what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

iss.summary.6.5

iss.summary.6.5
Posted Apr 9, 2001
Site xforce.iss.net

ISS Security Alert Summary for April 5, 2001 - Volume 6 Number 5. 80 new vulnerabilities were reported this month. This document has links to more information and full advisories on each. Includes: palm-debug-bypass-password, exchange-malformed-url-dos, mailx-bo, sunftp-gain-access, winzip-zipandemail-bo, broker-ftp-delete-files, broker-ftp-list-directories, indexu-gain-access, fastream-ftp-directory-traversal, slimserve-httpd-directory-traversal, wftpd-pro-bo, irc-tkserv-bo, warftp-directory-traversal, ie-telnet-execute-commands, cisco-aironet-web-access, netscape-directory-server-bo, proftpd-postinst-root, proftpd-var-symlink, man2html-remote-dos, linux-eperl-bo, novell-netware-unauthorized-access, sgmltools-symlink, hp-asecure-dos, ascdc-afterstep-bo, iis-webdav-dos, websweeper-http-dos, foldoc-cgi-execute-commands, slrn-wrapping-bo, mutt-imap-format-string, formmail-anonymous-flooding, halflife-config-file-bo, halflife-exec-bo, halflife-map-bo, halflife-map-format-string, ikonboard-cgi-read-files, timed-remote-dos, imap-ipop2d-ipop3d-bo, rwhod-remote-dos, snmpd-argv-bo, mesa-utahglx-symlink, ftpfs-bo, solaris-snmpxdmid-bo, vbulletin-php-elevate-privileges, mdaemon-webservices-dos, ssh-ssheloop-dos, eudora-html-execute-code, aspseek-scgi-bo, hslctf-http-dos, licq-url-execute-commands, superscout-bypass-filtering, dgux-lpsched-bo, rediplus-weak-security, fcheck-open-execute-commands, ntmail-long-url-dos, vim-elevate-privileges, ufs-ext2fs-data-disclosure, microsoft-invalid-digital-certificates, akopia-interchange-gain-access, solaris-perfmon-create-files, win-userdmp-insecure-permission, compaq-wbm-bypass-proxy, mdaemon-imap-command-dos, hp-newgrp-additional-privileges, lan-suite-webprox-dos, weblogic-browse-directories, solaris-tip-bo, sonicwall-ike-shared-keys, anaconda-clipper-directory-traversal, visual-studio-vbtsql-bo, sco-openserver-deliver-bo, sco-openserver-lpadmin-bo, sco-openserver-lpforms-bo, sco-openserver-lpshut-bo, sco-openserver-lpusers-bo, sco-openserver-recon-bo, sco-openserver-sendmail-bo, inframail-post-dos, cisco-vpn-telnet-dos, website-pro-remote-dos, and win-compressed-password-recovery.

tags | remote, web, cgi, root, php, vulnerability, imap
systems | cisco, linux, solaris
SHA-256 | 60fe83921f94894a09c676373d0623af6b51e719ce9ecd75f68f018ab5f57856

iss.summary.6.5

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Alert Summary
April 5, 2001
Volume 6 Number 5

X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To
receive these Alert Summaries as well as other Alerts and Advisories,
subscribe to the Internet Security Systems Alert mailing list at:
http://xforce.iss.net/maillists/index.php

This summary can be found at http://xforce.iss.net/alerts/vol-6_num-5.php

_____

Contents:
* 80 Reported Vulnerabilities
* Risk Factor Key
_____

Date Reported: 03/01/2001
Brief Description: Palm OS Debug Mode allows attacker to bypass password
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Palm OS 3.5.2, Palm OS 3.3
Vulnerability: palm-debug-bypass-password
X-Force URL: http://xforce.iss.net/static/6196.php

Date Reported: 03/01/2001
Brief Description: Microsoft Exchange malformed URL request could cause a
denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Microsoft Exchange 2000
Vulnerability: exchange-malformed-url-dos
X-Force URL: http://xforce.iss.net/static/6172.php

