LANDesk Security and Patch Bulletin: Security Update Report for Week Ending 18 April 2008

Version 1

    Security Update for the Week Ending 18 April 2008

     

     

     

     

     

     

     

    Windows / 3rd party (Some also impact Apple OSes)

     

     

     

     

     

    Firefox Vulnerabilities

     

     

    LANDesk Solution: Patch Manager content provided

     

     

     

     

     

     

     

     

    A highly critical vulnerability has been reported in Mozilla Firefox, which can potentially be exploited by malicious people to compromise a user's system.

     

     

     

     

     

    The vulnerability is caused due to an error in the Javascript Garbage Collector and can be exploited to cause a memory corruption via specially crafted Javascript code.

     

     

     

     

     

    Successful exploitation may allow execution of arbitrary code.

     

     

     

     

     

    The vulnerability is reported in version 2.0.0.13. Prior versions may also be affected. The vendor has released version 2.0.0.14 to resolve the vulnerability.

     

     

     

     

     

    For more information, refer to:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29787/

     

     

     

     

     

    Secunia has constructed the Secunia Personal Software Inspector, which you can use to check if your personal system is vulnerable:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=https://psi.secunia.com/

     

     

     

     

     

    Corporate users can request for a trial of the Secunia Network Software Inspector, which you can use to check which systems in your network are

     

     

    vulnerable:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/network_software_inspector/

     

     

     

     

     

    --

     

     

    Safari Vulnerabilities

     

     

    LANDesk Solution: Patch Manager content provided

     

     

     

     

     

     

     

     

    Some vulnerabilities have been reported in Safari, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially to compromise a user's system.

     

     

     

     

     

    An error in the handling of URLs containing a colon character in the host name can be exploited to conduct cross-site scripting attacks when a specially crafted URL is opened.

     

     

     

     

     

    An integer overflow error in WebKit's regular expression compiler in JavaScriptCore/pcre/pcre_compile.cpp can be exploited to cause a heap-based buffer overflow via specially crafted regular expressions with large, nested repetition counts.

     

     

     

     

     

    Successful exploitation may allow execution of arbitrary code e.g. when a user visits a malicious web page.

     

     

     

     

     

    The vulnerabilities are reported in versions prior to 3.1.1.

     

     

     

     

     

    Two vulnerabilities previously reported in Safari for Windows have also been resolved in version 3.1.1. Users are urged to apply the update immediately.

     

     

     

     

     

    For more information, refer to:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29483/

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29846/

     

     

     

     

     

    --

     

     

    Oracle Vulnerabilities

     

     

    LANDesk Solution: No solution from vendor is available

     

     

     

     

     

    Multiple vulnerabilities have been reported for various Oracle products. Some vulnerabilities have unknown impacts while others can be exploited by malicious users to bypass certain security restrictions, conduct SQL injection attacks, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.

     

     

     

     

     

    Input passed via unspecified parameters to the SDO_GEOM, SDO_IDX, and SDO_UTIL packages is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

     

     

     

     

     

    The problem is that the DBMS_STATS_INTERNAL package resets the OUTLN password to a default value and grants DBA privileges to the OUTLN user during the creation of a materialized view.

     

     

     

     

     

    An error within the "flows_030000.wwv_execute_immediate.run_ddl()"

     

     

    function included in Oracle Application Express can be exploited to execute SQL commands with escalated privileges.

     

     

     

     

     

    Successful exploitation requires access to the "flows_030000.wwv_execute_immediate.run_ddl()" function (e.g. the WMSYS, WKSYS, FLOWS_030000, and OUTLN accounts by default).

     

     

     

     

     

    The remaining vulnerabilities are caused due to unspecified errors. No more information is currently available.

     

     

     

     

     

    Various Oracle products are affected. The vendor has released its Critical Patch Update - April 2008 to resolve the vulnerabilities.

     

     

     

     

     

    For more information, refer to:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29829/

     

     

     

     

     

     

     

     

    UNIX/Linux:--

     

     

     

     

     

    Debian update for openoffice.org

     

     

     

     

     

    Critical:    Highly critical

     

     

    Where:       From remote

     

     

    Impact:      System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29864/

     

     

     

     

     

    --

     

     

     

     

     

    Kolab Server ClamAV Multiple Vulnerabilities

     

     

     

     

     

    Critical:    Highly critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Some vulnerabilities have been reported in Kolab Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29863/

     

     

     

     

     

    --

     

     

     

     

     

    xine-lib NSF Demuxer Buffer Overflow Vulnerability

     

     

     

     

     

    Critical:    Highly critical

     

     

    Where:       From remote

     

     

    Impact:      System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Guido Landi has discovered a vulnerability in xine-lib, which can be exploited by malicious people to compromise a user's system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29850/

     

     

     

     

     

    --

     

     

     

     

     

    Red Hat update for seamonkey

     

     

     

     

     

    Critical:    Highly critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Red Hat has issued an update for seamonkey. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29828/

     

     

     

     

     

    --

     

     

     

     

     

    Red Hat update for firefox

     

     

     

     

