[AusNOG] AusCERT Week in Review - Week Ending 12/05/2006

matthew at auscert.org.au matthew at auscert.org.au
Fri May 12 17:32:57 EST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

The following is a summary of what we have pushed to our subscribers for
the past week.

I hope this is of some use.  As usual - feedback appreciated and thanks
for the feedback given so far.

Best regards,

- -- Matthew McGlashan --
Coordination Centre Team Leader             | Hotline: +61 7 3365 4417
Australian Computer Emergency Response Team | Direct:  +61 7 3365 7924
(AusCERT)                                   | Fax:     +61 7 3365 7031
The University of Queensland                | WWW:     www.auscert.org.au
Qld 4072 Australia                          | Email: auscert at auscert.org.au

AusCERT Week in Review
12 May 2006


Papers, Articles and other documents:
- -------------------------------------


Alerts, Advisories and Updates:
- -------------------------------
Title: AL-2006.0039 -- [OSX] -- APPLE-SA-2006-05-11 Security Update 2006-003 
Date:  12 May 2006
URL:   http://www.auscert.org.au/6300

Title: AA-2006.0029 -- [Win][OSX] -- Dreamweaver generated websites - server
       behaviour SQL injection vulnerabilities 
Date:  11 May 2006
URL:   http://www.auscert.org.au/6295

Title: AA-2006.0028 -- [Win] -- Novell Client for Windows 2000/XP/2003 buffer
       overflow vulnerability in DPRPCW32.DLL 
Date:  10 May 2006
URL:   http://www.auscert.org.au/6293

Title: AU-2006.0014 -- AusCERT Update - [Win] - MS06-018 MSDTC vulnerability
       impact is denial of service 
Date:  10 May 2006
URL:   http://www.auscert.org.au/6292

Title: AL-2006.0038 -- [Win] -- MS06-020 - Vulnerabilities in Macromedia Flash
       Player from Adobe Could Allow Remote Code Execution 
Date:  10 May 2006
URL:   http://www.auscert.org.au/6286

Title: AL-2006.0037 -- [Win] -- MS06-019 - Vulnerability in Microsoft Exchange
       Could Allow Remote Code Execution 
Date:  10 May 2006
URL:   http://www.auscert.org.au/6285

Title: AL-2006.0036 -- [Win][UNIX/Linux][Mac] -- Sophos multiple desktop and
       gateway AV products vulnerable to remote code execution scanning CAB
       files 
Date:  09 May 2006
URL:   http://www.auscert.org.au/6280

Title: AA-2006.0027 -- [UNIX/Linux] -- rsync 2.6.8 release fixes buffer
       overflow in extended attribute support 
Date:  08 May 2006
URL:   http://www.auscert.org.au/6276

Title: AA-2006.0026 -- [Win][UNIX/Linux] -- AWStats vulnerability allows
       remote execution of arbitrary commands 
Date:  08 May 2006
URL:   http://www.auscert.org.au/6273

Title: AL-2006.0035 -- [Win][UNIX/Linux] -- PHP release fixes multiple
       vulnerabilities 
Date:  08 May 2006
URL:   http://www.auscert.org.au/6272


External Security Bulletins:
- ----------------------------
Title: ESB-2006.0336 -- [Win] -- Verisign i-Nav ActiveX Control Code Execution
       Vulnerability 
Date:  12 May 2006
OS:    Windows
URL:   http://www.auscert.org.au/6301

Title: ESB-2006.0335 -- [Win][OSX] -- QuickTime 7.1 update fixes multiple
       buffer overflow vulnerabilities 
Date:  12 May 2006
OS:    Windows 2000, Windows XP, Mac OS X 
URL:   http://www.auscert.org.au/6299

Title: ESB-2006.0334 -- [Debian] -- New Mozilla Firefox packages fix arbitrary
       code execution 
Date:  11 May 2006
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/6296

Title: ESB-2006.0333 -- [Cisco] -- AVS TCP Relay Vulnerability 
Date:  11 May 2006
OS:    Cisco Products 
URL:   http://www.auscert.org.au/6294

