what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Internet Security Systems Security Alert Summary May 10, 2001

Internet Security Systems Security Alert Summary May 10, 2001
Posted May 16, 2001
Site xforce.iss.net

This advisory holds 120 vulnerabilities.

tags | remote, web, kernel, cgi, perl, php, javascript, tcp, vulnerability, activex
systems | cisco, linux, unix, solaris, irix
SHA-256 | 00cf12d8a5a8701f90a38c209a88b00c8028def67321206fa40aca19a90f593d

Internet Security Systems Security Alert Summary May 10, 2001

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Alert Summary
May 10, 2001
Volume 6 Number 6

X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To
receive these Alert Summaries as well as other Alerts and Advisories,
subscribe to the Internet Security Systems Alert mailing list at:
http://xforce.iss.net/maillists/index.php

This summary can be found at:
http://xforce.iss.net/alerts/vol-6_num-6.php

_____

Contents:
* 120 Reported Vulnerabilities
* Risk Factor Key
_____


Date Reported: 04/02/2001
Brief Description: The Bat! masked file type in email attachment
could allow execution of code
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: The Bat! 1.49 and earlier
Vulnerability: thebat-masked-file-type
X-Force URL: http://xforce.iss.net/static/6324.php

Date Reported: 04/02/2001
Brief Description: PHP-Nuke could allow attackers to redirect ad
banner URL links
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: PHP-Nuke 4.4 and earlier
Vulnerability: php-nuke-url-redirect
X-Force URL: http://xforce.iss.net/static/6342.php

Date Reported: 04/03/2001
Brief Description: Orinoco RG-1000 Residential Gateway default SSID
reveals WEP encryption key
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Orinoco Residential Gateway RG-1000
Vulnerability: orinoco-rg1000-wep-key
X-Force URL: http://xforce.iss.net/static/6328.php

Date Reported: 04/03/2001
Brief Description: Navision Financials server denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Navision Financials 2.5 and 2.6
Vulnerability: navision-server-dos
X-Force URL: http://xforce.iss.net/static/6318.php

Date Reported: 04/03/2001
Brief Description: uStorekeeper online shopping system allows
remote file retrieval
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: uStorekeeper 1.61
Vulnerability: ustorekeeper-retrieve-files
X-Force URL: http://xforce.iss.net/static/6319.php

Date Reported: 04/03/2001
Brief Description: Resin server allows remote attackers to view
Javabean files
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Resin 1.2.x, Resin 1.3b1
Vulnerability: resin-view-javabean
X-Force URL: http://xforce.iss.net/static/6320.php

Date Reported: 04/03/2001
Brief Description: BPFTP could allow attackers to obtain login
credentials
Risk Factor: High
Attack Type: Network Based
Platforms Affected: BPFTP 2.0
Vulnerability: bpftp-obtain-credentials
X-Force URL: http://xforce.iss.net/static/6330.php

Date Reported: 04/04/2001
Brief Description: Ntpd server readvar control message buffer
overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6, AIX 5.1,
Slackware Linux 7.1, Engarde Secure Linux 1.0.1,
Progeny Linux, SuSE Linux 7.1, ntpd 4.0.99k and
earlier, FreeBSD 4.2-Stable, Mandrake Linux
Corporate Server 1.0.1, Mandrake Linux 7.2,
Trustix Secure Linux, Immunix Linux 7.0,
NetBSD 1.5, SuSE Linux 7.0, Caldera OpenLinux
eServer 2.3.1
Vulnerability: ntpd-remote-bo
X-Force URL: http://xforce.iss.net/static/6321.php

Date Reported: 04/04/2001
Brief Description: Cisco CSS debug mode allows users to gain
administrative access
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Cisco Content Services Switch 11050, Cisco
Content Services Switch 11150, Cisco Content
Services Switch 11800
Vulnerability: cisco-css-elevate-privileges
X-Force URL: http://xforce.iss.net/static/6322.php

Date Reported: 04/04/2001
Brief Description: BEA Tuxedo may allow access to remote services
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: BEA Tuxedo 7.1
Vulnerability: bea-tuxedo-remote-access
X-Force URL: http://xforce.iss.net/static/6326.php

Date Reported: 04/05/2001
Brief Description: Ultimate Bulletin Board could allow attackers to
bypass authentication
Risk Factor: High
Attack Type: Network Based
Platforms Affected: Ultimate Bulletin Board 5.43, Ultimate Bulletin
Board 5.4.7e
Vulnerability: ultimatebb-bypass-authentication
X-Force URL: http://xforce.iss.net/static/6339.php

