>
> *****************************
> Widely-Deployed Software
> *****************************
>
> (1) HIGH: Adobe Acrobat Reader Browser Plugin Multiple Vulnerabilities
> Affected:
> Adobe Acrobat Browser Plugin version 7 and prior
>
> Description: The Adobe Acrobat Reader Browser Plugin, used to read
> Portable Document Format (PDF) documents inside web browsers, contains
> multiple vulnerabilities in the parsing of URLs pointing to PDF files.
> An attacker could exploit these vulnerabilities by including a
> specially-crafted "open parameters" in an URL pointing to any PDF
> document.
>
> "Open parameters" are used to pass addition parameters to the Adobe
> reader, and are placed in the "fragment" portion of the link (the
> portion of the link specified after the '#' sign).
> (1) By passing a "javascript" URL to various open parameters, an
> attacker could execute arbitrary javascript in the context of the web
> site hosting the PDF. Hence, this flaw can be exploited to
> steal cookies
> and user credentials for any web site that is hosting a PDF file. The
> flaw is believed to affect only Mozilla browsers.
> (2) By passing a URL to the various open parameters, an attacker can
> cause a web browser to send a request to any arbitrary web-accessible
> resource. This vulnerability affects most web browsers, including
> Mozilla browsers and Microsoft Internet Explorer. For example, an
> attacker could send a request to "example.net" by having a user click
> on the link "http://example.com/evil.pdf#http://example.net/".
> (3) A memory corruption vulnerability can be triggered by calling
> "document.write" via javascript with special parameters. This
> vulnerability affects Mozilla browsers, and is believed to be
> exploitable for remote code execution (not confirmed).
>
> Status: Adobe has confirmed, updates available.
>
> Council Site Actions: Two of the reporting council sites are using the
> affected software. They both plan to deploy the patch during
> their next
> regularly schedule maintenance cycle.
>
> References:
> Wisec Security Advisory
> http://www.wisec.it/vulns.php?page=9
> Slashdot Discussion
> http://it.slashdot.org/article.pl?sid=07/01/03/2050206
> Posting by pdp
> http://www.webappsec.org/lists/websecurity/archive/2007-01/msg
> 00005.html
> GNUCITIZEN Blog Posting
> http://www.gnucitizen.org/blog/danger-danger-danger/
> Adobe Documentation on Open Parameters
> http://partners.adobe.com/public/developer/en/acrobat/PDFOpenP
> arameters.pdf
> Subverting Ajax
> http://www.wisec.it/Download/Projects/1158-Subverting_Ajax.pdf
> Wikipedia Article on URI Schemes (includes information on URI syntax)
> http://en.wikipedia.org/wiki/URI_scheme
> Adobe Home Page
> http://www.adobe.com
> SecurityFocus BIDs
> http://www.securityfocus.com/bid/21858
> http://www.securityfocus.com/bid/21910
>
> **************************************************************
> **************************************************************
> ***************
>
> (5) MODERATE: OpenOffice.org/StarOffice Multiple WMF Parsing
> Vulnerabilities
> Affected:
> OpenOffice.org versions prior to 2.1.0
> StarOffice versions 6, 7, and 8
>
> Description: OpenOffice.org (a popular open source office suite) and
> StarOffice (a commercial office suite based on the same code base)
> contain multiple vulnerabilities in the parsing of Windows
> Media Player
> (WMF) files. A specially-crafted Windows Media file could
> exploit these
> vulnerabilities and execute arbitrary code with the privileges of the
> current user. Note that, by default, Windows Media files are
> not opened
> by the these applications. Some technical details for these
> vulnerabilities are available, and because OpenOffice.org is open
> source, further details can be gained through source code analysis.
>
> Status: OpenOffice.org and StarOffice confirmed, updates available.
>
> Council Site Actions: The affected software and/or
> configuration are not
> in production or widespread use, or are not officially
> supported at any
> of the council sites. They reported that no action was necessary.
>
> References:
> Posting by NGSSoftware
> http://archives.neohapsis.com/archives/vulnwatch/2007-q1/0002.html
> Posting by David Litchfield
> http://archives.neohapsis.com/archives/bugtraq/2007-01/0125.html
> Posting by Jua-Matti Laurio
> http://archives.neohapsis.com/archives/fulldisclosure/2007-01/
> 0077.html
> Red Hat Security Advisory
> https://rhn.redhat.com/errata/RHSA-2007-0001.html
> SecuriTeam Blog Posting
> http://blogs.securiteam.com/?p=785
> SecurityFocus BID
> http://www.securityfocus.com/bid/21861
>
>
> ______________________________________________________________________
>
> 07.2.9 CVE: CVE-2006-5749
> Platform: Linux
> Title: Linux Kernel Unspecified Remote Vulnerability
> Description: The Linux kernel is prone to an unspecified vulnerability
> that affects the "isdn_ppp_ccp_reset_alloc_state()" function of
> "drivers/isdn/i4l/isdn_ppp.c". Linux kernel versions prior to 2.4.34
> are vulnerable to this issue.
> Ref: http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34
> ______________________________________________________________________
> ______________________________________________________________________
>
> 07.2.12 CVE: CVE-2007-0015
> Platform: Cross Platform
> Title: QuickTime RTSP URI Remote Buffer Overflow
> Description: Apple QuickTime is prone to a remote buffer
> overflow issue.
> When URIs with the "RTSP" scheme containing
> specifically-formatted data
> are loaded, a memory buffer may be overrun with
> attacker-supplied data.
> Apple QuickTime versions 7.2.3 and earlier are vulnerable.
> Ref: http://projects.info-pull.com/moab/MOAB-01-01-2007.html
> ______________________________________________________________________