id=other name=other>Multiple Operating Systems - Windows / UNIX /
Linux / Other |
Vendor &
Software Name |
Vulnerability
- Impact Patches - Workarounds Attacks Scripts |
Common Name
/ CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
Andrea Bugada
PHP Advanced Transfer Manager 1.21 |
A vulnerability has been reported in the 'include/common.php' script
if 'allow_url_fopen' is set to 'on' in the 'php.ini' configuration file,
which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of
Concept has been published. |
PHP Advanced Transfer Manager Arbitrary Command Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1681">CAN-2005-1681 |
High |
Security Tracker Alert ID: 1014008, May 19, 2005 |
BEA Systems
WebLogic Express 6.x, 7.x, 8.x, WebLogic Portal 8.x, WebLogic Server
6.x, 7.x, 8.x |
Multiple vulnerabilities have been reported: a vulnerability was
reported due to an error that can be exploited by a remote malicious user
granted the Monitor security role to shrink or reset JDBC connection
pools; a vulnerability was reported due to an error when handing security
provider exceptions, which could let a remote malicious user manipulate
the identity of threads and cause failure in the auditing of security
exceptions; a vulnerability was reported because users do not need to
re-authenticate after new security constraints have been deployed in web
applications; a vulnerability was reported in the 'UserLogin' control
after a failed login because passwords are echoed back in standard output,
which could let a remote malicious user obtain sensitive information; a
vulnerability was reported in sites running in clusters due to an error in
the cookie parsing; a Cross-Site Scripting vulnerability was reported due
to insufficient sanitization of certain unspecified input, which could let
a remote malicious user execute arbitrary HTML and script code; a
vulnerability was reported because it is possible to make anonymous binds
to the embedded LDAP server, which could let a remote malicious user cause
a Denial of Service; and a buffer overflow vulnerability was reported due
to an unspecified boundary error, which could let a remote malicious user
cause a Denial of Service.
Updates available at:
href="http://dev2dev.bea.com/pub/advisory/">http://dev2dev.bea.com/pub/advisory/
There is no exploit code required. |
BEA WebLogic Server & WebLogic Express Multiple Remote
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1742">CAN-2005-1742
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1743">CAN-2005-1743
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1744">CAN-2005-1744
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1745">CAN-2005-1745
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1746">CAN-2005-1746
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1747">CAN-2005-1747
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1748">CAN-2005-1748
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1749">CAN-2005-1749
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1748">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1747">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1746">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1745">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1744">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1743">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1742"> |
High |
Secunia Advisory, SA15486, May 24, 2005
Security Advisories, BEA05-75.00-BEA05-082, May 24, 2005 |
D-Link
DSL-502T, DSL-504T, DSL-562T, DSL-G604T |
A vulnerability has been reported due to insufficient authentication,
which could let a remote malicious user obtain administrative access.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of Concept exploit
has been published. |
D-Link DSL Router Remote Administrative Access
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1680">CAN-2005-1680 |
High |
Security Focus, 13679, May 19, 2005 |
Emilio Jose Jimenez
TOPo 2.2 |
Multiple vulnerabilities have been reported: a Cross-Site Scripting
vulnerability was reported in 'index.php' due to insufficient sanitization
of the 'ID' parameter, which could let a remote malicious user execute
arbitrary HTML and script code; a Cross-Site Scripting vulnerability was
reported due to insufficient sanitization of input passed to the web and
e-mail fields when a comment is added, which could let a remote malicious
user execute arbitrary HTML and script code; and a vulnerability was
reported because data files are stored improperly in the 'data/'
directory, which could let a remote malicious user obtain sensitive
information
No workaround or patch available at time of publishing.
There is no exploit code required; however, Proofs of Concept exploits
have been published. |
TOPo Multiple Input Validation
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1715">CAN-2005-1715
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1716">CAN-2005-1716
|
High |
Secunia Advisory: SA15325, May 20, 2005 |
Extreme Networks
BlackDiamond 10808, 8800, ExtremeWare XOS 11.1, 11.0, 10.0 |
A vulnerability has been reported due to an unspecified error which
could let a remote malicious user obtain superuser shell access to the
underlying XOS operating system.
Upgrade information available at:
href="http://www.extremenetworks.com/services/documentation/FieldNotices_FN0215-Security_Alert_EXOS.asp">http://www.extremenetworks.com/ services/documentation/FieldNotices_ FN0215-Security_Alert_EXOS.asp
Currently we are not aware of any exploits for this
vulnerability. |
ExtremeWare XOS Superuser Access
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1670">CAN-2005-1670 |
High |
Extreme Networks Field Notice, FN0215, May 19, 2005
US-CERT
VU#937838 |
Fusionphp
Fusion SBX 1.2 & prior |
A vulnerability has been reported in 'index.php' because the
'extract()' function is used insecurely, which could let a remote
malicious user bypass authentication and execute arbitrary code.
No workaround or patch available at time of publishing.
An exploit script has been published. |
Fusion SBX Authentication Bypass & Arbitrary Code Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1596">CAN-2005-1596 |
|
Secunia Advisory, SA15257, May 10, 2005
Security Focus, 13661, May 17, 2005 |
Gearbox Software
Halo Combat Evolved 1.6 |
A remote Denial of Service vulnerability has been reported when
processing malformed data.
No workaround or patch available at time of publishing.
An exploit script has been published.
|
Gearbox Software Halo Game Server Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1741">CAN-2005-1741 |
Low |
Security Focus, 13728, May 24, 2005 |
Help Center Live
Help Center Live 1.0, 1.2-1.2.7 |
Multiple vulnerabilities have been reported: a Cross-Site Scripting
vulnerability was reported in 'index.php' due to insufficient sanitization
of the 'find' parameter, which could let a remote malicious user execute
arbitrary HTML and script code; a Cross-Site Scripting vulnerability was
reported due to insufficient sanitization of input passed to the name and
message fields when requesting a chat and in the message body when opening
a trouble ticket, which could let a remote malicious user execute
arbitrary HTML and script code; a vulnerability was reported due to
insufficient sanitization of certain input before using in an SQL query,
which could let a remote malicious user execute arbitrary SQL code; and a
vulnerability was reported because it is possible to trick an
administrator into performing certain actions when a specially crafted URL
is accessed.
The vulnerabilities have reportedly been fixed by the vendor.