Date Reported: 04/05/2001
Brief Description: BinTec X4000 NMAP denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: BinTec X4000 5.1.6P10 and prior, BinTec X1000,
BinTec X1200
Vulnerability: bintec-x4000-nmap-dos
X-Force URL: http://xforce.iss.net/static/6323.php

Date Reported: 04/05/2001
Brief Description: WatchGuard Firebox II kernel denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: WatchGuard Firebox II prior to 4.6
Vulnerability: firebox-kernel-dos
X-Force URL: http://xforce.iss.net/static/6327.php

Date Reported: 04/06/2001
Brief Description: Cisco PIX denial of service due to multiple
TACACS+ requests
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Cisco PIX Firewall 5.1.4
Vulnerability: cisco-pix-tacacs-dos
X-Force URL: http://xforce.iss.net/static/6353.php

Date Reported: 04/06/2001
Brief Description: Darren Reed's IP Filter allows attackers to
access UDP and TCP ports
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: IP Filter 3.4.16
Vulnerability: ipfilter-access-ports
X-Force URL: http://xforce.iss.net/static/6331.php

Date Reported: 04/06/2001
Brief Description: Veritas NetBackup nc (netcat) command denial of
service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: NetBackup 3.2
Vulnerability: veritas-netbackup-nc-dos
X-Force URL: http://xforce.iss.net/static/6329.php

Date Reported: 04/08/2001
Brief Description: PGP may allow malicious users to access
authenticated split keys
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: PGP 7.0
Vulnerability: nai-pgp-split-keys
X-Force URL: http://xforce.iss.net/static/6341.php

Date Reported: 04/09/2001
Brief Description: Solaris kcms_configure command line buffer
overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Solaris 7, Solaris 8
Vulnerability: solaris-kcms-command-bo
X-Force URL: http://xforce.iss.net/static/6359.php

Date Reported: 04/09/2001
Brief Description: TalkBack CGI script could allow remote attackers
to read files on the Web server
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: TalkBack prior to 1.2
Vulnerability: talkback-cgi-read-files
X-Force URL: http://xforce.iss.net/static/6340.php

Date Reported: 04/09/2001
Brief Description: Multiple FTP glob(3) implementation
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: FreeBSD 4.2, Solaris 8, IRIX 6.5.x, OpenBSD 2.8,
HP-UX 11.00, NetBSD
Vulnerability: ftp-glob-implementation
X-Force URL: http://xforce.iss.net/static/6333.php

Date Reported: 04/09/2001
Brief Description: Pine mail client temp file symbolic link
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Pine prior to 4.33, Red Hat Linux 5.2, Red Hat
Linux 6.2, Red Hat Linux 7.0
Vulnerability: pine-tmp-file-symlink
X-Force URL: http://xforce.iss.net/static/6367.php

Date Reported: 04/09/2001
Brief Description: Multiple FTP glob(3) expansion
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: HP-UX 11.00, NetBSD, Solaris 8, IRIX 6.5.x,
OpenBSD 2.8, FreeBSD 4.2, MIT Kerberos 5
Vulnerability: ftp-glob-expansion
X-Force URL: http://xforce.iss.net/static/6332.php

Date Reported: 04/09/2001
Brief Description: Netscape embedded JavaScript in GIF file
comments can be used to access remote data
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms Affected: Netscape Communicator 4.76, Red Hat Linux 6.2,
Debian Linux 2.2, Conectiva Linux, Red Hat Linux
7.0, Immunix Linux 6.2, Immunix Linux 7.0 Beta,
Red Hat Linux 7.1
Vulnerability: netscape-javascript-access-data
X-Force URL: http://xforce.iss.net/static/6344.php

Date Reported: 04/09/2001
Brief Description: STRIP generates weak passwords
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: STRIP 0.5 and earlier
Vulnerability: strip-weak-passwords
X-Force URL: http://xforce.iss.net/static/6362.php

Date Reported: 04/10/2001
Brief Description: Solaris Xsun HOME environment variable buffer
overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Solaris 7
Vulnerability: solaris-xsun-home-bo
X-Force URL: http://xforce.iss.net/static/6343.php

Date Reported: 04/10/2001
Brief Description: Compaq Presario Active X denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Compaq Presario, Windows 98, Windows ME
Vulnerability: compaq-activex-dos
X-Force URL: http://xforce.iss.net/static/6355.php

Date Reported: 04/10/2001
Brief Description: Alcatel ADSL modems 'EXPERT' account
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Alcatel ADSL Network Termination Device 1000,
Alcatel Speed Touch ADSL modem Home
Vulnerability: alcatel-expert-account
X-Force URL: http://xforce.iss.net/static/6354.php

Date Reported: 04/10/2001
Brief Description: Alcatel ADSL modems allow attacker on LAN to
gain access using TFTP
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Alcatel ADSL Network Termination Device 1000,
Alcatel Speed Touch ADSL modem Home
Vulnerability: alcatel-tftp-lan-access
X-Force URL: http://xforce.iss.net/static/6336.php