Date Reported: 03/02/2001
Brief Description: Mailx buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: OpenLinux 2.4, OpenLinux 2.3, Linux Debian 2.2
Vulnerability: mailx-bo
X-Force URL: http://xforce.iss.net/static/6181.php

Date Reported: 03/02/2001
Brief Description: SunFTP allows attackers to gain unauthorized file access
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SunFTP 1.0 Build 9
Vulnerability: sunftp-gain-access
X-Force URL: http://xforce.iss.net/static/6195.php

Date Reported: 03/02/2001
Brief Description: WinZip /zipandemail option buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Windows 2000 All versions, Winzip 8.0, Windows NT All
versions
Vulnerability: winzip-zipandemail-bo
X-Force URL: http://xforce.iss.net/static/6191.php

Date Reported: 03/04/2001
Brief Description: Broker FTP Server allows remote attacker to delete files
outside the FTP root
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Broker FTP Server All versions
Vulnerability: broker-ftp-delete-files
X-Force URL: http://xforce.iss.net/static/6190.php

Date Reported: 03/04/2001
Brief Description: Broker FTP allows remote user to list directories outside
the FTP root
Risk Factor: High
Attack Type: Network Based
Platforms Affected: Broker FTP Server All versions
Vulnerability: broker-ftp-list-directories
X-Force URL: http://xforce.iss.net/static/6189.php

Date Reported: 03/04/2001
Brief Description: INDEXU allows attackers to gain unauthorized system access
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: INDEXU 2.0beta and earlier
Vulnerability: indexu-gain-access
X-Force URL: http://xforce.iss.net/static/6202.php

Date Reported: 03/04/2001
Brief Description: Fastream FTP++ Client allows user to download files outside
of Web root directory
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Fastream FTP++ Server 2.0
Vulnerability: fastream-ftp-directory-traversal
X-Force URL: http://xforce.iss.net/static/6187.php

Date Reported: 03/04/2001
Brief Description: SlimServe HTTPd directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: SlimServe HTTPd 1.1 and earlier
Vulnerability: slimserve-httpd-directory-traversal
X-Force URL: http://xforce.iss.net/static/6186.php

Date Reported: 03/04/2001
Brief Description: WFTPD Pro buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: WFTPD Pro 3.00
Vulnerability: wftpd-pro-bo
X-Force URL: http://xforce.iss.net/static/6184.php

Date Reported: 03/05/2001
Brief Description: IRCd tkserv buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: IRCd All versions, tkserv 1.3.0 and earlier
Vulnerability: irc-tkserv-bo
X-Force URL: http://xforce.iss.net/static/6193.php

Date Reported: 03/06/2001
Brief Description: War FTPD could allow attackers to list directories outside
the FTP root
Risk Factor: High
Attack Type: Network Based
Platforms Affected: WarFTPD 1.67b4
Vulnerability: warftp-directory-traversal
X-Force URL: http://xforce.iss.net/static/6197.php

Date Reported: 03/06/2001
Brief Description: Internet Explorer could allow execution of commands when
used with Telnet
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Internet Explorer 5.5, Services for Unix 2.0, Windows NT All
versions, Windows 2000 All versions, Internet Explorer 5.01
Vulnerability: ie-telnet-execute-commands
X-Force URL: http://xforce.iss.net/static/6230.php

Date Reported: 03/07/2001
Brief Description: Cisco Aironet Web access allows remote attacker to
view/modify configuration
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Aironet 340 Series Wireless Bridge Firmware 8.07, Aironet
340 Series Wireless Bridge Firmware 8.24, Aironet 340 Series
Wireless Bridge Firmware 7.x
Vulnerability: cisco-aironet-web-access
X-Force URL: http://xforce.iss.net/static/6200.php

Date Reported: 03/07/2001
Brief Description: Netscape Directory Server buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Netscape Directory Server 4.1, Netscape Directory Server
4.12, Windows NT All versions
Vulnerability: netscape-directory-server-bo
X-Force URL: http://xforce.iss.net/static/6233.php

Date Reported: 03/07/2001
Brief Description: Proftpd contains configuration error in postinst script when
running as root
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Linux Debian 2.2
Vulnerability: proftpd-postinst-root
X-Force URL: http://xforce.iss.net/static/6208.php

