Hi All, Patch up! Patch up! Details below.
------------------------------------------------------------------------ THREAT SUMMARY ------------------------------------------------------------------------ Demarc is currently reporting a risk level of 6 out of a maximum 10. An integer overflow in Apple iTunes AAC Files in the sample_size_table value field. OpenOffice has announced multiple vulnerabilities including Java, Macros, and XML,which could allow Code Execution when opening malicious files. HP-UX "mkdir" Command Unspecified Local Unauthorized Access Vulnerability could allow a privilege escalation. ------------------------------------------------------------------------ NEW THREAT DETAILS ------------------------------------------------------------------------ Apple iTunes AAC File Parsing Integer Overflow ------------------------------------------------------- [Threat Summary]: An integer overflow error within the parsing of AAC media files due to a special sample_size_table value [Affected Systems]: iTunes 4.x, 5.x, 6.x [Impact]: Remote Code Execution [Exploit]: No public exploit is available [Resolution]: Update to version 6.0.5 http://www.apple.com/itunes/download/ [Read More]: http://secunia.com/advisories/20891/ OpenOffice Multiple Vulnerabilities ------------------------------------------------------- [Threat Summary]: Several vulnerabilities including bypass of sandbox restrictions using Java applets, enabling of Macros embedded in documents even though they could be disabled, and an error in handling certain XML documents [Affected Systems]: OpenOffice 1.1.x, OpenOffice.org 2.x [Impact]: Remote Code Execution [Exploit]: These issues were discovered in an internal code audit [Resolution]: Update to version 2.0.3 http://download.openoffice.org/2.0.3/index.html [Read More]: http://secunia.com/advisories/20867/ HP-UX "mkdir" Command Unspecified Local Unauthorized Access Vulnerability ------------------------------------------------------- [Threat Summary]: An unspecified error in processing special mkdir commands [Affected Systems]: HP-UX B.11.00, B.11.04, B.11.11, B.11.23 [Impact]: Privilege Escalation [Exploit]: No public exploit is available [Resolution]: Updates are available [Read More]: http://www.frsirt.com/english/advisories/2006/2614 Cisco Wireless Control System Multiple Vulnerabilities ------------------------------------------------------- [Threat Summary]: An undocumented username and hard coded password, database credentials are stored in cleartext, and use of a TFTP server can allow writing to arbitrary files [Affected Systems]: Cisco Wireless Control System (WCS) 1.x [Impact]: System Access, Information Disclosure, Loss of integrity [Exploit]: A proof of concept is available for some of these issues [Resolution]: Update to WCS for Linux and Windows 3.2(63) or later at http://www.cisco.com/public/sw-center/sw-usingswc.shtml [Read More]: http://secunia.com/advisories/20870/ Novell ZENworks Patch Management SQL Injection and System Compromise ------------------------------------------------------- [Threat Summary]: Several different asp scripts do not properly sanitize user input before being used to query the database [Affected Systems]: Novell ZENworks Patch Management 6.x [Impact]: SQL Injection, System Access [Exploit]: A proof of concept is available [Resolution]: The vendor has issued a patch [Read More]: http://secunia.com/advisories/20878/ Bernard _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
