Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: V, Issue: 48
December 4, 2006

Mac OS/X users and Adobe Reader and Adobe Acrobat users both have important patches to install this week. The Mac patches are ready, Adobe should have its patches shortly.

If you (or someone you think has the lab and skills) would like to play a major role in testing Center for Internet Security JAVA based security configuration tools and tools provided by third party vendors that run on multiple UNIX/LINUX and Windows platforms. This is a great opportunity to enhance the reputation of a laboratory your organization might have set up, and CIS will pay for the tests. Email ckreitner@cisecurity.org if you have the lab and the interest.

Alan

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Microsoft Office
    • 1
    • Other Microsoft Products
    • 2
    • Third Party Windows Apps
    • 9 (#2, #3, #7, #8)
    • Mac Os
    • 6 (#1)
    • BSD
    • 2
    • Cross Platform
    • 10 (#6)
    • Web Application - Cross Site Scripting
    • 9
    • Web Application - SQL Injection
    • 18
    • Web Application
    • 27 (#4, #5)
    • Network Device
    • 2

******************* Sponsored By Fiberlink Communications ***************

Do your security and compliance policies reach your mobile workers? Laptops included, can you state with 100% certainty that your data is safe or that your company would pass a SOX or HIPAA audit? This whitepaper examines the unique risks presented by mobility, and best practices for extending compliance and security to your mobile workforce. http://www.sans.org/info/2131

*************************************************************************

SANS 2007 (SANS' biggest annual conference, San Diego Mar. 29-Apr. 6) just opened for registration. SANS annual conferences stand out from all other programs because of the multitude of learning opportunities in one place (51 courses and lots of exhibits and BOFs) http://www.sans.org/sans2007/

"Fantastic! Ton's of information. My mind is now Jello- I'll be back next year" Kurt Danielson, National Marrow Donor Program

"My 4th SANS conference! Each time the instructors are top-notch and I come away amazed and educated." Bill Wildprett, Washington State CTED

"This conference really taught me the skills I needed to immediately improve the processes where I work." Karissa Truitt, AT&T Government Solutions

Or: Washington DC, Dec. 9 (16 courses) http://www.sans.org/cdieast06/

Orlando Bootcamp, Jan. 13 (25 courses): http://www.sans.org/bootcamp07/

Or San Jose, Phoenix, Prague, or Brisbane (5 or 6 courses)

See complete list of more than 70 upcoming programs in cities around the world at http://www.sans.org/training_events/

*************************************************************************

Table Of Contents
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
Microsoft Office
Other Microsoft Products
Third Party Windows Apps
Mac Os
BSD
Cross Platform
Web Application - Cross Site Scripting
Web Application - SQL Injection
Web Application
Network Device

*********************** Sponsored Links: ******************************

1) Webcast: Enterprise-Strength Log Management See the latest log management appliance from ArcSight and hear how Tyson Foods addresses log management. http://www.sans.org/info/2136

2) SANS OnSite bonus seat offer (up to $5,100 value) Bring SANS OnSite to you on your schedule Read more about SANS OnSite & our bonus seat offer! http://www.sans.org/info/2141

3) Disk encryption with SafeGuard® Easy software provides the ultimate in laptop security. http://www.sans.org/info/2146

*************************************************************************

PART I Critical Vulnerabilities

Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process

Widely Deployed Software
  • (1) HIGH: Apple Mac OS X Multiple Vulnerabilities (including Security Update 2006-007) (2) Apple Type Services (ATS), used for font and text processing, contains a buffer overflow. A specially-crafted font file could exploit this overflow and execute a
  • Affected:
    • Apple Mac OS X versions 10.4.8 and prior
    • Apple Mac OS X Server versions 10.4.8 and prior
  • Description: Apple Mac OS X contains multiple vulnerabilities that can be exploited to compromise a vulnerable system. (1) The AirPort wireless networking subsystem fails to properly handle malformed 802.11 frames. By sending specially-crafted frames, an attacker could exploit this vulnerability and execute arbitrary code with kernel privileges. This issue is similar to one discussed in a previous @RISK newsletter entry.

  • Status: Apple confirmed, updates available.

  • Council Site Actions: Three of the responding council sites are using the affected software. One site has already started the process of deploying the patch. Two other sites are relying on Apple's automatic Software Update Facility to deploy the patches.

  • References:
  • (2) HIGH: Adobe AcroPDF ActiveX Control Multiple Vulnerabilities
  • Affected:
    • Adobe Reader versions 7.0.0 - 7.0.8
    • Adobe Acrobat Standard and Professional versions 7.0.0 - 7.0.8
  • Description: The AcroPDF ActiveX control, included with Adobe Reader and Adobe Acrobat contains multiple vulnerabilities in its "setPageMode()", "setLayoutMode()", "setNamedDest()", and "LoadFile()" methods. A web page that instantiates this control and calls one of these methods could exploit these vulnerabilities and execute arbitrary code with the privileges of the current user. Users can mitigate the impact of this vulnerability by disabling the affected ActiveX control via Microsoft's "kill bit" mechanism for CLSID "{CA8A9780-280D-11CF-A24D-444553540000}".

  • Status: Adobe confirmed, no updates available.

  • Council Site Actions: All responding council sites are waiting on additional information from the vendor. Almost all sites rely on the automatic update feature for their clients.

  • References:
  • (3) MODERATE: Novell Netware Client Print Provider Buffer Overflow
  • Affected:
    • Novell Netware Client 4.91 SP0/SP1/SP2
  • Description: The Novell Netware Client, used to provide access to Netware services (including shared files and printers) for Microsoft Windows systems contains a buffer overflow in its print provider subsystem. By passing overly long arguments to the "EnumPrinters()" or "OpenPrinter()" functions, an attacker could exploit this buffer overflow and execute arbitrary code with SYSTEM privileges. These functions are accessible without authentication via the "spoolss" named pipe.