Date Reported: 04/10/2001
Brief Description: Alcatel ADSL modems allow attacker on WAN to
gain access using TFTP
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Alcatel ADSL Network Termination Device 1000,
Alcatel Speed Touch ADSL modem Home
Vulnerability: alcatel-tftp-wan-access
X-Force URL: http://xforce.iss.net/static/6337.php

Date Reported: 04/10/2001
Brief Description: Oracle Application Server shared library
(ndwfn4.so) buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: iPlanet Web Server 4.x, Oracle Application
Server 4.0.8.2
Vulnerability: oracle-appserver-ndwfn4-bo
X-Force URL: http://xforce.iss.net/static/6334.php

Date Reported: 04/10/2001
Brief Description: Alcatel ADSL modems use blank password by
default
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Alcatel ADSL Network Termination Device 1000,
Alcatel Speed Touch ADSL modem Home
Vulnerability: alcatel-blank-password
X-Force URL: http://xforce.iss.net/static/6335.php

Date Reported: 04/11/2001
Brief Description: Solaris dtsession buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Solaris 7
Vulnerability: solaris-dtsession-bo
X-Force URL: http://xforce.iss.net/static/6366.php

Date Reported: 04/11/2001
Brief Description: Solaris kcsSUNWIOsolf.so buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Solaris 7, Solaris 8
Vulnerability: solaris-kcssunwiosolf-bo
X-Force URL: http://xforce.iss.net/static/6365.php

Date Reported: 04/11/2001
Brief Description: Lightwave ConsoleServer brute force password
attack
Risk Factor: High
Attack Type: Network Based
Platforms Affected: Lightwave ConsoleServer 3200
Vulnerability: lightwave-consoleserver-brute-force
X-Force URL: http://xforce.iss.net/static/6345.php

Date Reported: 04/11/2001
Brief Description: nph-maillist allows user to execute code
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Email List Generator 3.5 and earlier
Vulnerability: nph-maillist-execute-code
X-Force URL: http://xforce.iss.net/static/6363.php

Date Reported: 04/11/2001
Brief Description: Symantec Ghost Configuration Server denial of
service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Ghost 6.5
Vulnerability: ghost-configuration-server-dos
X-Force URL: http://xforce.iss.net/static/6357.php

Date Reported: 04/11/2001
Brief Description: Lotus Domino Web Server DOS device denial of
service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Lotus Domino R5 prior to 5.0.7
Vulnerability: lotus-domino-device-dos
X-Force URL: http://xforce.iss.net/static/6348.php

Date Reported: 04/11/2001
Brief Description: Lotus Domino Web Server HTTP header denial of
service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Lotus Domino R5 prior to 5.0.7
Vulnerability: lotus-domino-header-dos
X-Force URL: http://xforce.iss.net/static/6347.php

Date Reported: 04/11/2001
Brief Description: Lotus Domino Web Server URL parsing denial of
service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Lotus Domino R5 prior to 5.0.7
Vulnerability: lotus-domino-url-dos
X-Force URL: http://xforce.iss.net/static/6351.php

Date Reported: 04/11/2001
Brief Description: Lotus Domino Web Server CORBA denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Lotus Domino R5 prior to 5.0.7
Vulnerability: lotus-domino-corba-dos
X-Force URL: http://xforce.iss.net/static/6350.php

Date Reported: 04/11/2001
Brief Description: Symantec Ghost database engine denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Ghost 6.5, Sybase Adaptive Server Database
Engine 6.0.3.2747
Vulnerability: ghost-database-engine-dos
X-Force URL: http://xforce.iss.net/static/6356.php

Date Reported: 04/11/2001
Brief Description: cfingerd daemon remote format string
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Debian Linux 2.1, Debian Linux 2.2, cfingerd
1.4.3 and earlier
Vulnerability: cfingerd-remote-format-string
X-Force URL: http://xforce.iss.net/static/6364.php

Date Reported: 04/11/2001
Brief Description: Lotus Domino Web Server Unicode denial of
service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Lotus Domino R5 prior to 5.0.7
Vulnerability: lotus-domino-unicode-dos
X-Force URL: http://xforce.iss.net/static/6349.php

Date Reported: 04/11/2001
Brief Description: Linux mkpasswd generates weak passwords
Risk Factor: High
Attack Type: Host Based
Platforms Affected: Red Hat Linux 6.2, Red Hat Linux 7.0, mkpasswd
Vulnerability: mkpasswd-weak-passwords
X-Force URL: http://xforce.iss.net/static/6382.php