There is no exploit code required; however, Proofs of Concept exploits
have been published. |
Help Center Live Multiple Input Validation
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1672">CAN-2005-1672
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1673">CAN-2005-1673
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1674">CAN-2005-1674
|
High |
GulfTech Security Research Advisory, May 17, 2005 |
Metro Marketing
Cookie Cart 4.x |
Several vulnerabilities have been reported: a vulnerability was
reported in the 'testmy.cgi' and 'testmy.pl' scripts which could let a
remote malicious user obtain sensitive information; and a vulnerability
was reported because a remote malicious user can obtain the password that
contains encrypted passwords.
No workaround or patch available at time of publishing.
Proofs of Concept exploits have been published. |
Cookie Cart Information Disclosure
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1732">CAN-2005-1732
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1733">CAN-2005-1733
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1732">
|
Medium |
Security Tracker Alert, 1014026, May 22, 2005 |
Mozilla.org
Mozilla Browser 1.0-1.0.2, 1.1-1.7.6, Firefox 0.8-0.10.1, 1.0.1, 1.0.2;
Netscape Navigator 7.0, 7.0.2, 7.1, 7.2, 7.0-7.2 |
Multiple vulnerabilities have been reported: a vulnerability was
reported in the 'EMBED' tag for non-installed plugins when processing the
'PLUGINSPAGE' attribute due to an input validation error, which could let
a remote malicious user execute arbitrary code; a vulnerability was
reported because blocked popups that are opened through the GUI
incorrectly run with 'chrome' privileges, which could let a remote
malicious user execute arbitrary code; a vulnerability was reported
because the global scope of a window or tab are not cleaned properly
before navigating to a new web site, which could let a remote malicious
user execute arbitrary code; a vulnerability was reported because the URL
of a 'favicons' icon for a web site isn't verified before changed via
JavaScript, which could let a remote malicious user execute arbitrary code
with elevated privileges; a vulnerability was reported because the search
plugin action URL is not properly verified before used to perform a
search, which could let a remote malicious user execute arbitrary code; a
vulnerability was reported due to the way links are opened in a sidebar
when using the '_search' target, which could let a remote malicious user
execute arbitrary code; several input validation vulnerabilities were
reported when handling invalid type parameters passed to 'InstallTrigger'
and 'XPInstall' related objects, which could let a remote malicious user
execute arbitrary code; and vulnerabilities were reported due to
insufficient validation of DOM nodes in certain privileged UI code, which
could let a remote malicious user execute arbitrary code.
Upgrades available at:
href="http://www.mozilla.org/products/firefox/"
target=_blank>http://www.mozilla.org/ products/firefox/
href="http://www.mozilla.org/products/mozilla1.x/"
target=_blank>http://www.mozilla.org/
class=bodytext>
target=_blank>products/mozilla1.x/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-18.xml"> http://security.gentoo.org/ glsa/glsa-200504-18.xml
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-383.html"> http://rhn.redhat.com/ errata/RHSA-2005-383.html
href="http://rhn.redhat.com/errata/RHSA-2005-386.html">http://rhn.redhat.com/errata/ RHSA-2005-386.html
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-384.html">http://rhn.redhat.com/ errata/RHSA-2005-384.html
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-firefox/">http://security.ubuntu.com/ ubuntu/pool/main/m/ mozilla-firefox/
Mandriva:
href="http://www.mandriva.com/security/advisories">http://www.mandriva.com/ security/advisories
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
An exploit script has been published. |
Mozilla Suite / Firefox Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0752">CAN-2005-0752
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1153">CAN-2005-1153
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0752">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1154">CAN-2005-1154
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1155">CAN-2005-1155
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1156">CAN-2005-1156
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1157">CAN-2005-1157
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1158">CAN-2005-1158
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1159">CAN-2005-1159
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1160">CAN-2005-1160
|
High |
Mozilla Foundation Security Advisories, 2005-35 - 2005-41,
April 16, 2005
Gentoo Linux Security Advisory, GLSA 200504-18, April 19, 2005
US-CERT VU#973309
RedHat Security Advisories, RHSA-2005:383-07 & RHSA-2005-386.,
April 21 & 26, 2005
Turbolinux Security Advisory, TLSA-2005-49, April 21, 2005
US-CERT
VU#519317
SUSE Security Announcement, SUSE-SA:2005:028, April 27, 2005
RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005
SGI Security Advisory, 20050501-01-U, May 5, 2005
Ubuntu Security Notice, USN-124-1 & USN-124-2, May 11 & 12,
2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088, May 14,
2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088-1,
May 17, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18,
2005
PacketStorm, May 23, 2005 |
Mozilla.org
Mozilla Browser Suite prior to
alink="#999999">1.7.6 ; Thunderbird prior to 1.0.2 ; Firefox prior to 1.0.2
|
A buffer overflow vulnerability has been reported due to a boundary
error in the GIF image processing of Netscape extension 2 blocks, which
could let a remote malicious user execute arbitrary code.
Mozilla Browser Suite;
href="http://www.mozilla.org/products/mozilla1.x/"
target=_blank>http://www.mozilla.org/products/ mozilla1.x/
Thunderbird:
href="http://download.mozilla.org/?product=thunderbird-1.0.2&os=win&lang=en-US"
target=_blank>http://download.mozilla.org/? product=thunderbird-1.0.2& os=win〈=en-US
Firefox:
href="http://www.mozilla.org/products/firefox/"
target=_blank>http://www.mozilla.org/products/ firefox/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"
target=_blank>http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Gentoo:
href="http://security.gentoo.org/glsa/"> http://security.gentoo.org/glsa/
Slackware:
href="http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.000123"> http://slackware.com/security/ viewer.php?l=slackware-security &y=2005&m=slackware-security. 000123
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
Currently we are not aware of any exploits for this
vulnerability.
|
Mozilla Suite/ Firefox/ Thunderbird GIF Image Processing Remote
Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399 |
High |
Mozilla Foundation Security Advisory 2005-30, March 23, 2005
US-CERT
VU#557948
Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005
|
Mozilla.org
Mozilla Suite prior to 1.7.6, Firefox prior to 1.0.2 |
A vulnerability has been reported when processing drag and drop
operations due to insecure XUL script loading, which could let a remote
malicious user execute arbitrary code.
