

25. MyBulletinBoard Multiple SQL Injection Vulnerabilities
BugTraq ID: 14762
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14762
Summary:
MyBulletinBoard is prone to multiple SQL injection vulnerabilities. These issues
are due to a lack of proper sanitization of user-supplied input before using it
in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.


26. PHPCommunityCalendar Multiple SQL Injection Vulnerabilities
BugTraq ID: 14763
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14763
Summary:
phpCommunityCalendar is prone to multiple SQL injection vulnerabilities. These
issues are due to a lack of proper sanitization of user-supplied input before
being used in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.


27. Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
BugTraq ID: 14764
Remote: Yes
Date Published: 2005-09-04
Relevant URL: http://www.securityfocus.com/bid/14764
Summary:
Microsoft IIS is reportedly affected by a remote script source disclosure
vulnerability.

A successful attack causes the Web server to present the requested file as a
plain text file and subsequently disclosing the source. 

It should be noted that this issue only presents itself when the requested files
are stored on a FAT or FAT32 volume and does not arise if the script files are
stored on a NTFS volume.

Microsoft IIS 5.1 is vulnerable to this issue.

28. PBLang Bulletin Board System SetCookie.PHP Directory Traversal Vulnerability
BugTraq ID: 14765
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14765
Summary:
PBLang is affected by a directory traversal vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

Exploitation of this vulnerability could lead to a loss of confidentiality.
Information obtained may aid in further attacks against the underlying system;
other attacks are also possible.

29. PBLang Bulletin Board System HTML Injection Vulnerability
BugTraq ID: 14766
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14766
Summary:
PBLang is prone to an HTML injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

30. PHPCommunityCalendar Multiple Remote Cross-Site Scripting Vulnerabilities
BugTraq ID: 14767
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14767
Summary:
phpCommunityCalendar is prone to multiple remote cross-site scripting
vulnerabilities. These issues are due to a lack of proper sanitization of
user-supplied input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.


31. SecureOL VE2 Physical Memory Secured Environment Access Vulnerability
BugTraq ID: 14768
Remote: No
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14768
Summary:
SecureOL VE2 can allow local attackers to gain unauthorized direct access to
physical memory and the secured environment.

A successful attack can allow the attacker to gain access to the secured
environment created by the application, which can lead to various attacks due to
information disclosure.


32. Distributed Checksum ClearingHouse DCCIFD Denial Of Service Vulnerability
BugTraq ID: 14769
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14769
Summary:
Distributed Checksum ClearingHouse is prone to a remote denial of service
vulnerability.  This issue is due to a failure in the application to handle
exceptional conditions.

A remote attacker can exploit this vulnerability to cause the affected
application to crash, resulting in a denial of service to legitimate users.  As
the software is an anti-spam content filter, this may have other repercussions
to the system.

33. Cisco IOS Firewall Authentication Proxy Buffer Overflow Vulnerability
BugTraq ID: 14770
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14770
Summary:
Cisco IOS Firewall Authentication Proxy is prone to a buffer overflow condition.
 Successful exploitation of this issue could cause a denial of service or
potential execution of arbitrary code.

This issue affects the FTP and Telnet protocols, but not HTTP.

34. Open WebMail OpenWebmail-main.PL Cross-Site Scripting Vulnerability
BugTraq ID: 14771
Remote: Yes
Date Published: 2005-09-07
Relevant URL: http://www.securityfocus.com/bid/14771
Summary:
Open WebMail is prone to a cross-site scripting vulnerability. This issue is due
to a lack of proper sanitization of user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

35. Eset Software NOD32 Antivirus ARJ Archive Handling Remote Buffer Overflow
Vulnerability
BugTraq ID: 14773
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14773
Summary:
NOD32 Antivirus is affected by a remote buffer overflow vulnerability when
handling ARJ archives.

An attacker may exploit this vulnerability to gain unauthorized remote access
with SYSTEM privileges.

NOD32 for Windows version 2.5 running nod32.002 version 1.033 build 1127 is
reportedly affected, however, it is possible that other versions are vulnerable
as well.

36. Class-1 Forum SQL Injection Vulnerability
BugTraq ID: 14774
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14774
Summary:
Class-1 Forum is prone to an SQL injection vulnerability.

This issue allows a remote attacker to pass malicious input to database queries
leading to a file upload vulnerability.