  • Status: Novell confirmed, updates available. As a workaround, users are advised to block the TCP ports 139 and 445 at the network perimeter.

  • Council Site Actions: Only one of the responding council sites is using the affected software and only in one department on a small number of servers. That department is still investigating the impact of the vulnerability.

  • References:
  • (4) MODERATE: Symantec NetBackup PHP Vulnerabilities
  • Affected:
    • Symantec Veritas NetBackup PureDisk Remote Office Edition versions
    • 6.0GA, MP1 NB_PDE60_MP1_S01
  • Description: Symantec NetBackup PureDisk Remote Office Edition, a popular backup solution, was discovered to install a version of PHP with multiple known vulnerabilities. Attackers could exploit these vulnerabilities to execute arbitrary commands with the privileges of the web server process. The vulnerable web server is configured to run with SSL by default, but, depending on configuration, no authentication may be necessary.

  • Status: Symantec confirmed, updates available.

  • Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.

  • References:
  • (5) MODERATE: JBoss DeploymentFileRepository Class Directory Traversal
  • Affected:
    • JBoss version 1.0 GA and possibly prior
  • Description: JBoss, a popular Java-based application server, contains a directory traversal vulnerability. By sending a specially-crafted request to the JBoss management console, an attacker could read, write, or create arbitrary files anywhere in the filesystem where the JBoss server has appropriate privileges. It is possible that this could lead to remote code execution by overwriting or creating files in locations where they will be executed. By default, no authentication is required to access the management console, however, most common configurations require authentication or otherwise limit access.

  • Status: JBoss confirmed, updates available.

  • Council Site Actions: Only one responding council site is using the affected software and only on a small number of systems. They will install the Red Hat patches during their next regularly scheduled system maintenance window.

  • References:
Other Software
  • (8) MODERATE: Borland idsql32.dll Buffer Overflow
  • Affected:
    • Borland idsql32.dll versions 5.1.0.4 and 5.2.0.2 and possibly prior
  • Description: The idsql32.dll library, used to provide SQL-related services to applications developed with Borland products, contains a buffer overflow. A specially-crafted overlong SQL statement could exploit this buffer overflow and execute arbitrary code with the privileges of the calling application. Note that any application that uses this library is potentially vulnerable.

  • Status: Borland has not confirmed, no updates available.

  • Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.

  • References:
Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
Week 48, 2006

This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5294 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.


  • 06.48.1 - CVE: Not Available
  • Platform: Microsoft Office
  • Title: Microsoft Office HTMLMARQ.OCX Library Denial of Service
  • Description: The Microsoft Office HTMLMARQ.OCX library is prone to a denial of service vulnerability that can be exploited by tricking a victim user into opening a malicious "MarqueeLib" object file, which causes Office to stop responding. Office 97 for Windows is reportedly vulnerable.
  • Ref: http://www.securityfocus.com/bid/21262

  • 06.48.2 - CVE: Not Available
  • Platform: Other Microsoft Products
  • Title: Windows Media Player ASX PlayList File Denial of Service
  • Description: Windows Media Player is vulnerable to a denial of service issue due to insufficient handling of long play list file names. Windows Media Player version 10.00.00.4036 is vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452352

  • 06.48.3 - CVE: Not Available
  • Platform: Other Microsoft Products
  • Title: MailEnable WebAdmin Unauthorized Access
  • Description: MailEnable is a mail server. The WebAdmin is vulnerable to unauthorized access by supplying a blank password. MailEnable Professional Edition 2.32 and Enterprise Edition 2.32 are vulnerable.
  • Ref: http://www.mailenable.com/hotfix/

  • 06.48.4 - CVE: CVE-2006-6076
  • Platform: Third Party Windows Apps
  • Title: BrightStor ARCserve Backup Tape Engine Remote Buffer Overflow
  • Description: Computer Associates BrightStor ARCserve Backup products provide backup and restore protection. A remote buffer overflow vulnerability exists because the Tape Engine application "TAPEENG.EXE" fails to handle malformed RPC requests to TCP port 6502. Computer Associates BrightStore ARCserver Backup version 11.5 is vulnerable.
  • Ref: http://www.frsirt.com/english/advisories/2006/4654

  • 06.48.5 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: My Firewall Plus Local Privilege Escalation
  • Description: My Firewall Plus is a security application. It is prone to a local privilege escalation vulnerability. A local attacker may use the "Test Your Firewall" portion of the application to execute arbitrary machine-code with SYSTEM level privileges. Version 5.0 Build 1119 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21228

  • 06.48.6 - CVE: CVE-2006-5965
  • Platform: Third Party Windows Apps
  • Title: Passgo SSO Plus Local Insecure Default Directory Permissions
  • Description: Passgo SSO Plus is a single sign on application. The application installs into the "PassGoTechnologies" system directory with insecure permissions. Members of the "Everyone" group are assigned "Full Control" to this directory thus exposing the application to a local insecure default directory permissions issue. Passgo SSO Plus version 2.1.0.32 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21244

  • 06.48.7 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: MailEnable IMAP Service Unspecified Buffer Overflow
  • Description: MailEnable is a commercially available mail server. It is exposed to a buffer overflow issue in the IMAP service because of improper bounds checking on unspecified user-supplied data. Several versions of MailEnable are affected.
  • Ref: http://www.securityfocus.com/bid/21252