Date Reported: 04/12/2001
Brief Description: Solaris ipcs utility buffer overflow
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms Affected: Solaris 7
Vulnerability: solaris-ipcs-bo
X-Force URL: http://xforce.iss.net/static/6369.php

Date Reported: 04/12/2001
Brief Description: InterScan VirusWall ISADMIN service buffer
overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Linux kernel , InterScan VirusWall 3.0.1
Vulnerability: interscan-viruswall-isadmin-bo
X-Force URL: http://xforce.iss.net/static/6368.php

Date Reported: 04/12/2001
Brief Description: HylaFAX hfaxd format string
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: HylaFAX 4.1B3 and prior, SuSE Linux 6.x, SuSE
Linux 7.0, Mandrake Linux 7.1, FreeBSD 3.5.1,
Mandrake Linux 7.2, Mandrake Linux Corporate
Server 1.0.1, FreeBSD 4.2, SuSE Linux 7.1
Vulnerability: hylafax-hfaxd-format-string
X-Force URL: http://xforce.iss.net/static/6377.php

Date Reported: 04/12/2001
Brief Description: Cisco VPN 3000 Concentrators invalid IP Option
denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Cisco VPN 3000 Concentrators prior to 2.5.2 F
Vulnerability: cisco-vpn-ip-dos
X-Force URL: http://xforce.iss.net/static/6360.php

Date Reported: 04/13/2001
Brief Description: Net.Commerce package in IBM WebSphere reveals
installation path
Risk Factor: High
Attack Type: Network Based
Platforms Affected: IBM Websphere, Solaris 2.6, AIX 4.3.x, Solaris
7, Windows NT 4.0
Vulnerability: ibm-websphere-reveals-path
X-Force URL: http://xforce.iss.net/static/6371.php

Date Reported: 04/13/2001
Brief Description: QPC ftpd buffer overflow
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms Affected: QVT/Term 5.0, QVT/Net 5.0
Vulnerability: qpc-ftpd-bo
X-Force URL: http://xforce.iss.net/static/6376.php

Date Reported: 04/13/2001
Brief Description: QPC ftpd directory traversal
Risk Factor: High
Attack Type: Network Based
Platforms Affected: QVT/Net 5.0, QVT/Term 5.0
Vulnerability: qpc-ftpd-directory-traversal
X-Force URL: http://xforce.iss.net/static/6375.php

Date Reported: 04/13/2001
Brief Description: QPC popd buffer overflow
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms Affected: QVT/Net 5.0
Vulnerability: qpc-popd-bo
X-Force URL: http://xforce.iss.net/static/6374.php

Date Reported: 04/13/2001
Brief Description: NCM Content Management System access database
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: NCM Content Management System
Vulnerability: ncm-content-database-access
X-Force URL: http://xforce.iss.net/static/6386.php

Date Reported: 04/13/2001
Brief Description: Netscape SmartDownload 'sdph20.dll' buffer overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Netscape SmartDownload 1.3, Windows NT, Windows
95, Windows 98
Vulnerability: netscape-smartdownload-sdph20-bo
X-Force URL: http://xforce.iss.net/static/6403.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer accept buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-accept-bo
X-Force URL: http://xforce.iss.net/static/6404.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer cancel buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-cancel-bo
X-Force URL: http://xforce.iss.net/static/6406.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer disable buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-disable-bo
X-Force URL: http://xforce.iss.net/static/6407.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer enable buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-enable-bo
X-Force URL: http://xforce.iss.net/static/6409.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer lp buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-lp-bo
X-Force URL: http://xforce.iss.net/static/6410.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer lpfilter buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-lpfilter-bo
X-Force URL: http://xforce.iss.net/static/6411.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer lpstat buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-lpstat-bo
X-Force URL: http://xforce.iss.net/static/6413.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer reject buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-reject-bo
X-Force URL: http://xforce.iss.net/static/6414.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer rmail buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-rmail-bo
X-Force URL: http://xforce.iss.net/static/6415.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer tput buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-tput-bo
X-Force URL: http://xforce.iss.net/static/6416.php

Date Reported: 04/13/2001
Brief Description: IBM WebSphere CGI macro denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: IBM Websphere, Windows NT 4.0, Solaris 2.6, AIX
4.3.x, Solaris 7
Vulnerability: ibm-websphere-macro-dos
X-Force URL: http://xforce.iss.net/static/6372.php

Date Reported: 04/13/2001
Brief Description: SCO OpenServer lpmove buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: SCO Openserver 5.0.0 to 5.0.6
Vulnerability: sco-openserver-lpmove-bo
X-Force URL: http://xforce.iss.net/static/6412.php