If an attacker is able to upload and execute a malicious script to the server,
this  issue can lead to unauthorized remote access.  Other attacks are possible
as well.

Class-1 Forum 0.24.4 is reportedly vulnerable to this issue.  Other attacks are
possible as well.

37. FreeRADIUS Multiple Remote Vulnerabilities
BugTraq ID: 14775
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14775
Summary:
FreeRADIUS is susceptible to multiple remote vulnerabilities.

The first issues are memory handling vulnerabilities. These issues may allow
remote attackers to crash affected services, or possibly execute arbitrary
machine code in the context of the vulnerable application.

FreeRADIUS is also affected by a possible file descriptor leak. This may be
exploited to gain access to files that an attacker may not normally have access
to.

The LDAP module contains a flaw whereby attacker-specified data may be passed on
to the configured LDAP database without proper input sanitization.

These issues are all reported to affect version 1.0.4 of FreeRADIUS, previous
versions are also likely vulnerable to one or more of these issues.

Update: The vendor has posted a response to these issues, please see "Response
to Suse Audit Report on FreeRADIUS" for further details.

38. Stylemotion WEB//NEWS Multiple SQL Injection Vulnerabilities
BugTraq ID: 14776
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14776
Summary:
WEB//NEWS is prone to multiple SQL injection vulnerabilities.  These issues are
due to a failure in the application to properly sanitize user-supplied input
before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

39. AMember Remote File Include Vulnerability
BugTraq ID: 14777
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14777
Summary:
aMember is prone to a remote file include vulnerability. 

Input passed to various scripts is not sufficiently sanitized. An attacker could
host arbitrary malicious code in a file at an attacker-controlled site and
include the file using a URI parameter.

This issue may be leveraged to execute arbitrary server-side script code on an
affected computer with the privileges of the Web server process. This may
facilitate unauthorized access. 

aMember Pro 2.3.4 is reportedly affected, other versions may also be vulnerable.

40. Mimicboard2 Multiple HTML Injection Vulnerabilities
BugTraq ID: 14778
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14778
Summary:
Mimicboard2 is prone to multiple HTML injection vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied input
before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

41. Mimicboard2 Mimic2.Dat Unauthorized Access Vulnerability.
BugTraq ID: 14779
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14779
Summary:
Mimicboard2 is affected by an unauthorized access vulnerability.  This issue is
due to a failure in the application to perform any user authentication before
granting access to privileged information.

An attacker can exploit this vulnerability to retrieve user information and the
DES encrypted administrator password.

42. Microsoft September Advance Notification Unspecified Security
Vulnerabilities
BugTraq ID: 14780
Remote: Unknown
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14780
Summary:
Microsoft has released advanced notification for one security bulletin that will
be released on September 13, 2005.

This security bulletin affects Microsoft Windows.

Update: Microsoft reports there will no longer be any security updates on
September 13th as part of the September monthly bulletin release cycle.

43. Check Point SecurePlatform NGX Firewall Rules Bypass Vulnerability
BugTraq ID: 14781
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14781
Summary:
Check Point SecurePlatform NGX is a platform of commercial network security
products.

Check Point SecurePlatform NGX is susceptible to a firewall rules bypass
vulnerability. This issue is due to a failure of the software to properly
implement expected firewall rules.

This vulnerability allows attackers to bypass firewall rules, letting them
attack protected services and computers without expected restriction.

This also issue leads to a false sense of security by firewall administrators.

44. MyBulletinBoard Forumdisplay.PHP Fid Parameter Cross-Site Scripting
Vulnerability
BugTraq ID: 14782
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14782
Summary:
MyBulletinBoard is prone to a cross-site scripting vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

45. Cisco CSS 11500 Series SSL Authentication Bypass Vulnerability
BugTraq ID: 14783
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14783
Summary:
Cisco CSS (Content Services Switches) 11500 Series devices are prone to an
authentication bypass vulnerability.  This issue may occur when the device uses
SSL for encryption and client authentication.

Successful exploitation may permit unauthorized access to content.

This issue affects Cisco CSS 11500/11501 devices with the
CSS5-SSL-K9/CSS11501S-K9 modules installed respectively.

46. Mozilla/Netscape/Firefox Browsers Domain Name Remote Buffer Overflow
Vulnerability
BugTraq ID: 14784
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14784
Summary:
Mozilla/Netscape/Firefox are reported prone to a remote buffer overflow
vulnerability when handling a malformed URI.

