---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Roundup Multiple Vulnerabilities SECUNIA ADVISORY ID: SA29336 VERIFY ADVISORY: http://secunia.com/advisories/29336/ CRITICAL: Moderately critical IMPACT: Unknown, Security Bypass WHERE: >From remote SOFTWARE: Roundup 1.x http://secunia.com/product/17934/ DESCRIPTION: Multiple vulnerabilities and a security issue have been reported in Roundup, some of which have unknown impacts, while others can be exploited by malicious users to bypass certain security restrictions. 1) An error exists in the xml-rpc server when enforcing restrictions set on properties. This can be exploited to edit or view restricted properties via the "list", "display", and "set" methods. The security issue is reported in version 1.4.4. Other versions may also be affected. 2) Multiple vulnerabilities are caused due to an unspecified errors. No further information is currently available. The vulnerabilities are reported in versions prior to 1.4.4. SOLUTION: Update to version 1.4.4, which fixes vulnerability #2. Vulnerability #1 is fixed in the CVS repository. Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: 1) Reported by Philipp Gortan in a Roundup bug report. 2) The vendor credits Roland Meister. ORIGINAL ADVISORY: http://sourceforge.net/tracker/index.php?func=detail&aid=1907211&group_id=31577&atid=402788 http://roundup.cvs.sourceforge.net/roundup/roundup/CHANGES.txt?view=markup&content-type=text/vnd.viewcvs-markup&revision=HEAD ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------