Date Reported: 04/14/2001
Brief Description: Siemens Reliant Unix ppd -T symlink
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Reliant Unix 5.45, Reliant Unix 5.43, Reliant
Unix 5.44
Vulnerability: reliant-unix-ppd-symlink
X-Force URL: http://xforce.iss.net/static/6408.php

Date Reported: 04/15/2001
Brief Description: Linux Exuberant Ctags package symbolic link
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Debian Linux 2.2, exuberant-ctags
Vulnerability: exuberant-ctags-symlink
X-Force URL: http://xforce.iss.net/static/6388.php

Date Reported: 04/15/2001
Brief Description: processit.pl CGI could allow attackers to view
sensitive information about the Web server
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: processit.pl
Vulnerability: processit-cgi-view-info
X-Force URL: http://xforce.iss.net/static/6385.php

Date Reported: 04/16/2001
Brief Description: Microsoft ISA Server Web Proxy denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Microsoft ISA Server 2000
Vulnerability: isa-web-proxy-dos
X-Force URL: http://xforce.iss.net/static/6383.php

Date Reported: 04/16/2001
Brief Description: Microsoft Internet Explorer altering CLSID
action allows malicious file execution
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Windows 2000, Internet Explorer 5.5, Windows 98
Vulnerability: ie-clsid-execute-files
X-Force URL: http://xforce.iss.net/static/6426.php

Date Reported: 04/16/2001
Brief Description: Cisco Catalyst 5000 series switch 802.1x denial
of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Cisco Catalyst 5000 Series
Vulnerability: cisco-catalyst-8021x-dos
X-Force URL: http://xforce.iss.net/static/6379.php

Date Reported: 04/16/2001
Brief Description: BubbleMon allows users to gain elevated
privileges
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: BubbleMon prior to 1.32, FreeBSD
Vulnerability: bubblemon-elevate-privileges
X-Force URL: http://xforce.iss.net/static/6378.php

Date Reported: 04/16/2001
Brief Description: DCForum CGI az= field directory traversal
Risk Factor: High
Attack Type: Network Based
Platforms Affected: DCForum 2000 1.0
Vulnerability: dcforum-az-directory-traversal
X-Force URL: http://xforce.iss.net/static/6391.php

Date Reported: 04/16/2001
Brief Description: DCForum CGI az= field allows attacker to upload
files
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: DCForum 2000 1.0
Vulnerability: dcforum-az-file-upload
X-Force URL: http://xforce.iss.net/static/6393.php

Date Reported: 04/16/2001
Brief Description: DCForum CGI az= field EXPR allows attacker to
execute commands
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: DCForum 2000 1.0
Vulnerability: dcforum-az-expr
X-Force URL: http://xforce.iss.net/static/6392.php

Date Reported: 04/16/2001
Brief Description: Linux NetFilter IPTables
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: Linux kernel 2.4, Red Hat Linux 7.1
Vulnerability: linux-netfilter-iptables
X-Force URL: http://xforce.iss.net/static/6390.php

Date Reported: 04/17/2001
Brief Description: Xitami Web server denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Xitami Web server 2.4d7, Xitami Web server 2.5b4
Vulnerability: xitami-server-dos
X-Force URL: http://xforce.iss.net/static/6389.php

Date Reported: 04/17/2001
Brief Description: Samba tmpfile symlink attack could allow
elevated privileges
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Trustix Secure Linux 1.2, Mandrake Linux 8.0,
Progeny Linux, Caldera OpenLinux eBuilder,
Trustix Secure Linux 1.01, Mandrake Linux
Corporate Server 1.0.1, FreeBSD 4.2, Immunix
Linux 7.0, Immunix Linux 6.2, Immunix Linux 7.0
Beta, Caldera OpenLinux eServer 2.3.1, Caldera
OpenLinux eDesktop 2.4, FreeBSD 3.5.1
Vulnerability: samba-tmpfile-symlink
X-Force URL: http://xforce.iss.net/static/6396.php

Date Reported: 04/17/2001
Brief Description: GoAhead WebServer "aux" denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: GoAhead Web Server 2.1, Windows 98, Windows ME
Vulnerability: goahead-aux-dos
X-Force URL: http://xforce.iss.net/static/6400.php

Date Reported: 04/17/2001
Brief Description: AnalogX SimpleServer:WWW "aux" denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: SimpleServer:WWW 1.03 to 1.08
Vulnerability: analogx-simpleserver-aux-dos
X-Force URL: http://xforce.iss.net/static/6395.php

Date Reported: 04/17/2001
Brief Description: Viking Server hexadecimal URL encoded format
directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Viking Server prior to 1.07-381
Vulnerability: viking-hex-directory-traversal
X-Force URL: http://xforce.iss.net/static/6394.php