A successful attack may result in a crash or the execution of arbitrary code.

Firefox 1.0.6 and 1.5 Beta 1 are vulnerable to this issue.  Mozilla 1.7.11 and
Netscape 8.0.3.3 and 7.2 are affected as well. 

47. Linux Kernel Sendmsg() Local Buffer Overflow Vulnerability
BugTraq ID: 14785
Remote: No
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14785
Summary:
Linux kernel is prone to a local buffer overflow vulnerability.

The vulnerability affects 'sendmsg()' when malformed user-supplied data is
copied from userland to kernel memory.

A successful attack can allow a local attacker to trigger an overflow, which may
lead to a denial of service condition due to memory corruption. Arbitrary code
execution resulting in privilege escalation is possible as well.



48. MyBulletinBoard RateThread.PHP SQL Injection Vulnerability
BugTraq ID: 14786
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14786
Summary:
MyBulletinBoard is prone to an SQL injection vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input before
using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

49. Linux Kernel Raw_sendmsg() Kernel Memory Access Vulnerability
BugTraq ID: 14787
Remote: No
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14787
Summary:
Linux Kernel is prone to a kernel memory access vulnerability.

This issue affecting the 'raw_sendmsg()' function can allow a local attacker to
disclose kernel memory or manipulate the hardware state due to unauthorized
access to IO ports.

Linux kernel 2.6.10 is reportedly vulnerable, however, other versions are likely
to be affected as well.


50. Sun Java System Web Proxy Server Unspecified Remote Denial Of Service
Vulnerability
BugTraq ID: 14788
Remote: Yes
Date Published: 2005-09-08
Relevant URL: http://www.securityfocus.com/bid/14788
Summary:
Sun Java System Web Proxy Server is prone to an unspecified remote denial of
service vulnerability. This issue allows remote attackers to cause the affected
service to fail to respond to further requests.

Successful exploitation will permit remote attackers to deny service to
legitimate users.

51. Sawmill Unspecified Cross-Site Scripting Vulnerability
BugTraq ID: 14789
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14789
Summary:
Sawmill is prone to an unspecified cross-site scripting vulnerability.  This
issue is due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.


52. Linux Kernel SCSI ProcFS Denial Of Service Vulnerability
BugTraq ID: 14790
Remote: No
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14790
Summary:
The Linux kernel is prone to a denial of service vulnerability.  The kernel is
affected by a memory leak which eventually can result in a denial of service.

A local attacker can exploit this vulnerability by making repeated reads to the
'/proc/scsi/sg/devices' file and exhaust kernel memory, resulting in a denial of
service.

53. Linux Kernel Netfilter Ipt_recent Remote Denial of Service Vulnerability
BugTraq ID: 14791
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14791
Summary:
Linux Kernel is reported prone to a local denial of service vulnerability.

An attacker can exploit this issue by sending specially crafted packets to a
vulnerable computer employing the 'ipt_recent' module.

A successful attack can cause a denial of service condition.

54. Ipswitch Whatsup Small Business 2004 File Disclosure Vulnerability
BugTraq ID: 14792
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14792
Summary:
Ipswitch Whatsup Small Business 2004 is prone to a file disclosure
vulnerability. This is due to a lack of proper sanitization of user-supplied
input.

A remote attacker may exploit this vulnerability to reveal files that contain
potentially sensitive information.


55. Linux Kernel EXT2/EXT3 File System Access Control Bypass Vulnerability
BugTraq ID: 14793
Remote: No
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14793
Summary:
Linux Kernel is prone to an access control bypass vulnerability when using the
EXT2/EXT3 file systems.

Successful attacks may involve data corruption and modification, information
disclosure, and execution of arbitrary code.


56. GNU Mailutils Imap4D Search Command Remote Format String Vulnerability
BugTraq ID: 14794
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14794
Summary:
imap4d is prone to a remote format string vulnerability.

The issue presents itself when the service handles malicious search commands
from a client.

A successful attack may result in arbitrary code execution. This may facilitate
unauthorized access or privilege escalation in the context of the server. 

This issue has been confirmed in GNU Mailutils 0.6.  It is likely that other
versions are vulnerable as well.

57. KillProcess Local Privilege Escalation Vulnerability
BugTraq ID: 14795
Remote: No
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14795
Summary:
KillProcess is prone to a local buffer overflow vulnerability.