  • 06.48.8 - CVE: CVE-2006-4518
  • Platform: Third Party Windows Apps
  • Title: Qbik WinGate Remote Denial Of Service
  • Description: Qbik WinGate is a Windows based proxy server for sharing Internet connections. It is exposed to a remote denial of service issue because it fails to properly handle certain DNS requests which contain a compressed name pointer that references itself. This triggers an infinite loop, and ultimately the consumption of CPU resources. WinGate version 6.1 is reported to be vulnerable and others may be affected as well. Ref: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=444

  • 06.48.9 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: 3Com TFTP Transporting Mode Remote Buffer Overflow
  • Description: 3Com TFTP is a freely available TFTP (Trivial FTP) server for use on Microsoft Windows operating systems. It is exposed to a buffer overflow issue because it fails to properly bounds check user-supplied data before storing it in a finite sized memory buffer. 3Com TFTP version 2.0.1 is affected.
  • Ref: http://www.securityfocus.com/bid/21301

  • 06.48.10 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: Allied Telesyn AT-TFTP Server Filename Remote Buffer Overflow
  • Description: AT-TFTP is a freely available TFTP (Trivial FTP) server. It is exposed to a buffer overflow issue because it fails to bounds check user-supplied filenames before storing them in a finite sized buffer. This issue can be triggered by supplying a filename of 227 or more bytes through a "GET" or "PUT" command. AT-TFTP version 1.9 is reported to be vulnerable and others may be affected as well.
  • Ref: http://www.securityfocus.com/bid/21320

  • 06.48.11 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: 3Com 3CTftpSvc Filename Remote Buffer Overflow
  • Description: 3CTftpSvc is a freely available TFTP (Trivial FTP) server for use on Microsoft Windows. It is exposed to a buffer overflow vulnerability when an attacker supplies an excessively large filename to the application through the "GET" or "PUT" commands. 3CTftpSvc versions 2.0.1 and prior are reportedly vulnerable.
  • Ref: http://www.securityfocus.com/bid/21322

  • 06.48.12 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: Quinnware Quintessential Player Playlist Files Remote Memory Corruption
  • Description: Quinnware Quintessential Player is a media player for Windows. It is prone to a remote memory corruption vulnerability because the application fails to properly handle malformed PLS play list files. Quintessential Player version 4.50.1.82 is vulnerable to this issue; other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/21331

  • 06.48.13 - CVE: Not Available
  • Platform: Mac Os
  • Title: Apple Mac OS X Mach-O Binary Loading Privilege Escalation Vulnerability
  • Description: Apple Mac OS X is exposed to a privilege escalation vulnerability because the operating system fails to handle Mach O binaries with valid "mach_header" data structures and corrupted "load_command" data structures. Apple Mac OS X Server 10.4.8 and Apple Mac OS X 10.4.8 are affected.
  • Ref: http://projects.info-pull.com/mokb/MOKB-23-11-2006.html

  • 06.48.14 - CVE: Not Available
  • Platform: Mac Os
  • Title: Apple Mac OS X KQueue Local Denial of Service
  • Description: Apple Mac OS X is exposed to a local denial of service issue because the kernel fails to properly handle unexpected "kqueue" usage. Apple Mac OS X version 10.4.8 is affected. Ref: http://kernelfun.blogspot.com/2006/11/mokb-24-11-2006-mac-os-x-kqueue-local.html

  • 06.48.15 - CVE: Not Available
  • Platform: Mac Os
  • Title: Apple Mac OS X Mach-O Binary Loading Integer Overflow
  • Description: Apple Mac OS X is prone to a local integer overflow vulnerability. This issue occurs because the operating system fails to handle specially crafted Mach-O binaries. Specifically, this vulnerability arises due to an integer overflow condition in the "fatfile_getarch2()" function.
  • Ref: http://www.securityfocus.com/bid/21291

  • 06.48.16 - CVE: Not Available
  • Platform: Mac Os
  • Title: Apple Mac OS X AppleTalk Local Memory Corruption
  • Description: Apple Mac OS X is prone to a local memory corruption vulnerability that occurs when the operating system fails to handle specially crafted arguments to an IOCTL call. Version 10.4.8 is reportedly vulnerable.
  • Ref: http://www.securityfocus.com/bid/21317

  • 06.48.17 - CVE: Not Available
  • Platform: Mac Os
  • Title: Apple Safari Password Manager Information Disclosure
  • Description: Apple Safari is vulnerable to an information disclosure issue because it fails to properly notify users of automatic form field population in disparate URLs deriving from the same domain. Apple Safari version 2.0.4 is vulnerable. Ref: http://tearesolutions.com/2006/11/how_to_steal_passwords_from_safaris_autofill.html

  • 06.48.18 - CVE:CVE-2006-4396 CVE-2006-4398 CVE-2006-4400 CVE-2006-4401 CVE-2006-4402CVE-2006-4403 CVE-2006-4404 CVE-2006-4406 CVE-2006-4407 CVE-2006-4408CVE-2006-4409 CVE-2006-4410 CVE-2006-4411 CVE-2006-4396 CVE-2006-4398CVE-2006-4400 CVE-2006-4401 CVE-2006-4402 CV
  • Platform: Mac Os
  • Title: Apple Mac OS X 2006-007 Multiple Security Vulnerabilities
  • Description: Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications including Apple Type Services, CFNetwork, Finder, FTPD, Installer, PPP, Security Framework, VPN, and WebKit. Apple Mac OS X and Mac OS X Server versions 10.4.8 and earlier are affected.
  • Ref: http://docs.info.apple.com/article.html?artnum=304829