Date Reported: 03/07/2001
Brief Description: proftpd /var symlink
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Linux Debian 2.2
Vulnerability: proftpd-var-symlink
X-Force URL: http://xforce.iss.net/static/6209.php

Date Reported: 03/07/2001
Brief Description: man2html remote denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: man2html prior to 1.5.23
Vulnerability: man2html-remote-dos
X-Force URL: http://xforce.iss.net/static/6211.php

Date Reported: 03/07/2001
Brief Description: Linux ePerl buffer overflow
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1,
ePerl prior to 2.2.14, Linux Debian 2.2, Linux Mandrake 7.1
Vulnerability: linux-eperl-bo
X-Force URL: http://xforce.iss.net/static/6198.php

Date Reported: 03/08/2001
Brief Description: Novell NetWare could allow attackers to gain unauthorized
access
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Novell NetWare 4.01, Novell NetWare 5.1, Novell NetWare 3.1,
Novell NetWare 4.11, Novell NetWare 5.0
Vulnerability: novell-netware-unauthorized-access
X-Force URL: http://xforce.iss.net/static/6215.php

Date Reported: 03/08/2001
Brief Description: Linux sgml-tools symlink attack
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Linux Mandrake Corporate Server 1.0.1, sgml-tools prior to
1.0.9-15, Linux Mandrake 7.2, Linux Immunix OS 6.2, Linux
Immunix OS 7.0 Beta, Linux Mandrake 6.0, Linux Mandrake 6.1,
Linux Red Hat 7.0, Linux Red Hat 6.2, Linux Debian 2.2,
Linux Mandrake 7.1, Linux Red Hat 5.2
Vulnerability: sgmltools-symlink
X-Force URL: http://xforce.iss.net/static/6201.php

Date Reported: 03/08/2001
Brief Description: HP-UX asecure denial of service
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: HP-UX 10.10, HP-UX 10.20, HP-UX 11, HP-UX 10.01
Vulnerability: hp-asecure-dos
X-Force URL: http://xforce.iss.net/static/6212.php

Date Reported: 03/08/2001
Brief Description: ascdc Afterstep buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: ascdc 0.3
Vulnerability: ascdc-afterstep-bo
X-Force URL: http://xforce.iss.net/static/6204.php

Date Reported: 03/08/2001
Brief Description: Microsoft IIS WebDAV denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: IIS 5.0
Vulnerability: iis-webdav-dos
X-Force URL: http://xforce.iss.net/static/6205.php

Date Reported: 03/08/2001
Brief Description: WEBsweeper HTTP request denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: WEBsweeper 4.0, Windows NT All versions
Vulnerability: websweeper-http-dos
X-Force URL: http://xforce.iss.net/static/6214.php

Date Reported: 03/09/2001
Brief Description: FOLDOC allows remote attackers to execute commands
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: FOLDEC All versions
Vulnerability: foldoc-cgi-execute-commands
X-Force URL: http://xforce.iss.net/static/6217.php

Date Reported: 03/09/2001
Brief Description: slrn newsreader wrapping/unwrapping buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Linux Immunix OS 7.0 Beta, Linux Debian 2.2, Linux Red Hat
7.0, Linux Immunix OS 6.2, Linux Red Hat 6.0, Linux Red Hat
6.1, Linux Red Hat 6.2
Vulnerability: slrn-wrapping-bo
X-Force URL: http://xforce.iss.net/static/6213.php

Date Reported: 03/09/2001
Brief Description: Linux mutt package contains format string when using IMAP
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1,
Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0,
Linux Mandrake 7.0, Linux Mandrake 7.1, Linux Conectiva,
Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2,
Linux Red Hat 5.2
Vulnerability: mutt-imap-format-string
X-Force URL: http://xforce.iss.net/static/6235.php

Date Reported: 03/10/2001
Brief Description: FormMail could be used to flood servers with anonymous email
Risk Factor: High
Attack Type: Network Based
Platforms Affected: FormMail 1.0 to 1.6, Linux All versions
Vulnerability: formmail-anonymous-flooding
X-Force URL: http://xforce.iss.net/static/6242.php