A successful attack allows arbitrary machine code execution with the privileges
of the user running KillProcess.

KillProcess 2.20 and prior versions are vulnerable.

58. Zebedee Remote Denial Of Service Vulnerability
BugTraq ID: 14796
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14796
Summary:
A remote denial of service vulnerability affects Zebedee. This issue is due to a
failure of the application to properly handle exceptional network requests.

Specifically, Zebedee is unable to handle requests for connections that contain
a zero for the requested destination port.

A remote attacker may leverage this issue to crash the affected application,
denying service to legitimate users.

Zebedee version 2.4.1 is reported vulnerable to this issue; other versions may
also be affected.

59. Ipswitch Whatsup Gold Map.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 14797
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14797
Summary:
Ipswitch Whatsup Gold is prone to a cross-site scripting vulnerability. This
issue is due to a lack of proper sanitization of user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.


60. IBM OS/400 Malformed SNMP Requests Remote Denial Of Service Vulnerability
BugTraq ID: 14798
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14798
Summary:
IBM OS/400 is susceptible to a remote denial of service vulnerability affecting
its SNMP services.

This issue presents itself due to the error logging functionality of the SNMP
process. When the SNMP process receives malformed SNMP packets, it logs
information regarding the packet to its job log.

By default, the job log is configured for '*NOWRAP' for the 'Job message queue
full action'. Once the job log is full, the SNMP jobs inappropriately abort.

This issue allows remote attackers to crash the SNMP jobs on affected computers,
denying service to further legitimate SNMP traffic.

61. Ipswitch Whatsup Gold Cross-Site Scripting Vulnerability
BugTraq ID: 14799
Remote: Yes
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14799
Summary:
Ipswitch Whatsup Gold is prone to a file disclosure vulnerability. This is due
to a lack of proper sanitization of user-supplied input.

A remote attacker may exploit this vulnerability to reveal files that contain
potentially sensitive information. Information that is harvested in this manner
may then be used to aid in further attacks against the software and the computer
that is hosting the software.


62. IBM OS/400 Multiple OSP-CERT Vulnerabilities
BugTraq ID: 14800
Remote: Unknown
Date Published: 2005-09-09
Relevant URL: http://www.securityfocus.com/bid/14800
Summary:
IBM OS/400 osp-cert is susceptible to multiple vulnerabilities.

The first identified vulnerability is a flaw in local Certificate Authority
certificates. During the creation of these certificates, X.509 basic constraints
are not added. Since the local Certificate Authority certificates are not
properly identified as valid Certificate Authorities, the proper validation of
these certificates is impossible, as is the verification of certificate chains
that are derived from it.

The next issue is a failure of the application to properly return renewed
certificates once they have been made available. This issue is due to a failure
of the application to properly notice altered certificate store files during
operation.

There are also multiple unspecified ASN.1 parsing vulnerabilities. No further
information about these issues are currently available.

These issues allow attackers to potentially subvert, bypass, or possibly alter
the security properties of the cryptographic software. The exact impact and
possible attack scenarios are not known at this time.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Big debate over small packets
By: Robert Lemos
After a summer of debate over whether flaws in ICMP are a serious threat, an
Argentinian researcher continues to lobby the Internet's technical standards
body  to implement his proposal  to fix the issues.
http://www.securityfocus.com/news/11306

2. Katrina's destruction attracts online fraudsters
By: Robert Lemos
>From questionable charity sites to malicious code with a hurricane hook, people
ready to take advantage of the natural disaster in New Orleans and the Gulf of
Mexico have pursued their schemes on the Internet.
http://www.securityfocus.com/news/11302

3. Hidden-code flaw in Windows renews worries over stealthly malware
By: Robert Lemos
A flaw in the way that several security programs and systems utilities detect
system changes can allow spyware to run surreptitiously, renewing worries about
stealthier attack code.
http://www.securityfocus.com/news/11300

4. Zotob suspects arrested in Turkey and Morocco
By: Robert Lemos
UPDATE: Law enforcement arrested two men--one living in Turkey and the other in
Morocco--in connection with the release of the recent Zotob worm.
http://www.securityfocus.com/news/11297

5. Bot herder websites in internet take-down
By: John Leyden
Bot herder websites that specialise in dumbing down the process of managing
zombie networks of compromised Windows PCs are under attack.
http://www.securityfocus.com/news/11311