  • 06.48.19 - CVE: Not Available
  • Platform: BSD
  • Title: NetBSD Multiple Local Denial of Service Vulnerabilities
  • Description: NetBSD is prone to multiple local denial of service vulnerabilities. These issues occur because of improper validation of user-supplied input. NetBSD versions 3.0.1 and earlier are affected.
  • Ref: http://www.securityfocus.com/bid/21327

  • 06.48.20 - CVE: Not Available
  • Platform: BSD
  • Title: NetBSD Kernel Multiple Local Information Disclosure Vulnerabilities
  • Description: The NetBSD kernel is prone to multiple local information disclosure vulnerabilities because the kernel fails to properly initialize kernel memory prior to returning it to user space. Please see the advisory for further details.
  • Ref: http://www.securityfocus.com/bid/21328

  • 06.48.21 - CVE: Not Available
  • Platform: Cross Platform
  • Title: Net-SNMP Unspecified Malformed TCP Packet Remote Denial Of Service
  • Description: Net-SNMP is an SNMP package. It is prone to a remote denial of service vulnerability. The issue is exposed when Net-SNMP is configured to communicate over TCP. The exact versions affected are currently unknown.
  • Ref: http://www.securityfocus.com/bid/21256

  • 06.48.22 - CVE: Not Available
  • Platform: Cross Platform
  • Title: Haru Free PDF Library HPDF_Page_Circle Buffer Overflow Vulnerability
  • Description: The Haru Free PDF Library is a library designed to create PDF files. It is vulnerable to a buffer overflow issue when the "HPDF_Page_Circle()" function in the "hpdf_page_operator.c" source file fails to sufficiently sanitize user-supplied input. Haru Free PDF Library versions 2.0.7 and earlier are vulnerable. Ref: http://sourceforge.net/tracker/index.php?func=detail&aid=1597538&group_id=83044&atid=568129

  • 06.48.23 - CVE: CVE-2006-6077
  • Platform: Cross Platform
  • Title: Mozilla Firefox 2 Password Manager Information Disclosure
  • Description: Mozilla Firefox password manager is vulnerable to an information disclosure weakness because it fails to properly notify users of automatic form field population in disparate URLs deriving from the same domain. Firefox versions 2 and earlier are vulnerable.
  • Ref: https://bugzilla.mozilla.org/show_bug.cgi?id=360493

  • 06.48.24 - CVE: Not Available
  • Platform: Cross Platform
  • Title: Business Objects Crystal Reports XI Professional File Handling Buffer Overflow
  • Description: Business Objects Crystal Reports XI Professional is a suite of reporting tools that supports web integration and server based applications. It is exposed to a buffer overflow issue because it fails to handle unspecified specially crafted ".RTP" files.
  • Ref: http://www.securityfocus.com/bid/21261

  • 06.48.25 - CVE: Not Available
  • Platform: Cross Platform
  • Title: JBoss Java Class DeploymentFileRepository Directory Traversal
  • Description: JBoss is an application server implemented in Java. It is prone to a directory traversal vulnerability because it fails to properly sanitize user-supplied input to the "setBaseDir()" method of the "org.jboss.console.manager.DeploymentFileRepository" class. JBoss Web Server version 1.0.0.GA is vulnerable to this issue.
  • Ref: http://www.securityfocus.com/bid/21219

  • 06.48.26 - CVE: CVE-2006-5869
  • Platform: Cross Platform
  • Title: PSToText Filename Handling Shell Command Execution Vulnerability
  • Description: PSToText is a utility used for extracting plain text from PostScript and PDF files. It is prone to a vulnerability that may permit the execution of arbitrary shell commands, due to insufficient file name quoting by the application. Please see the advisory for further details.
  • Ref: http://www.securityfocus.com/bid/21299

  • 06.48.27 - CVE: Not Available
  • Platform: Cross Platform
  • Title: CRYPTOCard CRYPTO-Server Local Information Disclosure
  • Description: CRYPTOCard CRYPTO-Server is the server portion of the CRYPTOCard two factor authentication system. It is prone to an information disclosure vulnerability because the application stores the cleartext version of the LDAP credentials used during installation in the "UninstallerDatainstallvariables.properties" file, which all local users can read. CRYPTOCard CRYPTO-Server versions 6.3 and 6.4 are affected.
  • Ref: http://www.securityfocus.com/bid/21305

  • 06.48.28 - CVE: CVE-2006-6169
  • Platform: Cross Platform
  • Title: GnuPG Remote Buffer Overflow
  • Description: GNU Privacy Guard (GnuPG) is an open source encryption application. It is vulnerable to a remote buffer overflow issue in the "ask_outfile_name" function in "openfile.c" when running interactively. GnuPG versions 1.4.5 and 2.0.0 are vulnerable.
  • Ref: https://bugs.g10code.com/gnupg/issue728

  • 06.48.29 - CVE: Not Available
  • Platform: Cross Platform
  • Title: GNotebook Local Information Disclosure
  • Description: A GNotebook is Google Desktop plug-in used for quickly accessing notes written in Google Notebook. It is prone to a local information disclosure vulnerability because it logs Gmail password information in a temporary directory with insecure permissions. Version 0.7.0.1 is vulnerable to this issue; other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/21307

  • 06.48.30 - CVE: Not Available
  • Platform: Cross Platform
  • Title: ProFTPD MOD_TLS Remote Buffer Overflow
  • Description: ProFTPD is an FTP server. It is prone to a remote buffer overflow vulnerability because the "tls_x509_name_oneline" function of "mod_tls.c" does not perform boundary checks prior to copying user-supplied data. ProFTPD versions 1.3.0a and prior are vulnerable to this issue.
  • Ref: http://www.securityfocus.com/bid/21326