Mozilla Browser:
href="http://www.mozilla.org/products/mozilla1.x/"
target=_blank>http://www.mozilla.org/products /mozilla1.x/
Firefox:
href="http://www.mozilla.org/products/firefox/"
target=_blank>http://www.mozilla.org/products /firefox/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"
target=_blank>http://download.fedora.red
hat. com/pub/fedora/linux/core/ updates/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-30.xml"> http://security.gentoo.org/glsa /glsa-200503-30.xml
href="http://security.gentoo.org/glsa/glsa-200503-30.xml">http://security.gentoo.org /glsa/glsa-200503-31.xml
Slackware:
href="http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.000123"> http://slackware.com/security/ viewer.php?El=slackware- security&ay=2005&m= slackware-security.000123
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-384.html">http://rhn.redhat.com/ errata/RHSA-2005-384.html
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
Mandriva:
href="http://www.mandriva.com/security/advisories">http://www.mandriva.com/ security/advisories
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
A Proof of Concept exploit has been published. |
Mozilla Suite/ Firefox Drag and Drop Arbitrary Code
Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401 |
High |
Mozilla Foundation Security Advisory 2005-32, March 23, 2005
RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005
SGI Security Advisory, 20050501 -01-U, May 5, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088, May 14,
2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088-1,
May 17, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18,
2005 |
Mozilla
Firefox 1.0 |
A vulnerability exists in the XPCOM implementation that could let a
remote malicious user execute arbitrary code. The exploit can be automated
in conjunction with other reported vulnerabilities so no user interaction
is required.
A fixed version (1.0.1) is available at:
href="http://www.mozilla.org/products/firefox/all.html">http://www.mozilla.org/products/ firefox/all.html
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora. redhat.com/pub/fedora/ linux/core/updates/3/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-30.xml"> http://security.gentoo.org/ glsa/glsa-200503-30.xml
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
Mandriva:
href="http://www.mandriva.com/security/advisories">http://www.mandriva.com/ security/advisories
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
A Proof of Concept exploit has been published. |
Mozilla Firefox Remote Code Execution Vulnerability
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527 |
High |
Security Tracker Alert ID: 1013301, February 25, 2005
Gentoo Linux Security Advisory GLSA 200503-30. March 25, 2005
SGI Security Advisory, 20050501 -01-U, May 5, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088, May 14,
2005
Mandriva Linux Security Update Advisory,
MDKSA-2005:088-1, May 17, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005
|
Mozilla
Firefox Preview Release, 0.8, 0.9 rc, 0.9-0.9.3, 0.10, 0.10.1,
1.0-1.0.3 |
Several vulnerabilities have been reported: a vulnerability was
reported due to insufficient protection of 'IFRAME' JavaScript URLS from
being executed in the context of another history list URL, which could let
a remote malicious user execute arbitrary HTML and script code; and a
vulnerability was reported in 'InstallTrigger .install()' due to
insufficient verification of the 'Icon URL' parameter, which could let a
remote malicious user execute arbitrary JavaScript code.
Workaround: Disable "tools/options/web-Features/>Allow web sites
to install software"
Slackware:
href="ftp://ftp.slackware.com/pub/slackware/">ftp://ftp.slackware.com/ pub/slac
ware/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200505-11.xml">http://security.gentoo.org/ glsa/glsa-200505-11.xml
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/ pub/TurboLinux/ TurboLinux/ia32/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-434.html">http://rhn.redhat.com/ errata/RHSA-2005-434.html
href="http://rhn.redhat.com/errata/RHSA-2005-435.html">http://rhn.redhat.com/ errata/RHSA-2005-435.html
Proofs of Concept exploit scripts have been published. |
Mozilla Firefox Remote Arbitrary Code Execution
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1476">CAN-2005-1476
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1477">CAN-2005-1477
|
High |
Secunia Advisory, SA15292, May 9, 2005
US-CERT
VU#534710
US-CERT
VU#648758
Slackware Security Advisory, SSA:2005-135-01, May 15, 2005
Gentoo Linux Security Advisory, GLSA 200505-11, May 16, 2005
Turbolinux Security Advisory, TLSA-2005 -56, May 16, 2005
RedHat Security Advisories, RHSA-2005:434-10 &
RHSA-2005:435-10, May 23 & 24, 2005 |
Mozilla
Mozilla 0.x, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7.x
Mozilla Firefox 0.x
Mozilla Thunderbird 0.x |
Multiple vulnerabilities exist in Firefox, Mozilla and Thunderbird that
can permit users to bypass certain security restrictions, conduct spoofing
and script insertion attacks and disclose sensitive and system
information.
Mozilla: Update to version 1.7.5:
href="http://www.mozilla.org/products/mozilla1.x/ "> http://www.mozilla.org/ products/mozilla1.x/
Firefox: Update to version 1.0:
href="http://www.mozilla.org/products/firefox/"> http://www.mozilla.org/ products/firefox/
Thunderbird: Update to version 1.0:
href="http://www.mozilla.org/products/thunderbird/"> http://www.mozilla.org/ products/thunderbird/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"> http://download.fedora. redhat.com/pub/fedora/ linux/core/updates/
Slackware:
href="http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.000123"> http://slackware.com/security/ viewer.php?El=slackware-security &y=2005&m=slackware-security. 000123
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-384.html">http://rhn.redhat.com/ errata/RHSA-2005-384.html
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
Mandriva:
href="http://www.mandriva.com/security/advisories">http://www.mandriva.com/ security/advisories
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
Currently we are not aware of any exploits for these
vulnerabilities.
|
Mozilla Firefox, Mozilla, and Thunderbird Multiple
Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0141">CAN-2005-0141
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0143">CAN-2005-0143
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0144">CAN-2005-0144
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0145">CAN-2005-0145
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0146">CAN-2005-0146
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0147">CAN-2005-0147
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0148">CAN-2005-0148
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0149">CAN-2005-0149
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0150">CAN-2005-0150 |
|
Mozilla Foundation Security Advisory 2005-01, 03, 04, 07, 08, 09, 10,
11, 12
Fedora Update Notification, FEDORA- 2005-248, 249, 251, 253,
March 23 & 25, 2005
Slackware Security Advisory, SSA:2005- 085-01, March 27,
2005
RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005
SGI Security Advisory, 20050501 -01-U, May 5, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088, May
14, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088-1,
May 17, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005
|
Mozilla
Mozilla 1.7.x and prior
Mozilla Firefox 1.x and prior
Mozilla Thunderbird 1.x and prior
Netscape Netscape 7.2 |
Multiple vulnerabilities exist in Firefox, Mozilla and Thunderbird.
These can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges and by malicious
people to conduct spoofing attacks, disclose and manipulate sensitive
information, and potentially compromise a user's system.
Firefox: Update to version 1.0.1:
href="http://www.mozilla.org/products/firefox/"> http://www.mozilla.org/ products/firefox/
Mozilla: The vulnerabilities have been fixed in the CVS repository
and will be included in the upcoming 1.7.6 version.
Thunderbird: The vulnerabilities have been fixed in the CVS
repository and will be included in the upcoming 1.0.1 version.