Date Reported: 03/11/2001
Brief Description: Half-Life Server config file buffer overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Half-Life Dedicated Server All versions
Vulnerability: halflife-config-file-bo
X-Force URL: http://xforce.iss.net/static/6221.php

Date Reported: 03/11/2001
Brief Description: Half-Life Server exec command buffer overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Half-Life Dedicated Server All versions
Vulnerability: halflife-exec-bo
X-Force URL: http://xforce.iss.net/static/6219.php

Date Reported: 03/11/2001
Brief Description: Half-Life Server map command buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Half-Life Dedicated Server All versions
Vulnerability: halflife-map-bo
X-Force URL: http://xforce.iss.net/static/6218.php

Date Reported: 03/11/2001
Brief Description: Half-Life Server 'map' command format string
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Half-Life Dedicated Server All versions
Vulnerability: halflife-map-format-string
X-Force URL: http://xforce.iss.net/static/6220.php

Date Reported: 03/11/2001
Brief Description: Ikonboard allows remote attackers to read files
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Ikonboard 2.1.7b and earlier
Vulnerability: ikonboard-cgi-read-files
X-Force URL: http://xforce.iss.net/static/6216.php

Date Reported: 03/12/2001
Brief Description: timed daemon remote denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Linux SuSE 7.1, Linux Mandrake 7.2, Linux SuSE 7.0, Linux-
Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux
Mandrake 6.1, FreeBSD 4.x, Linux Mandrake 7.0, Linux SuSE
6.1, Linux Mandrake 7.1, FreeBSD 3.x, Linux SuSE 6.3, Linux
SuSE 6.4, Linux SuSE 6.2
Vulnerability: timed-remote-dos
X-Force URL: http://xforce.iss.net/static/6228.php

Date Reported: 03/12/2001
Brief Description: imap, ipop2d and ipop3d buffer overflows
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: OpenLinux eServer 2.3.1, OpenLinux eBuilder for ECential
3.0, OpenLinux eDesktop 2.4, OpenLinux 2.3, Linux SuSE 6.1,
Linux Conectiva
Vulnerability: imap-ipop2d-ipop3d-bo
X-Force URL: http://xforce.iss.net/static/6269.php

Date Reported: 03/12/2001
Brief Description: rwhod remote denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: FreeBSD 3.x, FreeBSD 4.x, Unix All versions
Vulnerability: rwhod-remote-dos
X-Force URL: http://xforce.iss.net/static/6229.php

Date Reported: 03/13/2001
Brief Description: SunOS snmpd argv[0] buffer overflow
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms Affected: SunOS 5.8
Vulnerability: snmpd-argv-bo
X-Force URL: http://xforce.iss.net/static/6239.php

Date Reported: 03/13/2001
Brief Description: Mesa utah-glx symbolic link
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Mesa prior to 3.3-14, Linux Mandrake 7.2
Vulnerability: mesa-utahglx-symlink
X-Force URL: http://xforce.iss.net/static/6231.php

Date Reported: 03/14/2001
Brief Description: Linux FTPfs buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Linux 2.2.x, FTPfs 0.1.1
Vulnerability: ftpfs-bo
X-Force URL: http://xforce.iss.net/static/6234.php

Date Reported: 03/15/2001
Brief Description: Solaris snmpXdmid malformed DMI request buffer overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Solaris 7, Solaris 8, Solaris 2.6
Vulnerability: solaris-snmpxdmid-bo
X-Force URL: http://xforce.iss.net/static/6245.php

Date Reported: 03/15/2001
Brief Description: vBulletin PHP Web forum allows attackers to gain elevated
privileges
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: vBulletin 1.1.5 and earlier, vBulletin 2.0beta2 and earlier,
Windows All versions, Unix All versions
Vulnerability: vbulletin-php-elevate-privileges
X-Force URL: http://xforce.iss.net/static/6237.php

Date Reported: 03/15/2001
Brief Description: MDaemon WorldClient Web services denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Windows NT All versions, Windows 2000 All versions, Mdaemon
3.5.6
Vulnerability: mdaemon-webservices-dos
X-Force URL: http://xforce.iss.net/static/6240.php