  • 06.48.31 - CVE: CVE-2006-6087
  • Platform: Web Application - Cross Site Scripting
  • Title: My Little Weblog Weblog.php Cross-Site Scripting
  • Description: My Little Weblog is a simple web forum application. It is vulnerable to a cross-site scripting issue due to insufficient sanitization of user-supplied input to the "action" parameter of the "weblog.php" script.
  • Ref: http://www.securityfocus.com/bid/21238

  • 06.48.32 - CVE: CVE-2006-6091
  • Platform: Web Application - Cross Site Scripting
  • Title: GrimBB Multiple Unspecified Cross-Site Scripting Vulnerabilities
  • Description: GrimBB is a content management system. It is vulnerable to multiple unspecified cross-site scripting issues due to insufficient sanitization of user-supplied input. GrimBB versions prior to 2006-11-21 are vulnerable. Ref: http://sourceforge.net/project/shownotes.php?release_id=465519&group_id=182536

  • 06.48.33 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: InverseFlow Help Desk Multiple Cross-Site Scripting Vulnerabilities
  • Description: InverseFlow Help Desk is a web-based help desk application. It is exposed to multiple cross-site scripting issues because it fails to sufficiently sanitize user-supplied data to the "id", "email" and the "cmd" parameters of the of the "ticketview.php" script and the "email" parameter of the "ticket.php" script. InverseFlow Help Desk version 2.31 is affected.
  • Ref: http://www.securityfocus.com/archive/1/452397

  • 06.48.34 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: Simple PHP Gallery System SP_Index.PHP Cross-Site Scripting
  • Description: Simple PHP Gallery is a web-based gallery. It is exposed to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input to the "dir" parameter of the "sp_index.php" script. Version 1.1 is affected.
  • Ref: http://www.securityfocus.com/bid/21278

  • 06.48.35 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: MMGallery Thumbs.PHP Cross-Site Scripting
  • Description: MMGallery is an image gallery application. It is prone to a cross-site scripting issue because the application fails to sanitize user-supplied input to the "page" parameter of the "thumbs.php" script. MMGallery version 1.55 is vulnerable to this issue and others may also be affected.
  • Ref: http://www.securityfocus.com/bid/21281

  • 06.48.36 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: Expinion.net iNews Publisher Articles.ASP Multiple Cross-Site Scripting Vulnerabilities
  • Description: iNews Publisher is a web-based news publishing application. It is prone to multiple cross-site scripting vulnerabilities due to insufficient sanitization of the "ex" and "hl" parameters of "articles.asp". iNews Publisher version 2.5 is affected.
  • Ref: http://www.securityfocus.com/bid/21296

  • 06.48.37 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: TDiary Unspecified Cross-Site Scripting
  • Description: TDiary is a web-based diary application. It is vulnerable to cross-site scripting attacks because it fails to sufficiently sanitize user-supplied input to an unspecified parameter and script. TDiary 2.0.2 is vulnerable to this issue.
  • Ref: http://www.securityfocus.com/bid/21321

  • 06.48.38 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: Wordpress Index.PHP Cross-Site Scripting
  • Description: Wordpress allows users to generate news pages and web logs dynamically. It is prone to a cross-site scripting vulnerability due to improper sanitization of user-supplied input to unspecified parameters of the "index.php" script. WordPress version 1.5 is affected.
  • Ref: http://www.securityfocus.com/bid/21318

  • 06.48.39 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: b2evolution Error Pages Multiple Cross-Site Scripting Vulnerabilities
  • Description: b2evolution is a blog engine. It is vulnerable to multiple cross-site scripting issues due to insufficient sanitization of user-supplied input to various scripts. b2evolution versions 1.8.2 to 1.9 beta are vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452895

  • 06.48.40 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: FipsCMS Index.ASP SQL Injection
  • Description: FipsCMS is a content management system (CMS). It is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data to the "fid" parameter of the "index.asp" script file before using it in an SQL query. FipsCMS versions 4.5 and earlier are affected.
  • Ref: http://www.securityfocus.com/bid/21258

  • 06.48.41 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Neocrome Land Down Under Profile.Inc.PHP SQL Injection
  • Description: Neocrome Land Down Under is a website engine. It is vulnerable to an SQL injection issue due to insufficient sanitization of user-supplied data to the "id" parameter of the "profile.inc.php" script. Neocrome Land Down Under version 8.0 is vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452259

  • 06.48.42 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Seditio Users.Profile.Inc.PHP SQL Injection
  • Description: Seditio is a web-based application. It is vulnerable to an SQL injection issue due to insufficient sanitization of user-supplied data to the "id" parameter of the "users.profile.inc.php" script. Seditio version 1.10 is vulnerable.
  • Ref: http://neocrome.net/page.php?al=avselect

  • 06.48.43 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: SoftAcid Reciprocal Link Exchange Lite SQL Injection
  • Description: SoftAcid Reciprocal Link Exchange Lite is a link indexing script. It is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data to the "url" parameter of the "search.asp" script and the "psearch" parameter in the "linkslist.asp" script.
  • Ref: http://www.securityfocus.com/bid/21239

  • 06.48.44 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: FipsForum Default2.ASP SQL Injection Vulnerability
  • Description: FipsForum is a web-based forum application. It is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data to the "kat" parameter of the "default2.asp" script. Version 2.6 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21253

  • 06.48.45 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Recipes Complete Website SQL Injection Vulnerabilities
  • Description: Recipes Complete Website is a website building application. It is vulnerable to multiple SQL injection issues due to insufficient sanitization of user-supplied input to multiple scripts. Recipes Complete version 1.1.14 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21270