Fedora update for Firefox:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/
Red Hat:
href="http://rhn.redhat.com/errata/RHSA-2005-176.html"> http://rhn.redhat.com/errata/ RHSA-2005-176.html
Gentoo:
href="http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml">http://www.gentoo.org/security/ en/glsa/glsa-200503-10.xml
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"> http://download.fedora.redhat. com/pub/fedora/linux/ core/updates/3/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-30.xml"> http://security.gentoo.org/ glsa/glsa-200503-30.xml
href="http://security.gentoo.org/glsa/glsa-200503-30.xml">http://security.gentoo.org/ glsa/glsa-200503-32.xml
Slackware:
href="http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.000123">http://slackware.com/security/ viewer.php?l=slackware-security &y=2005&m=slackware- security.000123
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
Currently we are not aware of any exploits for these
vulnerabilities. |
Mozilla / Firefox / Thunderbird Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0587">CAN-2005-0587
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0589">CAN-2005-0589
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593 |
|
Mozilla Foundation Security Advisories 2005-14, 15, 17, 18, 19, 20, 21,
24, 28
Red Hat RHSA-2005:176-11, March 1, 2005
Gentoo, GLSA 200503-10, March 4, 2005
SUSE Security Announcement, SUSE-SA:2005:016, March 16, 2005
Fedora Update Notification, FEDORA-2005-248, 249, 251, & 253,
March 23 & 25, 2005
Gentoo Linux Security Advisory, GLSA 200503-30 & GLSA 200503-032,
March 25, 2005
Slackware Security Advisory, SSA:2005-085-01, March 27, 2005
SGI Security Advisory, 20050501-01-U, May 5, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005
|
Mozilla
Mozilla Browser prior to 1.7.8; Mozilla Suite prior to 1.7.8; Firefox
prior to 1.0.4; Firebird 0.5, 0.6.1, 0.7 |
A vulnerability was reported due to a failure in the application to
properly verify Document Object Model (DOM) property values, which could
let a remote malicious user execute arbitrary code.
Firefox:
href="http://www.mozilla.org/products/firefox/"
target=_blank>http://www.mozilla.org/ products/firefox/
Mozilla Browser Suite:
href="http://www.mozilla.org/products/mozilla1.x/"
target=_blank>http://www.mozilla.org/ products/mozilla1.x/
TurboLinux::
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-434.html">http://rhn.redhat.com/ errata/RHSA-2005-434.html
href="http://rhn.redhat.com/errata/RHSA-2005-435.html">http://rhn.redhat.com/ errata/RHSA-2005-435.html
Currently we are not aware of any exploits for this
vulnerability. |
Mozilla Suite And Firefox DOM Property Overrides
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1532">CAN-2005-1532
|
High |
Mozilla Foundation Security Advisory, 2005-44, May 12, 2005
Turbolinux Security Advisory, TLSA-2005 -56, May 16, 2005
RedHat Security Advisories, RHSA-2005:434-10 &
RHSA-2005:435-10, May 23 & 24, 2005
|
Mozilla
Mozilla Browser prior to 1.7.8; Mozilla Suite prior to 1.7.8; Firefox
prior to 1.0.4; Firebird 0.5, 0.6.1, 0.7 |
A vulnerability was reported when processing 'javascript:' URLs, which
could let a remote malicious user execute arbitrary code.
Firefox:
href="http://www.mozilla.org/products/firefox/"
target=_blank>http://www.mozilla.org/ products/firefox/
Mozilla Browser Suite:
href="http://www.mozilla.org/products/mozilla1.x/"
target=_blank>http://www.mozilla.org/ products/mozilla1.x/
TurboLinux::
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-434.html">http://rhn.redhat.com/ errata/RHSA-2005-434.html
href="http://rhn.redhat.com/errata/RHSA-2005-435.html">http://rhn.redhat.com/ errata/RHSA-2005-435.html
Currently we are not aware of any exploits for this
vulnerability. |
Mozilla Suite And Firefox Wrapped 'javascript:' URLs
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1531">CAN-2005-1531
|
High |
Mozilla Foundation Security Advisory, 2005-43, May 12, 2005
Turbolinux Security Advisory, TLSA-2005-56, May 16, 2005
RedHat Security Advisories, RHSA-2005:434-10 &
RHSA-2005:435-10, May 23 & 24, 2005 |
Mozilla
Mozilla Firefox 1.0 and 1.0.1 |
A vulnerability exists that could let remote malicious users conduct
Cross-Site Scripting attacks. This is due to missing URI handler
validation when dragging an image with a "javascript:" URL to the address
bar.
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-30.xml"> http://security.gentoo.org/ glsa/glsa-200503-30.xml
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-384.html">http://rhn.redhat.com/ errata/RHSA-2005-384.html
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
Mandriva:
href="http://www.mandriva.com/security/advisories">http://www.mandriva.com/ security/advisories
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
A Proof of Concept exploit has been published. |
Mozilla Firefox Image Javascript URI Dragging Cross-Site Scripting
Vulnerability
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591
|
High |
Secunia SA14406, March 1, 2005
Gentoo Linux Security Advisory, GLSA 200503-30, March 25, 2005
RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005
SGI Security Advisory, 20050501-01-U, May 5, 2005
Mandriva Linux Security Update, MDKSA-2005:088-1, Advisory, May
17, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005
|
Multiple Vendors
DeleGate DeleGate 7.7 .0, 7.7.1, 7.8 .0-7.8.2, 7.9.11, 8.3.3, 8.3.4,
8.4 .0, 8.5 .0, 8.9-8.9.6, 8.10-8.10.2; dnrd dnrd 1.0-1.4, 2.0-2.10;
PowerDNS PowerDNS 2.0 RC1, 2.8, 2.9.15, 2.9.16 |
A remote Denial of Service vulnerability has been reported when
handling a specially crafted DNS message.
Contact your vendor for updates.
Currently we are not aware of any exploits for this
vulnerability. |
Multiple Vendor DNS Message Decompression Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0036">CAN-2005-0036
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0037">CAN-2005-0037
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0038">CAN-2005-0038
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0037">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0036"> |
Low |
NISCC Vulnerability Advisory, DNS - 589088, May 24, 2005 |
Multiple Vendors
Mozilla Firefox 1.0; Gentoo Linux; Thunderbird 0.6, 0.7- 0.7.3, 0.8,
0.9, 1.0, 1.0.1; Netscape Netscape 7.2 |
There are multiple vulnerabilities in Mozilla Firefox. A remote user
may be able to cause a target user to execute arbitrary operating system
commands in certain situations or access access content from other
windows, including the 'about:config' settings. This is due to a hybrid
image vulnerability that allows batch statements to be dragged to the
desktop and because tabbed javascript vulnerabilities let remote users
access other windows.