Date Reported: 03/16/2001
Brief Description: SSH ssheloop.c denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: SSH for Windows Server 2.4, SSH for Windows Server 2.5,
Windows All versions
Vulnerability: ssh-ssheloop-dos
X-Force URL: http://xforce.iss.net/static/6241.php

Date Reported: 03/18/2001
Brief Description: Eudora HTML emails could allow remote execution of code
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Windows All versions, Eudora 5.0.2
Vulnerability: eudora-html-execute-code
X-Force URL: http://xforce.iss.net/static/6262.php

Date Reported: 03/19/2001
Brief Description: ASPSeek s.cgi buffer overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Linux All versions, ASPSeek 1.0.3 and earlier
Vulnerability: aspseek-scgi-bo
X-Force URL: http://xforce.iss.net/static/6248.php

Date Reported: 03/20/2001
Brief Description: HSLCTF HTTP denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: AIX All versions, Unix All versions, HSLCTF 1.0
Vulnerability: hslctf-http-dos
X-Force URL: http://xforce.iss.net/static/6250.php

Date Reported: 03/20/2001
Brief Description: LICQ received URL execute commands
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Linux Mandrake Corporate Server 1.0.1, LICQ All, Linux
Mandrake 7.1, Linux Red Hat 7.0, Linux Mandrake 7.2
Vulnerability: licq-url-execute-commands
X-Force URL: http://xforce.iss.net/static/6261.php

Date Reported: 03/20/2001
Brief Description: SurfControl SuperScout allows user to bypass filtering rules
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: SurfControl SuperScout 3.0.2 and prior, Windows NT 4.0,
Windows 2000 All versions
Vulnerability: superscout-bypass-filtering
X-Force URL: http://xforce.iss.net/static/6300.php

Date Reported: 03/20/2001
Brief Description: DGUX lpsched buffer overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: DG/UX All versions
Vulnerability: dgux-lpsched-bo
X-Force URL: http://xforce.iss.net/static/6258.php

Date Reported: 03/20/2001
Brief Description: REDIPlus stock trading software stores passwords in
plaintext
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: REDIPlus 1.0, Windows All versions
Vulnerability: rediplus-weak-security
X-Force URL: http://xforce.iss.net/static/6276.php

Date Reported: 03/20/2001
Brief Description: FCheck open() function allows the execution of commands
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO All versions, FCheck prior to 2.07.59, SunOS All
versions, Windows All versions, Unix All versions, HP-UX All
versions, Linux All versions, Solaris All versions, AIX All
versions, BSD All versions
Vulnerability: fcheck-open-execute-commands
X-Force URL: http://xforce.iss.net/static/6256.php

Date Reported: 03/20/2001
Brief Description: NTMail long URL denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Windows 2000 All versions, NTMail 6, Windows NT 4.0
Vulnerability: ntmail-long-url-dos
X-Force URL: http://xforce.iss.net/static/6249.php

Date Reported: 03/21/2001
Brief Description: VIM text editor allows attackers to gain elevated privileges
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: VIM All versions, Linux Red Hat 5.2, Linux Red Hat 6.2,
Linux Red Hat 7.0
Vulnerability: vim-elevate-privileges
X-Force URL: http://xforce.iss.net/static/6259.php

Date Reported: 03/22/2001
Brief Description: FreeBSD UFS/EXT2FS could allow disclosure of deleted data
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: UFS All versions, EXT2FS All versions, FreeBSD All versions
Vulnerability: ufs-ext2fs-data-disclosure
X-Force URL: http://xforce.iss.net/static/6268.php

Date Reported: 03/22/2001
Brief Description: Microsoft invalid digital certificates could be used for
spoofing
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Windows ME All versions, Windows 95 All versions, Windows 98
All versions, Windows 2000 All versions, Windows NT All
versions
Vulnerability: microsoft-invalid-digital-certificates
X-Force URL: http://xforce.iss.net/static/6265.php