6. Users play fast and loose with corporate PCs
By: John Leyden
Users are more likely to engage in risky internet behaviour at work because they
reckon their IT department will protect them against viruses, worms, spyware,
spam, phishing, and other security threats.
http://www.securityfocus.com/news/11312

7. Mozilla disables IDN to guard against Firefox flaw
By: John Leyden
Mozilla developers have acted quickly to release a workaround for Firefox hours
after the public disclosure of a potentially serious security vulnerability in
the browser software on Friday (9 September). 
http://www.securityfocus.com/news/11309

8. MS pulls upcoming Windows security patch
By: John Leyden
Microsoft has pulled plans to release a critical Windows security patch on
Tuesday citing quality concerns as the reason behind the late withdrawal.
http://www.securityfocus.com/news/11310

IV.  SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Security Product Marketing Manager, Any Location
http://www.securityfocus.com/archive/77/410482

2. [SJ-JOB] Security Product Manager, Islandia
http://www.securityfocus.com/archive/77/410475

3. [SJ-JOB] Security Product Marketing Manager, Any Location
http://www.securityfocus.com/archive/77/410479

4. [SJ-JOB] Information Assurance Engineer, Waltham
http://www.securityfocus.com/archive/77/410477

5. [SJ-JOB] Security Product Marketing Manager, Any Location
http://www.securityfocus.com/archive/77/410480

6. [SJ-JOB] Security Product Marketing Manager, South San Francisco
http://www.securityfocus.com/archive/77/410481

7. [SJ-JOB] Security Product Manager, Framingham
http://www.securityfocus.com/archive/77/410474

8. [SJ-JOB] Security Product Manager, Waltham
http://www.securityfocus.com/archive/77/410476

9. [SJ-JOB] Security Product Marketing Manager, Atlanta
http://www.securityfocus.com/archive/77/410478

10. [SJ-JOB] Security Engineer, Vienna
http://www.securityfocus.com/archive/77/410455

11. [SJ-JOB] Management, Columbia
http://www.securityfocus.com/archive/77/410456

12. [SJ-JOB] Developer, Columbia
http://www.securityfocus.com/archive/77/410457

13. [SJ-JOB] Developer, Columbia
http://www.securityfocus.com/archive/77/410452

14. [SJ-JOB] Security Consultant, Columbia
http://www.securityfocus.com/archive/77/410453

15. [SJ-JOB] Sales Representative, Geneva
http://www.securityfocus.com/archive/77/410449

16. [SJ-JOB] Sr. Security Engineer, Washington, DC
http://www.securityfocus.com/archive/77/410451

17. [SJ-JOB] Sales Representative, Dubai
http://www.securityfocus.com/archive/77/410454

18. [SJ-JOB] Instructor, Austin
http://www.securityfocus.com/archive/77/410448

19. [SJ-JOB] Certification & Accreditation Engineer, Washington
http://www.securityfocus.com/archive/77/410450

20. [SJ-JOB] Quality Assurance, Islandia
http://www.securityfocus.com/archive/77/410441

21. [SJ-JOB] Sr. Security Engineer, Herndon
http://www.securityfocus.com/archive/77/410439

22. [SJ-JOB] Sr. Security Engineer, Framingham
http://www.securityfocus.com/archive/77/410440

23. [SJ-JOB] Sr. Security Engineer, Islandia
http://www.securityfocus.com/archive/77/410442

24. [SJ-JOB] Sr. Security Engineer, Herndon
http://www.securityfocus.com/archive/77/410435

25. [SJ-JOB] Security Product Marketing Manager, Lexington
http://www.securityfocus.com/archive/77/410437

26. [SJ-JOB] Sales Engineer, Bay Area
http://www.securityfocus.com/archive/77/410438

27. [SJ-JOB] Security Architect, Schaumburg
http://www.securityfocus.com/archive/77/410419

28. [SJ-JOB] Technical Support Engineer, Seattle
http://www.securityfocus.com/archive/77/410420

29. [SJ-JOB] Sr. Security Engineer, Waltham
http://www.securityfocus.com/archive/77/410421

30. [SJ-JOB] Database Security Engineer, Seattle
http://www.securityfocus.com/archive/77/410423

31. [SJ-JOB] Privacy Officer, Schaumburg
http://www.securityfocus.com/archive/77/410428

32. [SJ-JOB] Product Strategist, North/North East England
http://www.securityfocus.com/archive/77/410398