A fix is available via the CVS repository
Fedora:
href="ftp://aix.software.ibm.com/aix/efixes/security/perl58x.tar.Z"> ftp://aix.software.ibm.com/aix/ efixes/security/perl58x.tar.Z
Red Hat:
href="http://rhn.redhat.com/errata/RHSA-2005-176.html"> http://rhn.redhat.com/errata/ RHSA-2005-176.html
Gentoo:
href="http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml">http://www.gentoo.org/security/en/ glsa/glsa-200503-10.xml
Thunderbird:
href="http://download.mozilla.org/?product=thunderbird-1.0.2&os=win http://download.mozilla.org/? product=thunderbird-1.0.2 &os=win<=en-US
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-30.xml"> http://security.gentoo.org/ glsa/glsa-200503-30.xml
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-384.html">http://rhn.redhat.com/ errata/RHSA-2005-384.html
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
A Proof of Concept exploit has been published. |
Mozilla Firefox Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232 |
High |
Security Tracker Alert ID: 1013108, February 8, 2005
Fedora Update Notification, FEDORA-2005-182, February 26, 2005
Red Hat RHSA-2005:176-11, March 1, 2005
Gentoo, GLSA 200503-10, March 4, 2005
Security Focus, 12468, March 22, 2005
Gentoo Linux Security Advisory, GLSA 200503-30, March 25, 2005
RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005
SGI Security Advisory, 20050501-01-U, May 5, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005
|
Multiple Vendors
Mozilla.org Mozilla Browser 1.7.6, Firefox 1.0.1, 1.0.2; K-Meleon
K-Meleon 0.9; Netscape 7.2; K-Meleon 0.9 |
A vulnerability has been reported in the javascript implementation due
to improper parsing of lamba list regular expressions, which could a
remote malicious user obtain sensitive information.
The vendor has issued a fix, available via CVS.
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-383.html"> http://rhn.redhat.com/errata/ RHSA-2005-383.html
href="http://rhn.redhat.com/errata/RHSA-2005-386.html">http://rhn.redhat.com/errata/ RHSA-2005-386.html
Slackware:
href="http://www.mozilla.org/projects/security/known-vulnerabilities.html"> http://www.mozilla.org /projects/security/known- vulnerabilities.html
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-384.html">http://rhn.redhat.com/ errata/RHSA-2005-384.html
SGI:
href="ftp://patches.sgi.com/support/free/security/advisories/">ftp://patches.sgi.com/support/ free/security/advisories/
Mandriva:
href="http://www.mandriva.com/security/advisories">http://www.mandriva.com/ security/advisories
FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ redhat/
There is no exploit code required; however, a Proof of Concept exploit
has been published. |
Mozilla Suite/Firefox JavaScript Lambda Information Disclosure
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989
|
Medium |
Security Tracker Alert, 1013635, April 4, 2005
Security Focus, 12988, April 16, 2005
RedHat Security Advisories, RHSA-2005:383-07 & RHSA-2005:386-08,
April 21 & 26, 2005
Turbolinux Security Advisory, TLSA-2005-49, April 21, 2005
Slackware Security Advisory, SSA:2005-111-04, April 22, 2005
SUSE Security Announcement, SUSE-SA:2005:028, April 27, 2005
RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005
SGI Security Advisory, 20050501-01-U, May 5, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088, May 14,
2005
Mandriva Linux Security Update Advisory, MDKSA-2005:088-1,
May 17, 2005
Fedora Legacy Update Advisory, FLSA:152883, May 18,
2005 |
Multiple Vendors
Squid Web Proxy Cache2.5.STABLE9 & prior |
A vulnerability has been reported in the DNS client when handling DNS
responses, which could let a remote malicious user spoof DNS lookups.
Patch available at:
href="http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE9-dns_query-4.patch"
target=_blank>http://www.squid-cache.org/ Versions/v2/2.5/bugs/squid- 2.5.STABLE9-dns_query-4.patch
Trustix:
href="http://www.trustix.org/errata/2005/0022/">http://www.trustix.org/ errata/2005/0022/
Fedora:
href=" http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/">http://download.fedora.redhat.com/ pub/fedora/linux/core/updates/3/
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/s/squid/">http://security.ubuntu.com/ ubuntu/pool/main/s/squid/
Currently we are not aware of any exploits for this
vulnerability. |
Squid Proxy DNS Spoofing
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1519">CAN-2005-1519 |
Medium |
Security Focus, 13592, May 11, 2005
Trustix Secure Linux Security Advisory, 2005-0022, May 13, 2005
Fedora Update Notification, FEDORA-2005-373, May 17,
2005
Ubuntu Security Notice, USN-129-1 May 18,
2005 |
Multiple Vendors
ALT Linux Compact 2.3, Junior 2.3; Apple Mac OS X 10.0-10.0.4,
10.1-10.1.5, 10.2-10.2.8, 10.3-10.3.8, Mac OS X Server 10.0, 10.1-10.1.5,
10.2-10.2.8, 10.3-10.3.8; MIT Kerberos 5 1.0, 5 1.0.6, 5 1.0.8, 51.1-5
1.4; Netkit Linux Netkit 0.9-0.12, 0.14-0.17, 0.17.17; Openwall
GNU/*/Linux (Owl)-current, 1.0, 1.1; FreeBSD 4.10-PRERELEASE, 2.0, 4.0 .x,
-RELENG, alpha, 4.0, 4.1, 4.1.1 -STABLE, -RELEASE, 4.1.1, 4.2,
-STABLEpre122300, -STABLEpre050201, 4.2 -STABLE, -RELEASE, 4.2, 4.3
-STABLE, -RELENG, 4.3 -RELEASE-p38, 4.3 -RELEASE, 4.3, 4.4 -STABLE,
-RELENG, -RELEASE-p42, 4.4, 4.5 -STABLEpre2002-03-07, 4.5 -STABLE,
-RELENG, 4.5 -RELEASE-p32, 4.5 -RELEASE, 4.5, 4.6 -STABLE, -RELENG,
4.6 -RELEASE-p20, 4.6 -RELEASE, 4.6, 4.6.2, 4.7 -STABLE, 4.7 -RELENG, 4.7
-RELEASE-p17, 4.7 -RELEASE, 4.7, 4.8 -RELENG, 4.8 -RELEASE-p7, 4.8
-PRERELEASE, 4.8, 4.9 -RELENG, 4.9 -PRERELEASE, 4.9, 4.10 -RELENG, 4.10
-RELEASE, 4.10, 4.11 -STABLE, 5.0 -RELENG, 5.0, 5.1 -RELENG, 5.1
-RELEASE-p5, 5.1 -RELEASE, 5.1, 5.2 -RELENG, 5.2 -RELEASE, 5.2, 5.2.1
-RELEASE, 5.3 -STABLE, 5.3 -RELEASE, 5.3, 5.4 -PRERELEASE; SuSE Linux 7.0,
sparc, ppc, i386, alpha, 7.1, x86, sparc, ppc, alpha, 7.2, i386
|
Two buffer overflow vulnerabilities have been reported in Telnet: a
buffer overflow vulnerability has been reported in the 'slc_add_reply()'
function when a large number of specially crafted LINEMODE Set Local
Character (SLC) commands is submitted, which could let a remote malicious
user execute arbitrary code; and a buffer overflow vulnerability has been
reported in the 'env_opt_add()' function, which could let a remote
malicious user execute arbitrary code.
