[AusNOG] AusCERT Week in Review - Week Ending 29/05/2009 (AUSCERT#20073f686)

Paul Fahey paul at auscert.org.au
Fri May 29 15:58:23 EST 2009


Alerts, Advisories and Updates:

-------------------------------

Title: AA-2009.0130 -- [Win][UNIX/Linux] -- ImageMagick: Execute Arbitrary

       Code 

Date:  28 May 2009

URL:   http://www.auscert.org.au/11058

 

Title: AU-2009.0023 -- AusCERT Update - [Win] - Microsoft Security Bulletin

       (MS09-003) Major Revision 

Date:  28 May 2009

URL:   http://www.auscert.org.au/11056

 

Title: AL-2009.0041 -- [Win] -- Possible authentication bypass vulnerability

       in IIS6 

Date:  27 May 2009

URL:   http://www.auscert.org.au/11001

 

Title: AA-2009.0125 -- [Win] -- BlackBerry Enterprise Server: Execute

       Arbitrary Code 

Date:  27 May 2009

URL:   http://www.auscert.org.au/11050

 

Title: AA-2009.0126 -- [Win] -- Microsoft Windows Vista and Server 2008

       Service Pack 2 is now available 

Date:  27 May 2009

URL:   http://www.auscert.org.au/11051

 

Title: AA-2009.0127 -- [Win] -- Nortel Contact Center Manager: Inappropriate

       Access 

Date:  27 May 2009

URL:   http://www.auscert.org.au/11052

 

Title: AA-2009.0128 -- [Win][UNIX/Linux] -- DotNetNuke: Execute Arbitrary
Code

Date:  27 May 2009

URL:   http://www.auscert.org.au/11053

 

Title: AA-2009.0129 -- [Win][UNIX/Linux] -- libsndfile: Execute Arbitrary
Code

Date:  27 May 2009

URL:   http://www.auscert.org.au/11054

 

Title: AA-2009.0122 -- [Win] -- Panda Security: Reduced Security 

Date:  26 May 2009

URL:   http://www.auscert.org.au/11042

 

Title: AA-2009.0123 -- [Win][Linux][AIX] -- IBM WebSphere Partner Gateway:

       Access Confidential Data 

Date:  26 May 2009

URL:   http://www.auscert.org.au/11044

 

Title: AA-2009.0124 -- [Win][UNIX/Linux] -- Wireshark: Denial of Service 

Date:  26 May 2009

URL:   http://www.auscert.org.au/11046

 

 

External Security Bulletins:

----------------------------

Title: ESB-2008.1053 -- [Solaris] -- A Buffer Overflow Security
Vulnerability

       in the Solaris sadmind(1M) Daemon May Lead to Execution of Arbitrary

       Code 

Date:  25 May 2009

OS:    Solaris 

URL:   http://www.auscert.org.au/10085

 

Title: ESB-2009.0512 -- [Win] -- Citrix Password Manager: Inappropriate
Access

Date:  29 May 2009

OS:    Windows 2003, Windows 2000, Windows XP, Windows Server 2008, Windows

       Vista 

URL:   http://www.auscert.org.au/11060

 

Title: ESB-2009.0511 -- [Win][UNIX/Linux] -- Ajax Session (Drupal
third-party

       module): Cross-site Request Forgery 

Date:  29 May 2009

OS:    Windows Vista, AIX, HP-UX, Mac OS X, Red Hat Linux, Windows Server

       2008, Windows XP, Other Linux Variants, FreeBSD, Windows 2000,
OpenBSD,

       Windows 2003, IRIX, Other BSD Variants, Debian GNU/Linux, Ubuntu, HP

       Tru64 UNIX, Solaris 

URL:   http://www.auscert.org.au/11059

 

Title: ESB-2009.0510 -- [Win][Netware][UNIX/Linux][RedHat] -- httpd: Execute

       Arbitrary Code 

Date:  28 May 2009

OS:    Solaris, HP Tru64 UNIX, Debian GNU/Linux, Other BSD Variants, IRIX,

       Windows 2003, OpenBSD, FreeBSD, Other Linux Variants, Windows XP,

       Windows Server 2008, Red Hat Linux, Novell Netware, HP-UX, AIX,
Windows

       Vista 

URL:   http://www.auscert.org.au/11057

 