33. [SJ-JOB] Information Assurance Analyst, Washington, DC
http://www.securityfocus.com/archive/77/410403

34. [SJ-JOB] Chief Scientist, San Jose
http://www.securityfocus.com/archive/77/410405

35. [SJ-JOB] Security Engineer, San Jose
http://www.securityfocus.com/archive/77/410399

36. [SJ-JOB] Sr. Product Manager, Belcamp
http://www.securityfocus.com/archive/77/410400

37. [SJ-JOB] Security Product Marketing Manager, Islandia
http://www.securityfocus.com/archive/77/410416

38. [SJ-JOB] Account Manager, Islandia
http://www.securityfocus.com/archive/77/410397

39. [SJ-JOB] Security Director, Framingham
http://www.securityfocus.com/archive/77/410414

40. [SJ-JOB] Security Product Marketing Manager, Islandia
http://www.securityfocus.com/archive/77/410415

41. [SJ-JOB] Developer, Tampa
http://www.securityfocus.com/archive/77/410417

42. [SJ-JOB] Sales Engineer, Belcamp
http://www.securityfocus.com/archive/77/410328

43. [SJ-JOB] Security Engineer, Belcamp
http://www.securityfocus.com/archive/77/410329

44. [SJ-JOB] Security Engineer, Bala Cynwyd
http://www.securityfocus.com/archive/77/410292

45. [SJ-JOB] Security Auditor, Tokyo
http://www.securityfocus.com/archive/77/410244

46. [SJ-JOB] Sales Engineer, New York
http://www.securityfocus.com/archive/77/410246

47. [SJ-JOB] Information Assurance Analyst, Richmond
http://www.securityfocus.com/archive/77/410239

48. [SJ-JOB] Security Consultant, London or Cambridge
http://www.securityfocus.com/archive/77/410242

49. [SJ-JOB] Sr. Product Manager, San Diego
http://www.securityfocus.com/archive/77/410238

50. [SJ-JOB] Security Auditor, Alexandria
http://www.securityfocus.com/archive/77/410240

51. [SJ-JOB] Sr. Security Engineer, Islandia
http://www.securityfocus.com/archive/77/410236

52. [SJ-JOB] Sr. Security Engineer, Waltham
http://www.securityfocus.com/archive/77/410245

53. [SJ-JOB] Sr. Security Engineer, Islandia
http://www.securityfocus.com/archive/77/410235

54. [SJ-JOB] Sr. Security Engineer, Waltham
http://www.securityfocus.com/archive/77/410237

55. [SJ-JOB] Sr. Security Engineer, Islandia
http://www.securityfocus.com/archive/77/410241

56. [SJ-JOB] Sales Representative, Washington
http://www.securityfocus.com/archive/77/410132

57. [SJ-JOB] Security Consultant, Riyadh
http://www.securityfocus.com/archive/77/410133

58. [SJ-JOB] CISO, Los Angeles
http://www.securityfocus.com/archive/77/410135

59. [SJ-JOB] Sr. Security Engineer, Any US location
http://www.securityfocus.com/archive/77/410131

60. [SJ-JOB] Sr. Security Engineer, Ft Lauderdale
http://www.securityfocus.com/archive/77/410129

61. [SJ-JOB] Security Product Manager, Plano
http://www.securityfocus.com/archive/77/410130

62. [SJ-JOB] Security Consultant, Tampa
http://www.securityfocus.com/archive/77/410128

V.   INCIDENTS LIST SUMMARY
---------------------------
VI.  VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. Snort <= 2.4.0 SACK TCP Option Error Handling
http://www.securityfocus.com/archive/82/410291

2. "tinyurl" url masking
http://www.securityfocus.com/archive/82/410321

3. MS05-039
http://www.securityfocus.com/archive/82/410121

4. Windows Multi-Languages OPcodes DB
http://www.securityfocus.com/archive/82/409444

VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. runas vs network connections etc etc....
http://www.securityfocus.com/archive/88/410243

2. SecurityFocus Microsoft Newsletter #255
http://www.securityfocus.com/archive/88/409934

VIII. SUN FOCUS LIST SUMMARY
----------------------------

IX. LINUX FOCUS LIST SUMMARY
----------------------------
1. scanning for windows spywear with linux
http://www.securityfocus.com/archive/91/409832
[ terug ]