ALTLinux:
href="http://lists.altlinux.ru/pipermail/security-announce/2005-March/000287.html"> http://lists.altlinux.ru/pipermail /security-announce/2005- March/000287.html
Apple:
href="http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty1.pl/product=05529&platform=osx&method=sa/SecUpd2005-003Pan.dmg"
target=_blank>http://wsidecar.apple.com/cgi-bin/ nph-reg3rdpty1.pl/product=05529& platform=osx&method=sa/SecUpd 2005-003Pan.dmg
Debian:
href="http://security.debian.org/pool/updates/main/n/netkit-telnet/"> http://security.debian.org/pool/ updates/main/n/netkit-telnet/
Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/">http://download.fedora. redhat.com/pub/fedora/ linux/core/updates/
FreeBSD:
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:01/telnet4.patch"
target=_blank>ftp://ftp.FreeBSD.org/pub/ FreeBSD/CERT/patches/ SA-05:01/
MIT Kerberos:
href="http://web.mit.edu/kerberos/advisories/2005-001-patch_1.4.txt"> http://web.mit.edu/kerberos/| advisories/2005-001-patch _1.4.txt
Netkit:
href="ftp://ftp.uk.linux.org/pub/linux/Networking/netkit/"> ftp://ftp.uk.linux.org/pub/linux/ Networking/netkit/
Openwall:
href="http://www.openwall.com/Owl/CHANGES-current.shtml"> http://www.openwall.com/Owl/ CHANGES-current.shtml
RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-327.html"> http://rhn.redhat.com/errata/ RHSA-2005-327.html
Sun:
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1"> http://sunsolve.sun.com/search/ document.do?assetkey= 1-26-57755-1
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/n/netkit-telnet/"> http://security.ubuntu.com/ubuntu/ pool/main/n/netkit-telnet/
OpenBSD:
href="http://www.openbsd.org/errata.html#telnet">http://www.openbsd.org/ errata.html#telnet
Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> http://www.mandrakesecure.net/ en/ftp.php
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-36.xml">http://security.gentoo.org/ glsa/glsa-200503-36.xml
href="http://security.gentoo.org/glsa/glsa-200504-01.xml">http://security.gentoo.org/ glsa/glsa-200504-01.xml
Debian:
href="http://security.debian.org/pool/updates/main/k/krb5/">http://security.debian.org/ pool/updates/main/k/krb5/
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-04.xml">http://security.gentoo.org/ glsa/glsa-200504-04.xml
SGI:
href="ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/">ftp://oss.sgi.com/projects/ sgi_propack/download /3/updates/
SCO:
href="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.21">ftp://ftp.sco.com/pub/updates/ UnixWare/SCOSA-2005.21
Sun:
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1">http://sunsolve.sun.com/ search/document.do? assetkey=1-26-57761-1
Openwall:
href="http://www.openwall.com/Owl/CHANGES-current.shtml">http://www.openwall.com/ Owl/CHANGES-current.shtml
Avaya:
href="http://support.avaya.com/elmodocs2/security/ASA-2005-088_RHSA-2005-330.pdf">http://support.avaya.com/ elmodocs2/security/ ASA-2005-088_RHSA-2005-330.pdf
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-28.xml">http://security.gentoo.org/ glsa/glsa-200504-28.xml
TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/">ftp://ftp.turbolinux.co.jp/pub/ TurboLinux/TurboLinux/ia32/
Sun:
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1"> http://sunsolve.sun.com/search/ document.do?assetkey=1-26-57761-1
OpenWall:
href="http://www.openwall.com/Owl/CHANGES-current.shtml"> http://www.openwall.com/ Owl/CHANGES-current.shtml
SCO:
href="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.23">ftp://ftp.sco.com/pub/updates/ OpenServer/SCOSA-2005.23
Currently we are not aware of any exploits for these
vulnerabilities. |
Telnet Client 'slc_add_reply()' & 'env_opt_add()' Buffer
Overflows
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469
|
High |
iDEFENSE Security Advisory, March 28, 2005
US-CERT
VU#291924
Mandrakelinux Security Update Advisory, MDKSA-2005:061, March 30,
2005
Gentoo Linux Security Advisories, GLSA 200503-36 & GLSA 200504-01,
March 31 & April 1, 2005
Debian Security Advisory, DSA 703-1, April 1, 2005
US-CERT
VU#341908
Gentoo Linux Security Advisory, GLSA 200504-04, April 6, 2005
SGI Security Advisory, 20050401-01-U, April 6, 2005
Sun(sm) Alert Notification, 57761, April 7, 2005
SCO Security Advisory, SCOSA-2005.21, April 8, 2005
Avaya Security Advisory, ASA-2005-088, April 27, 2005
Gentoo Linux Security Advisory, GLSA 200504-28, April 28, 2005
Turbolinux Security Advisory, TLSA-2005-52, April 28, 2005
Sun(sm) Alert Notification, 57761, April 29, 2005
SCO Security Advisory, SCOSA-2005.23, May 17, 2005
|
Multiple Vendors
Cisco Systems Cisco Aironet 1200 Series Access Point, 350 Series Access
Point, Content Services Switch 11000 Series (WebNS), MGX 8200 Series Edge
Concentrators, MGX 8800 Series Multiservice Switches, MGX 8900 Series
Multiservice Switches, SN5400 Series Storage Routers; OpenBSD 3.x; Hitachi
GR2000 Series Gigabit Routers, GR4000 Series Gigabit Routers, GS3000
Series Gigabit Switches, GS4000 Series Gigabit Switches; ALAXALA Networks
AX5400S, AX7800R, AX7800S; FreeBSD FreeBSD 2.x, 3.x, 4.x |
A remote Denial of Service vulnerability has been reported in the
Protection Against Wrapped Sequence Numbers (PAWS) technique that was
included to increase overall TCP performance.