  • 06.48.46 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: JiRo's FAQ Manager Login.ASP SQL Injection
  • Description: JiRo's FAQ Manager is a frequently asked questions system. It is vulnerable to an SQL injection issue due to insufficient sanitization of user-supplied input to the "tID" parameter of the "index.asp" script. JiRo's FAQ Manager version 1.0 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21271

  • 06.48.47 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: MidiCart ASP Item_Show.ASP ID2006quant Parameter SQL Injection
  • Description: MidiCart ASP is a commercially available e-commerce solution. It is prone to an SQL injection vulnerability due to insufficient sanitization of the "id2006quant" parameter of "item_show.asp" before using it in an SQL query. All versions are reportedly vulnerable.
  • Ref: http://www.securityfocus.com/bid/21273

  • 06.48.48 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Wallpaper Complete Website Wallpaper.PHP SQL Injection
  • Description: Wallpaper Complete Website is a web-based application. It is vulnerable to an SQL injection issue due to insufficient sanitization of user-supplied data to the "wallpaperid" parameter of the "wallpaper.php" script. Wallpaper Complete Website version 1.0.09 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21274

  • 06.48.49 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: PHP-Nuke News Module Index.PHP SQL Injection
  • Description: PHP-Nuke is a web forum. The application is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data to the "sid" parameter of the "index.php" script. PHP-Nuke versions 7.9 and prior are vulnerable.
  • Ref: http://www.securityfocus.com/bid/21277

  • 06.48.50 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: ASP ListPics Listpics.ASP SQL Injection
  • Description: ASP ListPics generates thumbnail web indexes of images in a folder structure. It is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data to the "ID" parameter of the "listpics.asp" script before using it in an SQL query. ASP ListPics version 5.0 is affected.
  • Ref: http://www.securityfocus.com/archive/1/452569

  • 06.48.51 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: fipsShop Multiple SQL Injection Vulnerabilities
  • Description: fipsShop is a web-based shopping cart application. It is prone to multiple SQL injection vulnerabilities due to insufficient sanitization of the "cat" and "did" parameters of the "index.asp" script. All versions are reportedly vulnerable.
  • Ref: http://www.securityfocus.com/bid/21289

  • 06.48.52 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Nivisec Hacks List HACK_ID SQL Injection
  • Description: Hacks List phpBB Mod is an application used to maintain a list of all phpBB modifications. It is vulnerable to an SQL injection issue due to insufficient sanitization of user-supplied data to the "hack_id" parameter of the "admin_hacks_list.php" script. Hacks List versions 1.21 and earlier are vulnerable.
  • Ref: http://www.securityfocus.com/bid/21290

  • 06.48.53 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Liberum Help Desk DETAILS.ASP SQL Injection
  • Description: Liberum Help Desk is a web interface for managing and tracking technical support problems. It is exposed to an SQL injection issue because it fails to properly sanitize user-supplied input to the "id" parameter of the "details.asp" script. Liberum Help Desk versions 0.97.3 and earlier are affected.
  • Ref: http://www.securityfocus.com/bid/21292

  • 06.48.54 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Clickblog Displaycalendar.ASP SQL Injection
  • Description: Clickblog is a web log application. It is exposed to an SQL injection issue because it fails to properly sanitize user-supplied input before using it in an SQL query. Specifically, the application fails to sanitize data supplied to the "date" parameter of the "displayCalendar.asp" script. All current versions are affected.
  • Ref: http://www.securityfocus.com/bid/21310

  • 06.48.55 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: ClickContact Default.ASP Multiple SQL Injection Vulnerabilities
  • Description: ClickContact is a web-based contact manager application. It is vulnerable to multiple SQL injection issues due to insufficient sanitization of user-supplied data to the "AlphaSort", "In" and "orderby" parameters of the "default.asp" script. All versions are vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452825

  • 06.48.56 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: uPhotoGallery Multiple SQL Injection Vulnerabilities
  • Description: uPhotoGallery is a web-based application. It is vulnerable to multiple SQL injection issues due to insufficient sanitization of user-supplied input to various parameters. uPhotoGallery version 1.1 is vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452827

  • 06.48.57 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: WarHound General Shopping Cart Item.ASP SQL Injection
  • Description: WarHound General Shopping Cart is an e-commerce application. It is vulnerable to an SQL injection issue due to insufficient sanitization of user-supplied input to the "ItemID" parameter of the "item.asp" script. WarHound version 2.0.3 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21324

  • 06.48.58 - CVE: Not Available
  • Platform: Web Application
  • Title: FipsGallery Index1.ASP SQL Injection
  • Description: FipsGallery is a web-based application. It is exposed to an SQL injection issue because it fails to sanitize user-supplied data to the "which" parameter of the "index1.asp" script. FipsGallery version 1.5 is vulnerable and others may also be affected.
  • Ref: http://www.securityfocus.com/bid/21254

  • 06.48.59 - CVE: Not Available
  • Platform: Web Application
  • Title: E-Ark Ark_Inc.PHP Remote File Include
  • Description: E-Ark is a web gallery application. It is exposed to a remote file include issue because it fails to sanitize user-supplied input to the "cfg_pear_path" parameter of the "ark_inc.php" script. E-Ark version 1.0 is affected.
  • Ref: http://www.securityfocus.com/bid/21224

  • 06.48.60 - CVE: CVE-2006-6083, CVE-2006-6082
  • Platform: Web Application
  • Title: Creascripts Creadirectory Multiple Input Validation Vulnerabilities
  • Description: Creascripts Creadirectory is a link indexing engine application. It is vulnerable to multiple input validation issues due to insufficient sanitization of user-supplied input to various scripts. Creadirectory version 1.2 is vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452241

