[NT] Remote Script Execution in Tlen.pl

From: SecuriTeam (support_at_securiteam.com)
Date: 12/27/04

  • Next message: SecuriTeam: "[NEWS] Cross Site Scripting in Yacy"
    To: list@securiteam.com
    Date: 27 Dec 2004 10:13:34 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Remote Script Execution in Tlen.pl
    ------------------------------------------------------------------------

    SUMMARY

     <http://www.tlen.vel.pl/> Tlen.pl is the instant messenger application. A
    vulnerability in Tlen.pl's message parsing allows remote execution of
    arbitrary script.

    DETAILS

    Vulnerable Systems:
     * Tlen.pl Version 5.23.4.1 and prior

    Immune Systems:
     * Tlen.pl Version 5.23.4.2

    A parsing error allow a malicious user to send a string which has an URL
    inside. If the can include JavaScript code for example, the script code
    will execute when the window with the message pops up.

    Example:
    Sending the following link to any recipient:
    www.tlen.pl"style=background-image:url(javascript:alert(%22You%20are%20owned!%22));.pl

    Will cause him to open a JavaScript message box in the client's machine
    when he/she open the message window.

    Vendor Status:
    The vendor has released version 5.23.4.2 that addresses this issue.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:sloik@man.poznan.pl>
    Jaroslaw Sajko.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NEWS] Cross Site Scripting in Yacy"

    Relevant Pages

    • [NT] w3wp DoS
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... 1/12/2006 - Vendor requested for additional info ... recv(conn_socket, szBuffer, 256, 0); ...
      (Securiteam)
    • [NT] Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Trend Micro HouseCall ActiveX Control Arbitrary Code Execution ... The vulnerability is caused due to an implementation error within the ... 18/08/2008 - Vendor notified. ...
      (Securiteam)
    • [NT] Microsoft Hierarchical FlexGrid Control Integer Overflows (MS08-070)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Microsoft Hierarchical FlexGrid Control Integer Overflows ... 28/08/2007 - Vendor notified. ...
      (Securiteam)
    • [NT] Adobe PageMaker PMD File Processing Buffer Overflows
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The vulnerabilities are caused due to boundary errors when processing ... The vendor will be releasing a fix for the stack-based buffer overflow ... 02/06/2008 - Vendor asks for CVE identifier. ...
      (Securiteam)
    • [NT] CA ARCserve Backup RPC "handle_t" Argument Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... CA ARCserve Backup RPC "handle_t" Argument Vulnerability ... 24/10/2007 - Vendor notified. ... 21/05/2008 - Vendor notifies expected release in October 2008. ...
      (Securiteam)