Update information available at:
href="http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml">http://www.cisco.com/warp/ public/707/cisco-sn-20050518-tcpts.shtml
OpenBSD:
href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/015_tcp.patch"
target=_blank>ftp://ftp.openbsd.org/pub/OpenBSD/ patches/3.6/common/015_tcp.patch
Hitachi: The vendor has issued updated versions.
ALAXALA: Customers are advised to contact the vendor in regards to
obtaining and applying the appropriate update.
Microsoft:
href="http://www.microsoft.com/technet/security/advisory/899480.mspx">http://www.microsoft.com/ technet/security/advisory/ 899480.mspx
An exploit script has been published. |
Cisco Various Products TCP Timestamp Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0356">CAN-2005-0356 |
Low |
Cisco Security Notice, 64909, May 18, 2005
Microsoft Security Advisory (899480), May 18, 2005
US-CERT
VU#637934 |
Multiple Vendors
Computer Associates BrightStor ARCServe Backup for Windows 11.1, eTrust
Antivirus 6.0, 7.0, SP2, 7.1, eTrust Antivirus EE 6.0, 7.0, eTrust
Antivirus for the Gateway 7.0, 7.1, eTrust Intrusion Detection 1.4.1 .13,
1.4.5, 1.5, 3.0, SP 1, eTrust Secure Content Manager 1.0, SP1, 1.1,
InoculateIT 6.0, Vet Antivirus; Zone Labs ZoneAlarm Antivirus,
ZoneAlarm Security Suite 5.1, 5.5.062.011, 5.5.062, 5.5 |
A heap overflow vulnerability was reported due to an integer overflow
flaw in memory allocation and utilization routines when malicious
compressed VBA projects are processed by the library, which could let a
remote malicious user execute arbitrary code.
Computer Associates:
href="http://crm.my-etrust.com/CIDocument.asp?KDId=1588&GUID=CFCBAF561393476799582FB18E05F829"> http://crm.my-etrust.com/ CIDocument.asp?KDId= 1588&GUID=CFCBAF 561393476799582FB18E05F829
Currently we are not aware of any exploits for this
vulnerability. |
Computer Associates Remote Heap Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1693">CAN-2005-1693 |
High |
Security Focus, 13710, May 23, 2005
Computer Associates Vulnerability ID: 32896, May 24, 2005 |
Multiple Vendors
MPlayer 1.0pre6 & prior; Xine 0.9.9-1.0; Peachtree Linux release
1 |
Several vulnerabilities have been reported: a buffer overflow
vulnerability has been reported due to a boundary error when processing
lines from RealMedia RTSP streams, which could let a remote malicious user
execute arbitrary code; and a buffer overflow vulnerability has been
reported due to a boundary error when processing stream IDs from Microsoft
Media Services MMST streams, which could let a remote malicious user
execute arbitrary code.
Patches available at:
href="http://www.mplayerhq.hu/MPlayer/patches/rtsp_fix_20050415.diff"
target=_blank>http://www.mplayerhq.hu/ MPlayer/patches/rtsp_ fix_20050415.diff
Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-19.xml"> http://security.gentoo.org/ glsa/glsa-200504-19.xml
Patches available at:
href="http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/librtsp/rtsp.c?r1=1.18&r2=1.19&diff_format=u">http://cvs.sourceforge.net/viewcvs.py/ xine/xinelib/src/input/
Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200504-27.xml">http://security.gentoo.org/ glsa/glsa-200504-27.xml
SUSE:
href="ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/xorg-x11-libs-6.8.1-15.3.i586.rpm"
target=_blank>ftp://ftp.SUSE.com/pub/SUSE
Slackware:
href="ftp://ftp.slackware.com/pub/slackware/">ftp://ftp.slackware.com/ pub/slackware/
Currently we are not aware of any exploits for these
vulnerabilities. |
MPlayer RTSP & MMST Streams Buffer Overflow
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1195">CAN-2005-1195 |
High |
Security Tracker Alert,1013771, April 20, 2005
Gentoo Linux Security Advisory, GLSA 200504-19, April 20, 200
Peachtree Linux Security Notice, PLSN-0003, April 21, 2005
Xine Security Announcement, XSA-2004-8, April 21, 2005
Gentoo Linux Security Advisory, GLSA 200504-27, April 26, 2005
SUSE Security Summary Report, SUSE-SR:2005:012, April 29, 2005
Slackware Security Advisory, SSA:2005-121-02, May 3, 2005
SUSE Security Summary Report, SUSE-SR:2005:013, May 18, 2005
|
Multiple Vendors
See
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0791">US-CERT
VU#222750 for complete list |
Multiple vendor implementations of TCP/IP Internet Control Message
Protocol (ICMP) do not adequately validate ICMP error messages, which
could let a remote malicious user cause a Denial of Service.
Cisco:
href="http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml">http://www.cisco.com/warp/ public/707/cisco-sa- 20050412-icmp.shtml
IBM:
href="ftp://aix.software.ibm.com/aix/efixes/security/icmp_efix.tar.Z"
target=_blank>ftp://aix.software.ibm.com/aix/ efixes/security/icmp_efix.tar.Z
RedHat:
href="http://rhn.redhat.com/errata/"> http://rhn.redhat.com/errata/
Sun:
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1">http://sunsolve.sun.com/search/ document.do?assetkey=1-26-57746-1
ALAXALA: Customers are advised to contact the vendor in regards
to obtaining and applying the appropriate update.
Currently we are not aware of any exploits for these
vulnerabilities. |
Multiple Vendor TCP/IP Implementation ICMP Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1060">CAN-2004-1060
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0790">CAN-2004-0790
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0791">CAN-2004-0791 |
Low |
US-CERT
VU#222750
Sun(sm) Alert Notification, 57746, April 29, 2005
US-CERT
VU#415294
Security Focus, 13124, May 21, 2005 |
NetWin
SurgeMail 3.0 c2 |
Several Cross-Site Scripting vulnerabilities have been reported due to
insufficient sanitization of unspecified input, which could let a remote
malicious user execute arbitrary HTML and script code.
A CVS fix is available from the vendor.