Title: ESB-2009.0509 -- [HP-UX] -- HP-UX Running Java: Multiple

       Vulnerabilities 

Date:  28 May 2009

OS:    HP-UX 

URL:   http://www.auscert.org.au/11055

 

Title: ESB-2009.0508 -- [RedHat] -- Red Hat Application Stack v2.3: Execute

       Arbitrary Code 

Date:  27 May 2009

OS:    Red Hat Linux 

URL:   http://www.auscert.org.au/11049

 

Title: ESB-2009.0507 -- [RedHat] -- squirrelmail: Execute Arbitrary Code 

Date:  27 May 2009

OS:    Red Hat Linux 

URL:   http://www.auscert.org.au/11048

 

Title: ESB-2009.0506 -- [RedHat] -- rhpki-ra: Inappropriate Access 

Date:  27 May 2009

OS:    Red Hat Linux 

URL:   http://www.auscert.org.au/11047

 

Title: ESB-2009.0505 -- [SUSE] -- IBM JDK 5: Multiple Vulnerabilities 

Date:  26 May 2009

OS:    Other Linux Variants 

URL:   http://www.auscert.org.au/11043

 

Title: ESB-2009.0504 -- [RedHat] -- freetype: Execute Arbitrary Code 

Date:  25 May 2009

OS:    Red Hat Linux 

URL:   http://www.auscert.org.au/11041

 

Title: ESB-2009.0503 -- [UNIX/Linux][Debian] -- cscope: Execute Arbitrary
Code

Date:  25 May 2009

OS:    Solaris, HP Tru64 UNIX, Ubuntu, Debian GNU/Linux, Other BSD Variants,

       IRIX, OpenBSD, FreeBSD, Other Linux Variants, Red Hat Linux, Mac OS
X,

       HP-UX, AIX 

URL:   http://www.auscert.org.au/11040

 

Title: ESB-2009.0502 -- [RedHat] -- pidgin: Multiple Vulnerabilities 

Date:  25 May 2009

OS:    Red Hat Linux 

URL:   http://www.auscert.org.au/11039

 

Title: ESB-2009.0501 -- [Win][UNIX/Linux][Debian] -- pidgin: Execute
Arbitrary

       Code 

Date:  25 May 2009

OS:    Solaris, HP Tru64 UNIX, Ubuntu, Debian GNU/Linux, Other BSD Variants,

       IRIX, Windows 2003, OpenBSD, Windows 2000, FreeBSD, Other Linux

       Variants, Windows XP, Windows Server 2008, Red Hat Linux, Mac OS X,

       HP-UX, AIX, Windows Vista 

URL:   http://www.auscert.org.au/11038

 

Title: ESB-2009.0500 -- [Solaris] -- sadmind(1M) Daemon: Execute Arbitrary

       Code 

Date:  25 May 2009

OS:    Solaris 

URL:   http://www.auscert.org.au/11037

 

Title: ESB-2009.0499 -- [OpenSolaris] -- Solaris Secure Digital Slot Driver:

       Execute Arbitrary Code 

Date:  25 May 2009

OS:    Solaris 

URL:   http://www.auscert.org.au/11036

 

Title: ESB-2009.0498 -- [Linux][Solaris] -- Sun Java System Portal Server:

       Execute Arbitrary Code 

Date:  25 May 2009

OS:    Solaris, Ubuntu, Debian GNU/Linux, Other Linux Variants, Red Hat
Linux 

URL:   http://www.auscert.org.au/11035

 

 

 

===========================================================================

Australian Computer Emergency Response Team

The University of Queensland

Brisbane

Qld 4072

 

Internet Email: auscert at auscert.org.au

Facsimile:      (07) 3365 7031

Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)

                AusCERT personnel answer during Queensland business hours

                which are GMT+10:00 (AEST).

                On call after hours for member emergencies only.

===========================================================================

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20090529/f351a656/attachment.html>


More information about the AusNOG mailing list