Date Reported: 03/23/2001
Brief Description: Akopia Interchange could allow attacker to gain
administrative access
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Akopia Interchange 4.5.3 and 4.6.3
Vulnerability: akopia-interchange-gain-access
X-Force URL: http://xforce.iss.net/static/6273.php

Date Reported: 03/23/2001
Brief Description: Solaris /opt/JSParm/bin/perfmon allows user to create files
with root privileges
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Solaris 2.x
Vulnerability: solaris-perfmon-create-files
X-Force URL: http://xforce.iss.net/static/6267.php

Date Reported: 03/23/2001
Brief Description: Windows user.dmp file insecure permissions
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Windows NT All versions, Windows 2000 All versions
Vulnerability: win-userdmp-insecure-permission
X-Force URL: http://xforce.iss.net/static/6275.php

Date Reported: 03/23/2001
Brief Description: Compaq Web-enabled management software could allow users to
bypass proxy settings
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Compaq Web-Enabled Management All versions
Vulnerability: compaq-wbm-bypass-proxy
X-Force URL: http://xforce.iss.net/static/6264.php

Date Reported: 03/25/2001
Brief Description: MDaemon IMAP SELECT and EXAMINE command denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Windows All versions, Mdaemon 3.5.6
Vulnerability: mdaemon-imap-command-dos
X-Force URL: http://xforce.iss.net/static/6279.php

Date Reported: 03/25/2001
Brief Description: HP-UX 11.11 newgrp(1) command allows users to gain additional privileges
Risk Factor: High
Attack Type: Host Based
Platforms Affected: HP-UX 11.11
Vulnerability: hp-newgrp-additional-privileges
X-Force URL: http://xforce.iss.net/static/6282.php

Date Reported: 03/26/2001
Brief Description: 602Pro LAN SUITE webprox.dll denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Windows All versions, 602Pro LAN SUITE 2000a All versions
Vulnerability: lan-suite-webprox-dos
X-Force URL: http://xforce.iss.net/static/6281.php

Date Reported: 03/26/2001
Brief Description: BEA WebLogic Server could allow attackers to browse Web
directories
Risk Factor: High
Attack Type: Network Based
Platforms Affected: WebLogic Server 6.0, Windows All versions
Vulnerability: weblogic-browse-directories
X-Force URL: http://xforce.iss.net/static/6283.php

Date Reported: 03/27/2001
Brief Description: Solaris tip buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Solaris 8, Solaris 2.5.1, Solaris 2.6, Solaris 7
Vulnerability: solaris-tip-bo
X-Force URL: http://xforce.iss.net/static/6284.php

Date Reported: 03/27/2001
Brief Description: SonicWALL IKE pre-shared key is 48 bytes instead of 128
bytes
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: SonicWALL TELE2 6.0.0, SonicWALL SOHO2 6.0.0
Vulnerability: sonicwall-ike-shared-keys
X-Force URL: http://xforce.iss.net/static/6304.php

Date Reported: 03/27/2001
Brief Description: Anaconda Foundation Clipper directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Anaconda Foundation Clipper 3.3
Vulnerability: anaconda-clipper-directory-traversal
X-Force URL: http://xforce.iss.net/static/6286.php

Date Reported: 03/27/2001
Brief Description: Microsoft Visual Studio VB-TSQL buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Windows 2000 All versions, Microsoft Visual Studio 6.0
Enterprise Ed., Windows NT All versions
Vulnerability: visual-studio-vbtsql-bo
X-Force URL: http://xforce.iss.net/static/6288.php

Date Reported: 03/27/2001
Brief Description: SCO OpenServer deliver buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO OpenServer 5.0.6
Vulnerability: sco-openserver-deliver-bo
X-Force URL: http://xforce.iss.net/static/6302.php

Date Reported: 03/27/2001
Brief Description: SCO OpenServer lpadmin buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO OpenServer 5.0.6
Vulnerability: sco-openserver-lpadmin-bo
X-Force URL: http://xforce.iss.net/static/6291.php

Date Reported: 03/27/2001
Brief Description: SCO OpenServer lpforms buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO OpenServer 5.0.6
Vulnerability: sco-openserver-lpforms-bo
X-Force URL: http://xforce.iss.net/static/6293.php