     

    Critical:    Highly critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Red Hat has issued an update for firefox. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29793/

     

     

     

     

     

    --

     

     

     

     

     

    Fedora update for nagios / nagios-plugins

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Fedora has issued an update for nagios and nagios-plugins. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29862/

     

     

     

     

     

    --

     

     

     

     

     

    Gentoo update for rsync

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Gentoo has issued an update for rsync. This fixes a vulnerability, which can potentially be exploited by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29861/

     

     

     

     

     

    --

     

     

     

     

     

    Fedora update for otrs

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      Security Bypass

     

     

    Released:    2008-04-17

     

     

     

     

     

    Fedora has issued an update for otrs. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29859/

     

     

     

     

     

    --

     

     

     

     

     

    Fedora update for rsync

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Fedora has issued an update for rsync. This fixes a vulnerability, which can potentially be exploited by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29856/

     

     

     

     

     

    --

     

     

     

     

     

    Fedora update for speex

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Fedora has issued an update for speex. This fixes a security issue, which can potentially be exploited by malicious people to compromise an application using the library.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29854/

     

     

     

     

     

    --

     

     

     

     

     

    Fedora update for libfishsound

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Fedora has issued an update for libfishsound. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29845/

     

     

     

     

     

    --

     

     

     

     

     

    AutoTutorials "id" SQL Injection Vulnerability

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      Manipulation of data

     

     

    Released:    2008-04-17

     

     

     

     

     

    cO2 has discovered a vulnerability in AutoTutorials, which can be exploited by malicious people to conduct SQL injection attacks.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29840/

     

     

     

     

     

    --

     

     

     

     

     

    Red Hat update for speex

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      DoS, System access

     

     

    Released:    2008-04-17

     

     

     

     

     

    Red Hat has issued an update for speex. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29835/

     

     

     

     

     

    --

     

     

     

     

     

    Ubuntu update for squid

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      DoS

     

     

    Released:    2008-04-15

     

     

     

     

     

    Ubuntu has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29813/

     

     

     

     

     

    --

     

     

     

     

     

    VMware ESX Server Multiple Security Updates

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From remote

     

     

    Impact:      Exposure of sensitive information, DoS, System access

     

     

    Released:    2008-04-16

     

     

     

     

     

    VMware has issued an update for VMware ESX Server. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose sensitive information, or potentially compromise a vulnerable system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29785/

     

     

     

     

     

    --

     

     

     

     

     

    CUPS PNG Filter Integer Overflow Vulnerability

     

     

     

     

     

    Critical:    Moderately critical

     

     

    Where:       From local network

     

     

    Impact:      System access

     

     

    Released:    2008-04-15

     

     

     

     

     

    Thomas Pollet has reported a vulnerability in CUPS, which potentially can be exploited by malicious people to compromise a vulnerable system.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29809/

     

     

     

     

     

    --

     

     

     

     

     

    Fedora update for gallery2

     

     

     

     

     

    Critical:    Less critical

     

     

    Where:       From remote

     

     

    Impact:      Security Bypass

     

     

    Released:    2008-04-17

     

     

     

     

     

    Fedora has issued an update for gallery2. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29839/

     

     

     

     

     

    --

     

     

     

     

     

    WORK system e-commerce main.php Cross-Site Scripting

     

     

     

     

     

    Critical:    Less critical

     

     

    Where:       From remote

     

     

    Impact:      Cross Site Scripting

     

     

    Released:    2008-04-15

     

     

     

     

     

    Russ McRee has discovered some vulnerabilities in WORK system e-commerce, which can be exploited by malicious people to conduct cross-site scripting attacks.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29823/

     

     

     

     

     

    --

     

     

     

     

     

    IBM HTTP Server mod_imap and mod_status Cross-Site Scripting

     

     

     

     

     

    Critical:    Less critical

     

     

    Where:       From remote

     

     

    Impact:      Cross Site Scripting

     

     

    Released:    2008-04-14

     

     

     

     

     

    IBM has acknowledged some vulnerabilities in IBM HTTP Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29806/

     

     

     

     

     

    --

     

     

     

     

     

    MirBSD Korn Shell TTY Attachment Privilege Escalation

     

     

     

     

     

    Critical:    Less critical

     

     

    Where:       Local system

     

     

    Impact:      Privilege escalation

     

     

    Released:    2008-04-14

     

     

     

     

     

    A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29803/

     

     

     

     

     

    --

     

     

     

     

     

    Cecilia "/tmp/csvers" Insecure Temporary File Handling

     

     

     

     

     

    Critical:    Not critical

     

     

    Where:       Local system

     

     

    Impact:      Privilege escalation

     

     

    Released:    2008-04-16

     

     

     

     

     

    Felipe Sateler has discovered a security issue in Cecilia, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

     

     

     

     

     

    Full Advisory:

     

     

    https://email.landesk.com/exchweb/bin/redir.asp?URL=http://secunia.com/advisories/29832/

     

     

     

     

     

    VIRUS ALERTS:

     

     

     

     

     

    During the past week Secunia collected 157 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale.