Hi All,

Patch up! Patch up! Details below.



------------------------------------------------------------------------
THREAT SUMMARY
------------------------------------------------------------------------
Demarc is currently reporting a risk level of 6 out of a maximum 10. An
integer overflow in Apple iTunes AAC Files in the sample_size_table value
field.

OpenOffice has announced multiple vulnerabilities including Java, Macros,
and XML,which could allow Code Execution when opening malicious files.

HP-UX "mkdir" Command Unspecified Local Unauthorized Access Vulnerability
could allow a privilege escalation.



------------------------------------------------------------------------
NEW THREAT DETAILS
------------------------------------------------------------------------
Apple iTunes AAC File Parsing Integer Overflow
-------------------------------------------------------
[Threat Summary]: An integer overflow error within the parsing of AAC
media files due to a special sample_size_table value
[Affected Systems]: iTunes 4.x, 5.x, 6.x
[Impact]: Remote Code Execution
[Exploit]: No public exploit is available
[Resolution]: Update to version 6.0.5 http://www.apple.com/itunes/download/
[Read More]: http://secunia.com/advisories/20891/

OpenOffice Multiple Vulnerabilities
-------------------------------------------------------
[Threat Summary]: Several vulnerabilities including bypass of sandbox
restrictions using Java applets, enabling of Macros embedded in documents
even though they could be disabled, and an error in handling certain XML
documents
[Affected Systems]: OpenOffice 1.1.x, OpenOffice.org 2.x
[Impact]: Remote Code Execution
[Exploit]: These issues were discovered in an internal code audit
[Resolution]: Update to version 2.0.3
http://download.openoffice.org/2.0.3/index.html
[Read More]: http://secunia.com/advisories/20867/

HP-UX "mkdir" Command Unspecified Local Unauthorized Access Vulnerability
-------------------------------------------------------
[Threat Summary]: An unspecified error in processing special mkdir commands
[Affected Systems]: HP-UX B.11.00, B.11.04, B.11.11, B.11.23
[Impact]: Privilege Escalation
[Exploit]: No public exploit is available
[Resolution]: Updates are available
[Read More]: http://www.frsirt.com/english/advisories/2006/2614

Cisco Wireless Control System Multiple Vulnerabilities
-------------------------------------------------------
[Threat Summary]: An undocumented username and hard coded password, database
credentials are stored in cleartext, and use of a TFTP server can allow
writing to arbitrary files
[Affected Systems]: Cisco Wireless Control System (WCS) 1.x
[Impact]: System Access, Information Disclosure, Loss of integrity
[Exploit]: A proof of concept is available for some of these issues
[Resolution]: Update to WCS for Linux and Windows 3.2(63) or later at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
[Read More]: http://secunia.com/advisories/20870/

Novell ZENworks Patch Management SQL Injection and System Compromise
-------------------------------------------------------
[Threat Summary]: Several different asp scripts do not properly sanitize
user input before being used to query the database
[Affected Systems]: Novell ZENworks Patch Management 6.x
[Impact]: SQL Injection, System Access
[Exploit]: A proof of concept is available
[Resolution]: The vendor has issued a patch
[Read More]: http://secunia.com/advisories/20878/



Bernard


_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to