Date Reported: 04/17/2001
Brief Description: Solaris FTP server allows attacker to recover
shadow file
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: Solaris 2.6
Vulnerability: solaris-ftp-shadow-recovery
X-Force URL: http://xforce.iss.net/static/6422.php

Date Reported: 04/18/2001
Brief Description: The Bat! pop3 denial of service
Risk Factor: High
Attack Type: Network Based
Platforms Affected: The Bat! 1.51, Windows
Vulnerability: thebat-pop3-dos
X-Force URL: http://xforce.iss.net/static/6423.php

Date Reported: 04/18/2001
Brief Description: Eudora allows attacker to obtain files using
plain text attachments
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Eudora 5.0.2
Vulnerability: eudora-plain-text-attachment
X-Force URL: http://xforce.iss.net/static/6431.php

Date Reported: 04/18/2001
Brief Description: VMware vmware-mount.pl symlink
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: VMware
Vulnerability: vmware-mount-symlink
X-Force URL: http://xforce.iss.net/static/6420.php

Date Reported: 04/18/2001
Brief Description: KFM tmpfile symbolic link could allow local
attackers to overwrite files
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: SuSE Linux 7.0, K File Manager (KFM)
Vulnerability: kfm-tmpfile-symlink
X-Force URL: http://xforce.iss.net/static/6428.php

Date Reported: 04/18/2001
Brief Description: CyberScheduler timezone remote buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: CyberScheduler, Mandrake Linux, Windows 2000,
IIS 5.0, Solaris 8, SuSE Linux, Solaris 7,
Slackware Linux, Red Hat Linux, IIS 4.0, Debian
Linux, Solaris 2.5, Solaris 2.6, Caldera
OpenLinux, Windows NT
Vulnerability: cyberscheduler-timezone-bo
X-Force URL: http://xforce.iss.net/static/6401.php

Date Reported: 04/18/2001
Brief Description: Microsoft Data Access Component Internet
Publishing Provider allows WebDAV access
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Microsoft Data Access Component 8.103.2519.0,
Windows 95, Windows NT 4.0, Windows 98, Windows
98 Second Edition, Windows 2000, Windows ME
Vulnerability: ms-dacipp-webdav-access
X-Force URL: http://xforce.iss.net/static/6405.php

Date Reported: 04/18/2001
Brief Description: Oracle tnslsnr80.exe denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Oracle 8.x, Windows NT 4.0 SP6, Solaris 8
Vulnerability: oracle-tnslsnr80-dos
X-Force URL: http://xforce.iss.net/static/6427.php

Date Reported: 04/18/2001
Brief Description: innfeed -c flag buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Red Hat Linux, Slackware Linux, Mandrake Linux,
INN prior to 2.3.1
Vulnerability: innfeed-c-bo
X-Force URL: http://xforce.iss.net/static/6398.php

Date Reported: 04/18/2001
Brief Description: iPlanet Calendar Server stores username and
password in plaintext
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: iPlanet Calendar Server 5.0p2
Vulnerability: iplanet-calendar-plaintext-password
X-Force URL: http://xforce.iss.net/static/6402.php

Date Reported: 04/18/2001
Brief Description: Linux NEdit symlink when printing
Risk Factor: High
Attack Type: Host Based
Platforms Affected: SuSE Linux 6.3, SuSE Linux 6.4, Debian Linux
2.2, Mandrake Linux 7.1, Mandrake Linux 7.2,
SuSE Linux 7.0, Mandrake Linux Corporate Server
1.0.1, SuSE Linux 7.1, Mandrake Linux 8.0
Vulnerability: nedit-print-symlink
X-Force URL: http://xforce.iss.net/static/6424.php

Date Reported: 04/19/2001
Brief Description: CheckBO TCP buffer overflow
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: CheckBO 1.56 and earlier
Vulnerability: checkbo-tcp-bo
X-Force URL: http://xforce.iss.net/static/6436.php

Date Reported: 04/19/2001
Brief Description: HP-UX pcltotiff uses insecure permissions
Risk Factor: Medium
Attack Type: Host Based
Platforms Affected: HP-UX 10.01, HP-UX 10.10, HP-UX 10.20,
HP-UX 10.26
Vulnerability: hp-pcltotiff-insecure-permissions
X-Force URL: http://xforce.iss.net/static/6447.php

Date Reported: 04/19/2001
Brief Description: Netopia Timbuktu allows unauthorized system
access
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Timbuktu Pro, Macintosh OS X
Vulnerability: netopia-timbuktu-gain-access
X-Force URL: http://xforce.iss.net/static/6452.php