Date Reported: 03/27/2001
Brief Description: SCO OpenServer lpshut buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO OpenServer 5.0.6
Vulnerability: sco-openserver-lpshut-bo
X-Force URL: http://xforce.iss.net/static/6290.php

Date Reported: 03/27/2001
Brief Description: SCO OpenServer lpusers buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO OpenServer 5.0.6
Vulnerability: sco-openserver-lpusers-bo
X-Force URL: http://xforce.iss.net/static/6292.php

Date Reported: 03/27/2001
Brief Description: SCO OpenServer recon buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO OpenServer 5.0.6
Vulnerability: sco-openserver-recon-bo
X-Force URL: http://xforce.iss.net/static/6289.php

Date Reported: 03/27/2001
Brief Description: SCO OpenServer sendmail buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO OpenServer 5.0.6
Vulnerability: sco-openserver-sendmail-bo
X-Force URL: http://xforce.iss.net/static/6303.php

Date Reported: 03/28/2001
Brief Description: Inframail POST command denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Windows All versions, Inframail 3.97a and earlier, Linux All
versions
Vulnerability: inframail-post-dos
X-Force URL: http://xforce.iss.net/static/6297.php

Date Reported: 03/28/2001
Brief Description: Cisco VPN 3000 Concentrators Telnet denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Cisco VPN 3000 Concentrators prior to 3.0.00
Vulnerability: cisco-vpn-telnet-dos
X-Force URL: http://xforce.iss.net/static/6298.php

Date Reported: 03/28/2001
Brief Description: WebSite Professional remote manager service denial of
service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: O'Reilly WebSite Pro 3.0.37
Vulnerability: website-pro-remote-dos
X-Force URL: http://xforce.iss.net/static/6295.php

Date Reported: 03/28/2001
Brief Description: Windows Me and Plus! 98 could allow the recovery of
Compressed Folder passwords
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Windows 98 All versions, Windows 98 Second Edition, Windows
ME All versions
Vulnerability: win-compressed-password-recovery
X-Force URL: http://xforce.iss.net/static/6294.php

_____

Risk Factor Key:

High Any vulnerability that provides an attacker with immediate
access into a machine, gains superuser access, or bypasses
a firewall. Example: A vulnerable Sendmail 8.6.5 version
that allows an intruder to execute commands on mail
server.
Medium Any vulnerability that provides information that has a
high potential of giving system access to an intruder.
Example: A misconfigured TFTP or vulnerable NIS server
that allows an intruder to get the password file that
could contain an account with a guessable password.
Low Any vulnerability that provides information that
potentially could lead to a compromise. Example: A
finger that allows an intruder to find out who is online
and potential accounts to attempt to crack passwords
via brute force methods.

________


Internet Security Systems is the leading global provider of security
management solutions for the Internet, protecting digital assets and
ensuring safe and uninterrupted e-business. With its industry-leading
intrusion detection and vulnerability assessment, remote managed security
services, and strategic consulting and education offerings, ISS is a
trusted security provider to more than 8,000 customers worldwide including
21 of the 25 largest U.S. commercial banks and the top 10 U.S.
telecommunications companies. Founded in 1994, ISS is headquartered in
Atlanta, GA, with additional offices throughout North America and
international operations in Asia, Australia, Europe, Latin America and the
Middle East. For more information, visit the Internet Security Systems web
site at www.iss.net or call 888-901-7477.

Copyright (c) 2001 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express consent
of the X-Force. If you wish to reprint the whole or any part of this Alert
in any other medium excluding electronic medium, please e-mail
xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.



X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as
well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net
of Internet Security Systems, Inc.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBOszkuDRfJiV99eG9AQFlewP8C6v84pW6UR171S6OThwkg/P7ylXIMY3P
jO+w8ohAvbsa90iLFMlGo6YY0pIKSwlacQErryVFfVcRLQ1gIQhBxoIQlwrNkB6m
XWnhroR/R7rzatML9cnHzpQKUK7Hax3LSxdxZQQwIDISxBZ4aeOTQwD+seuIos8t
8PVD8c9UO3g=
=1xgg
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    35 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close