  • 06.48.61 - CVE: Not Available
  • Platform: Web Application
  • Title: VMware VirtualCenter SSL Session Man In The Middle
  • Description: VirtualCenter client is an application that monitors and manage virtualized IT environment through a single interface. It is exposed to a man in the middle issue. This issue is due to a design error. Specifically the application fails to verify x.509 certificates presented to a client by a server during the SSL handshake protocol. VirtualCenter client 2 before 2.0.1 patch 1 and VirtualCenter client earlier to 1.4.1 patch 1 are affected.
  • Ref: http://www.securityfocus.com/bid/21231

  • 06.48.62 - CVE: Not Available
  • Platform: Web Application
  • Title: Cutenews Multiple Input Validation Vulnerabilities
  • Description: Cutenews is a news reader application. It is exposed to multiple input validation issues because it fails to sanitize user-supplied input to various scripts. Cutenews version 1.4.5 is affected.
  • Ref: http://www.securityfocus.com/bid/21233

  • 06.48.63 - CVE: Not Available
  • Platform: Web Application
  • Title: Deskpro Multiple Input Validation Vulnerabilities
  • Description: Deskpro is a customer relationship management application. It is prone to multiple input validation vulnerabilities because the application fails to sufficiently sanitize user-supplied input. Versions 2.0.1 and 2.0.0 are vulnerable to these issues; other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/21248

  • 06.48.64 - CVE: CVE-2006-3340
  • Platform: Web Application
  • Title: Pearl Forums for Mambo Multiple Remote File Include Vulnerabilities
  • Description: Pearl Forums for Mambo is a web forum add on for Mambo CMS. It is vulnerable to multiple remote file include issues due to insufficient sanitization of user-supplied input to various scripts. Pearl Forums version 2.4 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21249

  • 06.48.65 - CVE: Not Available
  • Platform: Web Application
  • Title: Messagerie Locale Page Remote File Include Vulnerability
  • Description: Messagerie Locale is a web application. It is exposed to a remote file include issue because it fails to sanitize user-supplied input to the "page" parameter of the "centre.php" script. Messagerie version 1.0 is affected.
  • Ref: http://www.securityfocus.com/bid/21267

  • 06.48.66 - CVE: Not Available
  • Platform: Web Application
  • Title: PEGames Remote File Include
  • Description: PEGames is a content management system made for Gaming web sites. It is exposed to a remote file include issue because it fails to sanitize user-supplied input to the "abs_url" parameter of the "display.php" script.
  • Ref: http://www.securityfocus.com/bid/21266

  • 06.48.67 - CVE: Not Available
  • Platform: Web Application
  • Title: Woltlab Burning Board WBB_UserID SQL Injection
  • Description: Woltlab Burning Board is a bulletin-board application. It is exposed to an SQL injection issue because it fails to sanitize user-supplied input to the "wbb_userid" parameter before using it in an SQL query. WoltLab Burning Board version 1.0.2 is affected.
  • Ref: http://www.securityfocus.com/bid/21265

  • 06.48.68 - CVE: Not Available
  • Platform: Web Application
  • Title: Owllib OWLLIB_ROOT Remote File Include
  • Description: Owllib is a library for accessing OWL files. It is exposed to a remote a file include issue because it fails to sufficiently sanitize user-supplied input to the "OWLLIB_ROOT" parameter of the "OWLProperty.php" and "OWLMemoryClass.php" scripts.
  • Ref: http://www.securityfocus.com/bid/21268

  • 06.48.69 - CVE: Not Available
  • Platform: Web Application
  • Title: HIOXS Star Rating System Addcode.PHP Remote File Include
  • Description: HIOXS Star Rating System is a five star rating application. It is vulnerable to a remote file include issue due to insufficient sanitization of user-supplied input to the "hm" parameter of the "addcode.php" script. HIOXS Star Rating System version 1.0 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21280

  • 06.48.70 - CVE: Not Available
  • Platform: Web Application
  • Title: Fixit iDMS Pro Multiple Input Validation Vulnerabilities
  • Description: Fixit iDMS Pro is a web-based image gallery. It is prone to multiple input validation vulnerabilities because it fails to sanitize user-supplied input. Please see the advisory for further details.
  • Ref: http://www.securityfocus.com/bid/21282

  • 06.48.71 - CVE: Not Available
  • Platform: Web Application
  • Title: Cahier De Texte Telecharger.PHP Directory Traversal
  • Description: Cahier De Texte is a web-based bulletin board application. It is vulnerable to a directory traversal issue due to insufficient sanitization of user-supplied input to the "chemin" parameter of the "administration/telecharger.php" script. Cahier De Texte version 2.0 is vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452600

  • 06.48.72 - CVE: Not Available
  • Platform: Web Application
  • Title: nukeai Util.PHP Remote Code Execution
  • Description: nukeai is a web-based download application. It is prone to an arbitrary code execution vulnerability because the application fails to properly sanitize user-supplied input to the "AIbasedir" parameter of the "util.php" script. The beta3 version of this application is affected.
  • Ref: http://www.securityfocus.com/bid/21284

  • 06.48.73 - CVE: Not Available
  • Platform: Web Application
  • Title: SIAP CMS Login.ASP SQL Injection
  • Description: SIAP is a web-based content management application. It is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data to the "username" parameter of the "login.asp" script before using it in an SQL query. All current versions are affected.
  • Ref: http://www.securityfocus.com/archive/1/452642

  • 06.48.74 - CVE: Not Available
  • Platform: Web Application
  • Title: WebHost Manager Multiple Cross-Site Scripting Vulnerabilities
  • Description: WebHost Manager is a web-based application for server administration. It is exposed to multiple cross-site scripting issues because it fails to sanitize user input to the various parameters of various scripts. WebHost Manager version 3.1.0 is vulnerable and others may also be affected.
  • Ref: http://www.securityfocus.com/bid/21288