Date Reported: 04/20/2001
Brief Description: Cisco CBOS could allow attackers to gain
privileged information
Risk Factor: High
Attack Type: Host Based / Network Based
Platforms Affected: Cisco CBOS 2.4.1, Cisco CBOS 2.3.053
Vulnerability: cisco-cbos-gain-information
X-Force URL: http://xforce.iss.net/static/6453.php

Date Reported: 04/20/2001
Brief Description: Internet Explorer 5.x allows active scripts
using XML stylesheets
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Internet Explorer 5.x, Outlook Express 5.x
Vulnerability: ie-xml-stylesheets-scripting
X-Force URL: http://xforce.iss.net/static/6448.php

Date Reported: 04/20/2001
Brief Description: Linux gftp format string
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: gftp prior to 2.0.8, Mandrake Linux 8.0,
Mandrake Linux Corporate Server 1.0.1, Immunix
Linux 7.0, Red Hat Linux 7.1, Mandrake Linux
7.2, Immunix Linux 6.2, Immunix 7.0 beta,
Red Hat Linux 6.2, Mandrake Linux 7.1, Red Hat
Linux 7.0
Vulnerability: gftp-format-string
X-Force URL: http://xforce.iss.net/static/6478.php

Date Reported: 04/20/2001
Brief Description: Novell BorderManager VPN client SYN requests
denial of service
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms Affected: Novell BorderManager 3.5
Vulnerability: bordermanager-vpn-syn-dos
X-Force URL: http://xforce.iss.net/static/6429.php

Date Reported: 04/20/2001
Brief Description: SAFT sendfiled could allow the execution of
arbitrary code
Risk Factor: Low
Attack Type: Host Based
Platforms Affected: Debian Linux 2.2, Progeny Linux, sendfile
Vulnerability: saft-sendfiled-execute-code
X-Force URL: http://xforce.iss.net/static/6430.php

Date Reported: 04/21/2001
Brief Description: Mercury MTA for Novell Netware buffer overflow
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Mercury MTA 1.47 and earlier, Novell NetWare
Vulnerability: mercury-mta-bo
X-Force URL: http://xforce.iss.net/static/6444.php

Date Reported: 04/21/2001
Brief Description: QNX allows attacker to read files on FAT
partition
Risk Factor: High
Attack Type: Host Based / Network Based
Platforms Affected: QNX 2.4
Vulnerability: qnx-fat-file-read
X-Force URL: http://xforce.iss.net/static/6437.php

Date Reported: 04/23/2001
Brief Description: Viking Server "dot dot" (\...\) directory
traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Viking Server 1.0.7
Vulnerability: viking-dot-directory-traversal
X-Force URL: http://xforce.iss.net/static/6450.php

Date Reported: 04/24/2001
Brief Description: NetCruiser Web Server could reveal directory
path
Risk Factor: High
Attack Type: Network Based
Platforms Affected: NetCruiser Web Server 0.1.2.8
Vulnerability: netcruiser-server-path-disclosure
X-Force URL: http://xforce.iss.net/static/6468.php

Date Reported: 04/24/2001
Brief Description: Perl Web Server directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Perl Web Server 0.3 and prior
Vulnerability: perl-webserver-directory-traversal
X-Force URL: http://xforce.iss.net/static/6451.php

Date Reported: 04/24/2001
Brief Description: Small HTTP Server /aux denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Small HTTP Server 2.03
Vulnerability: small-http-aux-dos
X-Force URL: http://xforce.iss.net/static/6446.php

Date Reported: 04/24/2001
Brief Description: IPSwitch IMail SMTP daemon mailing list handler
buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: IPSwitch Imail 6.06 and earlier
Vulnerability: ipswitch-imail-smtp-bo
X-Force URL: http://xforce.iss.net/static/6445.php

Date Reported: 04/25/2001
Brief Description: MIT Kerberos 5 could allow attacker to gain root
access by injecting base64-encoded data
Risk Factor: Low
Attack Type: Network Based
Platforms Affected: MIT Kerberos 5
Vulnerability: kerberos-inject-base64-encode
X-Force URL: http://xforce.iss.net/static/6454.php

Date Reported: 04/26/2001
Brief Description: IRIX netprint -n allows attacker to access
shared library
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: IRIX 6.x
Vulnerability: irix-netprint-shared-library
X-Force URL: http://xforce.iss.net/static/6473.php

Date Reported: 04/26/2001
Brief Description: WebXQ "dot dot" directory traversal
Risk Factor: High
Attack Type: Network Based
Platforms Affected: Windows, WebXQ 2.1.204
Vulnerability: webxq-dot-directory-traversal
X-Force URL: http://xforce.iss.net/static/6466.php