There is no exploit code required. |
NetWin SurgeMail Cross-Site Scripting
href="ttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1714">CAN-2005-1714 |
High |
Secunia Advisory, SA15425, May 19, 2005 |
Novell
ZENworks Desktop Management 6.5, ZENworks for Desktops 3.2 SP2, 4.0,
4.0.1, ZENworks for Servers 3.2, ZENworks Remote Management Novell
ZENworks Server Management 6.5 |
Several vulnerabilities were reported in the Remote Management
authentication protocol in 'zenrem32.exe' due to integer overflows and
boundary errors, which could let a remote malicious user execute arbitrary
code.
No workaround or patch available at time of publishing.
Currently we are not aware of any exploits for these
vulnerabilities. |
Novell ZENworks Remote Management Buffer Overflows
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1543">CAN-2005-1543 |
High |
Securiteam, May 19, 2005 |
phpSysInfo
phpSysInfo 2.3 |
Multiple Cross-Site Scripting vulnerabilities have been reported due to
insufficient sanitization of user-supplied input, which could let a remote
malicious user execute arbitrary HTML and script code. It is also possible
to obtain the full path to certain scripts.
Debian:
href="http://security.debian.org/pool/updates/main/p/phpsysinfo/">http://security.debian.org/pool/ updates/main/p/phpsysinfo/
There is no exploit code required; however, Proofs of Concept exploits
have been published. |
PHPSysInfo Multiple Cross-Site Scripting
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0870">CAN-2005-0870 |
High |
Secunia Advisory, SA14690, March 24, 2005
Debian Security Advisory, DSA 724-1, May 18, 2005
|
PortailPHP
PortailPHP 1.3 |
An SQL injection vulnerability has been reported due to insufficient
sanitization of user-supplied input before using in an SQL query, which
could let a remote malicious user execute arbitrary SQL code.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of Concept has been
published. |
PortailPHP ID Parameter SQL Injection
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1701">CAN-2005-1701 |
High |
Security Focus, 13708, May 23, 2005 |
PostNuke Development Team
PostNuke Phoenix 0.750, 0.760 RC2 & RC3 |
Multiple vulnerabilities have been reported: a vulnerability was
reported in 'index.php' due to insufficient sanitization of input passed
to the 'module' and 'riga[0]' parameters before using in an SQL query,
which could let a remote malicious user execute arbitrary SQL code; a
Cross-Site Scripting vulnerability was reported in 'index.php' due to
insufficient verification of the 'skin' parameter before using in include
files, which could let a remote malicious user include arbitrary files; a
vulnerability was reported in 'demo.php' due to insufficient sanitization
of the 'skin' and 'paletteid' parameters and in 'config.php' due to
insufficient sanitization of the 'serverName' parameter, which could let a
remote malicious user execute arbitrary HTML and script code; and a
vulnerability has been reported because it is possible to obtain the full
path to certain scripts by accessing them directly.
Upgrades available at:
href="http://news.postnuke.com/Downloads-index-req-viewdownloaddetails-lid-411.html">http://news.postnuke.com/Downloads- index-req-viewdownloaddetails-lid-411.html
href="http://news.postnuke.com/Downloads-index-req-viewdownloaddetails-lid-471.html">http://news.postnuke.com/Downloads- index-req-viewdownloaddetails-lid-471.html
There is no exploit code required; however, Proofs of Concept exploits
have been published. |
PostNuke Multiple Remote Input Validation
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1694">CAN-2005-1694
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1695">CAN-2005-1695
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1696">CAN-2005-1696
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1695">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1694">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1697">CAN-2005-1697
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1694">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1698">CAN-2005-1698
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1694">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1699">CAN-2005-1699
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1694">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1700">CAN-2005-1700
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1694">
|
High |
PostNuke Security Advisory, PNSA 2005-2, May 20, 2005 |
PostNuke Development Team
PostNuke Phoenix 0.760 RC3 |
Multiple vulnerabilities have been reported: Cross-Site Scripting
vulnerabilities have been reported due to insufficient sanitization of the
'module' parameter in 'admin.php' and the 'op' parameter in 'user.php,'
which could let a remote malicious user execute arbitrary HTML and script
code; and a vulnerability has been reported due to insufficient
sanitization of the 'sid' parameter before used in a SQL query, which
could let a remote malicious user inject arbitrary SQL code.
Update information available at:
href="http://news.postnuke.com/Article2691.html">http://news.postnuke.com/ Article2691.html
Proofs of Concept exploits have been published. |
PostNuke Phoenix Remote Cross-Site Scripting & SQL Injection
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1048">CAN-2005-1048
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1049">CAN-2005-1049
|
High |
Dcrab 's Security Advisory, April 8, 2005
PostNuke Security Advisory, PNSA 2005-2, May 20, 2005
|
S9Y
Serendipity 0.8 -beta6 Snapshot, 0.8 -beta6, 0.8 -beta5, 0.8 |
Multiple vulnerabilities have been reported: a vulnerability was
reported due to an error in the file upload handling, which could let a
remote malicious user upload special files without privileges; and a
Cross-Site Scripting vulnerability was reported due to insufficient
sanitization of input passed to the 'templatedropdown' and 'shoutbox'
plugins, which could let a remote malicious user execute arbitrary HTML
and script code.
Upgrades available at:
href="http://prdownloads.sourceforge.net/php-blog/serendipity-0.8.1.tar.gz?download"
target=_blank>http://prdownloads.sourceforge.net/ php-blog/serendipity-0.8.1.tar.gz?download
There is no exploit code required. |
Serendipity File Upload & Cross-Site Scripting
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1712">CAN-2005-1712
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1713">CAN-2005-1713
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1712">
|
High |
Secunia Advisory, SA15405, May 18, 2005 |
Sun Microsystems, Inc.
JavaMail 1.3, 1.3.2, Sun Solstice Internet Mail Server POP3
2.0 |
A vulnerability has been reported in the MimeMessage method in the Sun
JavaMail API due to insufficient validation on message number values
passed during requests, which could let a remote malicious user obtain
sensitive information.
No workaround or patch available at time of publishing.
A Proof of Concept exploit has been published. |
Sun JavaMail API MimeMessage Information Disclosure
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1682">CAN-2005-1682 |
Medium |
Securiteam, May 19, 2005 |
ZyXEL
Prestige 650R-31 3.40 KO.1 |
A remote Denial of Service vulnerability has been reported when
handling specially crafted fragmented IP packets.
No workaround or patch available at time of publishing.
There is no exploit code required. |
Zyxel Prestige 650R-31 Router Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1717">CAN-2005-1717 |
Low |
Security Focus, 13703, May 20, 2005 |