Title: ESB-2006.0332 -- [Debian] -- New TIFF packages fix denial of service
       and arbitrary code execution 
Date:  10 May 2006
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/6291

Title: ESB-2006.0331 -- [Debian] -- New Mozilla packages fix arbitrary code
       execution 
Date:  10 May 2006
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/6290

Title: ESB-2006.0330 -- [Win][UNIX/Linux] -- Moderate: ruby security update 
Date:  10 May 2006
OS:    UNIX Variants, Windows
URL:   http://www.auscert.org.au/6289

Title: ESB-2006.0329 -- [UNIX/Linux][RedHat] -- Important: libtiff security
       update 
Date:  10 May 2006
OS:    UNIX Variants
URL:   http://www.auscert.org.au/6288

Title: ESB-2006.0328 -- [Win] -- MS06-018 - Vulnerability in Microsoft
       Distributed Transaction Coordinator Could Allow Denial of Service 
Date:  10 May 2006
OS:    Windows XP, Windows 2000, Windows 2003 
URL:   http://www.auscert.org.au/6287

Title: ESB-2006.0327 -- [Solaris] -- A Security Vulnerability in the "libike"
       Library May Potentially Cause a Denial of Service to the in.iked(1M)
       Daemon 
Date:  09 May 2006
OS:    Solaris 
URL:   http://www.auscert.org.au/6284

Title: ESB-2006.0326 -- [z/OS] -- Computer Associates multiple z/OS products
       CAIRIM LMP SVC vulnerability 
Date:  09 May 2006
URL:   http://www.auscert.org.au/6283

Title: ESB-2006.0325 -- [Win] -- Cisco Secure ACS for Windows - Administrator
       Password Disclosure 
Date:  09 May 2006
OS:    Windows 2003, Windows 2000, Windows XP 
URL:   http://www.auscert.org.au/6279

Title: ESB-2006.0324 -- [Cisco] -- PIX/ASA/FWSM Websense/N2H2 Content Filter
       Bypass 
Date:  09 May 2006
OS:    Cisco Products 
URL:   http://www.auscert.org.au/6278

Title: ESB-2006.0323 -- [Win][Linux][Solaris] -- Symantec Scan Engine fails to
       properly perform authentication 
Date:  08 May 2006
OS:    Windows 2003, Windows 2000, Linux, Solaris
URL:   http://www.auscert.org.au/6277

Title: ESB-2006.0322 -- [UNIX/Linux][Debian] -- New cgiirc packages fix
       arbitrary code execution 
Date:  08 May 2006
OS:    UNIX Variants
URL:   http://www.auscert.org.au/6275

Title: ESB-2006.0321 -- [UNIX/Linux] -- Nagios 2.3 released fixing CGI remote
       buffer overflow 
Date:  08 May 2006
OS:    UNIX Variants
URL:   http://www.auscert.org.au/6274

Title: ESB-2006.0320 -- [Solaris] -- Security Vulnerability in the Xorg(1)
       Version of the Render Extension 
Date:  08 May 2006
OS:    Solaris 
URL:   http://www.auscert.org.au/6271

Title: ESB-2006.0287 -- [SCO] -- GhostScript Insecure Temporary File Creation
       Vulnerability 
Date:  11 May 2006
URL:   http://www.auscert.org.au/6228


===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert at auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)
Comment: http://www.auscert.org.au/render.html?it=1967
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRGQ6KSh9+71yA2DNAQKUewP/X3czoxRl0BHBjxPN9S5miyIiwb00m8Ij
7OgZHdKDkww5ESr1YrOjaXdEeUST1F/JcCyPvP/aBuvv5lOhcAlgIFrTJrucCXbn
jxx29hrlH3+AJ180HvgUFLf/zPw5Cb0Uzb/aZQIE9FFpyVeBKEBumVNuUTzS57mG
lr/GChSB/Ds=
=PVJ6
-----END PGP SIGNATURE-----




More information about the AusNOG mailing list