Date Reported: 04/26/2001
Brief Description: RaidenFTPD "dot dot" directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Windows NT 4.0, Windows 2000, RaidenFTPD 2.1
Vulnerability: raidenftpd-dot-directory-traversal
X-Force URL: http://xforce.iss.net/static/6455.php

Date Reported: 04/27/2001
Brief Description: PerlCal CGI cal_make.pl script directory
traversal
Risk Factor: High
Attack Type: Network Based
Platforms Affected: Unix, PerlCal 2.95 and prior
Vulnerability: perlcal-calmake-directory-traversal
X-Force URL: http://xforce.iss.net/static/6480.php

Date Reported: 04/28/2001
Brief Description: ICQ Web Front plugin denial of service
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: ICQ Web Front, ICQ 2000b 3278 and earlier
Vulnerability: icq-webfront-dos
X-Force URL: http://xforce.iss.net/static/6474.php

Date Reported: 04/28/2001
Brief Description: Alex FTP Server "dot dot" directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: Alex's FTP Server 0.7
Vulnerability: alex-ftp-directory-traversal
X-Force URL: http://xforce.iss.net/static/6475.php

Date Reported: 04/28/2001
Brief Description: BRS WebWeaver FTP path disclosure
Risk Factor: High
Attack Type: Network Based
Platforms Affected: BRS WebWeaver 0.63
Vulnerability: webweaver-ftp-path-disclosure
X-Force URL: http://xforce.iss.net/static/6477.php

Date Reported: 04/28/2001
Brief Description: BRS WebWeaver Web server "dot dot" directory
traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: BRS WebWeaver 0.63
Vulnerability: webweaver-web-directory-traversal
X-Force URL: http://xforce.iss.net/static/6476.php

Date Reported: 04/29/2001
Brief Description: Winamp AIP buffer overflow
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms Affected: Winamp 2.6x and 2.7x
Vulnerability: winamp-aip-bo
X-Force URL: http://xforce.iss.net/static/6479.php

Date Reported: 04/29/2001
Brief Description: BearShare "dot dot" allows remote attacker to traverse
directories and download any file
Risk Factor: Medium
Attack Type: Network Based
Platforms Affected: BearShare 2.2.2 and prior, Windows 95, Windows
98, Windows ME
Vulnerability: bearshare-dot-download-files
X-Force URL: http://xforce.iss.net/static/6481.php

Date Reported: 05/01/2001
Brief Description: IIS 5.0 ISAPI extension buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms Affected: IIS 5.0, Windows 2000 Server, Windows 2000
Advanced Server, Windows 2000 Datacenter Server
Vulnerability: iis-isapi-bo
X-Force URL: http://xforce.iss.net/static/6485.php

_____

Risk Factor Key:

High Any vulnerability that provides an attacker with immediate
access into a machine, gains superuser access, or bypasses
a firewall. Example: A vulnerable Sendmail 8.6.5 version
that allows an intruder to execute commands on mail
server.
Medium Any vulnerability that provides information that has a
high potential of giving system access to an intruder.
Example: A misconfigured TFTP or vulnerable NIS server
that allows an intruder to get the password file that
could contain an account with a guessable password.
Low Any vulnerability that provides information that
potentially could lead to a compromise. Example: A
finger that allows an intruder to find out who is online
and potential accounts to attempt to crack passwords
via brute force methods.

________


About Internet Security Systems (ISS)

Internet Security Systems is a leading global provider of security
management solutions for the Internet, protecting digital assets and
ensuring safe and uninterrupted e-business. With its industry-leading
intrusion detection and vulnerability assessment software, remote managed
security services, and strategic consulting and education offerings, ISS
is a trusted security provider to more than 8,000 customers worldwide
including 21 of the 25 largest U.S. commercial banks and the top 10 U.S.
telecommunications companies. Founded in 1994, ISS is headquartered in
Atlanta, GA, with additional offices throughout North America and
international operations in Asia, Australia, Europe, Latin America and the
Middle East. For more information, visit the Internet Security Systems
web site at www.iss.net or call 888-901-7477.

Copyright (c) 2001 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express consent
of the X-Force. If you wish to reprint the whole or any part of this Alert
in any other medium excluding electronic medium, please e-mail
xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties with regard to this information. In no event shall the
author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information. Any use of this
information is at the user's own risk.



X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as
well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net
of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBOvrtmTRfJiV99eG9AQFRFwP+NhRj20kY5edBZBvSMBZKAOKEQGpJPPnD
J/YCCB9TkzoWt65a7HR6c2MbimbnCo8YrhkjgFcvPmArCOFMS/68lhcStKd769PO
rbojCoys8l1woaFDwzPnQeWVoNMen83sVvsiy7Bwk5Sm0cjM3gZC+X0vqG8EI59Y
OAtrNiOkj7o=
=kYl+
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close