fondo_ussr2.jpg
8f5dd29a9c917c8f957b05d144fe8132920765251312c4a8a3c07626380076e5
USSR Advisory #1 - MSN Messenger Service 1.0 uses very weak encryption. Program to break it included.
d2d0da9d6bf13f605e8b7bf59b9f0ee1a2b10fa10b2e99ce5be7b63e91aa9e44
USSR Advisory #10 - Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server Vulnerability. UssrLabs found a Local/Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server. The buffer overflow is caused by a long user name / password, 2000 characters, and the re-connection to the Ftp Server.
48cdb8c6c94cae0b517c9e90e1495f77b280ae2923c47b164fdd6f6458f53786
USSR Advisory #11 - Multiple Remote DoS vulnerability in Artisoft XtraMail v1.11 Vulnerability. UssrLabs found multiple places in XtraMail v1.11 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question.
2d38875f3bfd24e37ce26327f2e95ff06223873bbd2143ae18a596a0d77161bf
USSR Advisory #12 - Remote D.o.S Attack in G6 FTP Server v2.0 (beta 4/5) Vulnerability. ssrLabs found a Local/Remote DoS Attack in G6 FTP Server v2.0 (beta 4/5), The buffer overflow is caused by a long user name, 2000 characters.,The G6FTP start to do infinites loops in the main program, and start eating all memory and all computer resource CPU 100%, at the moment of no more memory, if this happend ALL System is down.
d22602f669d8a2c8e997b950469633fc1eb92df0eeeda233e74e10901a53e2e2
USSR Advisory #13 - Remote D.o.S Attack in ZetaMail 2.1 Mail POP3/SMTP Server Vulnerability. UssrLabs found a Local/Remote DoS Attack in ZetaMail 2.1 Mail POP3/SMTP Server. The buffer overflow is caused by a long user name/password, 3500 characters.
df87d78a6afab7c54be211b26687dd3d37692ca3ad9981166226660886fb097e
USSR Advisory #14 - Remote DoS Attack in Vermillion FTP Daemon (VFTPD) v1.23 Vulnerability. UssrLabs found a Local/Remote DoS Attack in Vermillion FTP Daemon (VFTPD) v1.23, The buffer overflow is caused by a 3 times long cwd, 504 characters.
0a9dbc77cedb76ebf4c5a2cf598b48bd696491ad61743138e801228d6aaeb8b5
USSR Advisory #15 - Multiples Remotes DoS Attacks in MDaemon Server v2.8.5.0 Vulnerability. UssrLabs found multiple places in MDaemon v2.8.5.0 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question. Afected services: WorldClient: Port 2000 WebConfig : Port 2002. This two remotes services are afected to overflow of you send a large url name.
ad1236aae0e74023dd8517250cf69e533fad1ce606aa5c5480e863cd621f5ce5
USSR Advisory #16 - Remote DoS Attack in BisonWare FTP Server V3.5 Vulnerability. UssrLabs found a Local/Remote DoS Attack in BisonWare FTP Server V3.5. The buffer overflow is caused by a long user name, 2000 characters.
306e2afae084de1154abe01af8e73e2263e022d554b818587224cd18cda03bd4
USSR Advisory #17 - Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability. UssrLabs found a Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability Using the string '../' in a URL, an attacker can gain read access to any file outside of the intended web-published filesystem directory.
2247efb7567305f9b3f50ddf74814db5596118e77f0cbe037ea0fc1541e52c52
USSR Advisory #18 - Remote DoS Attack in Serv-U FTP-Server v2.5a Vulnerability
2e6573fbf99c2d477c2a04c94087b819418c4d258fc5b9ca92b97de7ef3b31eb
USSR Advisory #19 - Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability
ea5d1c9d3c235695ef98e001b1c11037b99351027dbd18f9cb4a107191b09182
USSR Advisory #2 - WFTPD v2.40 FTPServer remotely exploitable buffer overflow vulnerability. We found in the WFTPD v2.34,v2.40 server and earlier a vulnerable to remotely exploitable buffer overflow. This can result in a denial of service and at worst in arbitrary code being executed on the system.
4dd34fc6c1616e7d27489046a0b6a07f8702281ba9bfbff756cc6acbb5bf85c7
USSR Advisory #20 - Microsoft Internet Explorer 4.x 5.x - Frame Loop Vulnerability
f65d575ea295693700bcd7b87e14bfa0928b1dfe4a1c52d060ad932f4fb6cd1b
USSR Advisory #21 - Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability
01c4afd1431fb18ba00caeba3c177717956be74f8fbaed6adb725bd2efb1214e
USSR Advisory #22 - Infoseek Ultraseek 3.1 Remote Buffer Overflow
66c91abea6577b9b9bd9eb0ccbe5010e097cd9aa768aca747787b3a092b4de89
USSR Advisory #24 - Local / Remote GET Buffer Overflow Vulnerability in ZBServer 1.5 Pro Edition for Win98/NT
4b7d011c8bfff0b9a74d315800d9f00e377f636888507350428755f2d7baffb3
USSR Advisory #25 - Rover POP3 Server V1.1 NT From aVirt and possibly others versions.
3de8930a8b1fcd7c7623c803c0ba6831ea1a9b778ae6f8b2751c8625aade8e6d
USSR Advisory #26 - Local / Remote D.o.S Attack in Savant Web Server V2.0 WIN9X / NT / 2K
7c067f397bc18a0787b106aaba2e30463c3e8dc6fe3657a0ab4ed2d6dd898a80
USSR Advisory #27 - Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A
a92cd9743c027d3a59ca1e02bc2eed0622a0cdb5bfaa6b7d24f494be50ce0147
USSR Advisory #28 - Local / Remote GET Buffer Overflow Vulnerability in CamShot WebCam HTTP Server v2.5 for Win9x/NT
9ac12878c75f8ba8517bccd76346f52ca67e337889af2d00b83b7412c05c36e8
USSR Advisory #29 - Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1
1d9a1bf0fc83833fa611354d1684929cc485da46fcb6db196fb9c089f9f43fbe
USSR Advisory #3 - ExpressFS 2.x FTPServer remotely exploitable buffer overflow vulnerability. We found in the ExpressFS 2.x FTP Server and earlier a vulnerable to remotely exploitable bufferoverflow. This can result in a denial of service and at worst in arbitrary code being executed on the system. The vulnerabilities are the conjunction of one long user name ,and another command in this case PASS, If this long command are passed in order program crash.
12b3aef634ee8434b28625ed97f4971944f68de4ea98af89495b7b723cf2d255
USSR Advisory #30 - Local / Remote D.o.S Attack in IMail IMONITOR Server for WinNT Version 5.08
365af4cc576ecb3056ca0c5bc60341711f83beeb9e105bae28bac4f93707eafd
USSR Advisory #31 - Local / Remote D.o.S Attack in Super Mail Transfer Package (SMTP) Server for WinNT Version 1.9x
857a05eb3940804ee398c51762b619c7f780298ab6a92478f29b105c6dbd95ae