  • 06.48.75 - CVE: Not Available
  • Platform: Web Application
  • Title: Sysinfo Kampus Multiple Remote File Include Vulnerabilities
  • Description: Sisfo Kampus is a web-based application. It is vulnerable to multiple remote file include issues due to insufficient sanitization of user-supplied input to the "print" and "exec" parameters of the various scripts. Sisfo Kapmus version 0.8 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21294

  • 06.48.76 - CVE: CVE-2006-6163
  • Platform: Web Application
  • Title: TikiWiki PageAlias HTML Injection
  • Description: TikiWiki is a content manager and wiki system. It is vulnerable to an HTML injection issue due to insufficient sanitization of user-supplied input to the "pageAlias" parameter of the "tiki-edit_structures.php" script. TikiWiki version 1.9.6 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21297

  • 06.48.77 - CVE: Not Available
  • Platform: Web Application
  • Title: Mambo Jambook Entry Field HTML Injection
  • Description: Jambook for Mambo is a guestbook application. It is prone to an HTML injection vulnerability because it fails to sufficiently sanitize user-supplied input to the "Entry" field when posting an entry into the guest book. Version 1.0 beta 5 is vulnerable.
  • Ref: http://www.securityfocus.com/bid/21298

  • 06.48.78 - CVE: Not Available
  • Platform: Web Application
  • Title: MBoard Orig_ID Input Validation
  • Description: MBoard is a bulletin board system. It is exposed to an input validation vulnerability because the application fails to sanitize user-supplied input to the "orig_id" parameter of unspecified scripts when message replies are posted. MBoard versions prior to 1.3 are vulnerable.
  • Ref: http://www.securityfocus.com/bid/21304

  • 06.48.79 - CVE: Not Available
  • Platform: Web Application
  • Title: Asp-Nuke Community Cookie Privilege Escalation
  • Description: Asp-Nuke Community is a content management system. It is prone to a privilege escalation vulnerability because the application allows an attacker to increase account privileges through the saved authentication session cookie. Asp-Nuke Versions 1.5 and prior are affected.
  • Ref: http://www.securityfocus.com/bid/21309

  • 06.48.80 - CVE: Not Available
  • Platform: Web Application
  • Title: Click Gallery Multiple Input Validation Vulnerabilities
  • Description: Click Gallery is an image gallery application. It is prone to multiple input validation vulnerabilities due to insufficient input sanitization. Please see the advisory for further details.
  • Ref: http://www.securityfocus.com/bid/21311

  • 06.48.81 - CVE: Not Available
  • Platform: Web Application
  • Title: Exhibit Engine Styles.PHP Remote File Include
  • Description: Exhibit Engine is a web-based photo gallery application. It is prone to a remote file include vulnerability because it fails to sufficiently sanitize user-supplied input to the "toroot" parameter of the "styles.php" script. Versions 1.22 and prior are vulnerable.
  • Ref: http://www.securityfocus.com/bid/21313

  • 06.48.82 - CVE: Not Available
  • Platform: Web Application
  • Title: Mambo Flyspray Startdown.PHP Information Disclosure
  • Description: The Mambo Flyspray add on is a bug tracking and feature request application. The application is exposed to an information disclosure issue because it fails to properly sanitize user-supplied input. Mambo Flyspray versions 1.0.1 and earlier are affected.
  • Ref: http://www.securityfocus.com/bid/21315

  • 06.48.83 - CVE: Not Available
  • Platform: Web Application
  • Title: Evolve Shopping Cart products.ASP SQL Injection
  • Description: Evolve Shopping Cart is an e-commerce application. It is exposed to an SQL injection issue because the application fails to properly sanitize user-supplied input before using it in an SQL query. Specifically, the application fails to sanitize data passed to the "partno" parameter of the "products.asp" script.
  • Ref: http://www.securityfocus.com/bid/21323

  • 06.48.84 - CVE: Not Available
  • Platform: Web Application
  • Title: b2evolution Import-MT.PHP Remote File Include Vulnerability
  • Description: b2evolution is a web blog engine. It is exposed to a remote file include issue because it fails to sufficiently sanitize user-supplied input to the "inc_path" parameter of the "import-mt.php" script. b2evolution versions 1.8.5 through 1.9 beta are affected.
  • Ref: http://www.securityfocus.com/bid/21332

  • 06.48.85 - CVE: CVE-2006-6125
  • Platform: Network Device
  • Title: NetGear WG311v1 Wireless Driver SSID Heap Buffer Overflow
  • Description: NetGear WG311v1 Wireless device is vulnerable to a heap based buffer overflow issue when the driver attempts to process a malformed probe response frame containing an excessively long "SSID" field. Version 2.3.1.10 of the WG311v1ND5.SYS driver is vulnerable.
  • Ref: http://projects.info-pull.com/mokb/MOKB-22-11-2006.html

  • 06.48.86 - CVE: Not Available
  • Platform: Network Device
  • Title: GNU Radius SQLLog Remote Format String
  • Description: GNU Radius is a free implementation of a Radius server. It is vulnerable to a remote format string issue due to improper passing of data to the variable argument function "sqllog()". GNU Radius versions 1.2 and 1.3 are vulnerable.
  • Ref: http://www.securityfocus.com/archive/1/452789

(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (Darwin)

iD8DBQFFdH4D+LUG5KFpTkYRAkxuAKCUu+O3FL8fRBo1NE9dmsr8Z8vPFACgifZk cPH1DV08A8uOzeWdJsG7evQ= =fb6S -----END PGP SIGNATURE-----