ISS Security Advisory - A buffer overflow has been discovered in the line printer daemon of several BSD implementations. (in.lpd or lpd) A remote or local attacker can execute arbitrary code as root. The vulnerability presents itself when an attacker submits a specially crafted print job and then requests a display of the printer queue to trigger the overflow. Affected versions include OpenBSD CURRENT and earlier, FreeBSD 4.3 and earlier, NetBSD 1.5.1 and earlier, and BSD/OS 4.1 and earlier.
7585435d2dff29c86e3097c97aed447cd260d501d502447697a7356257a2687b
Argeniss Security Advisory - Oracle Database Server provides the DBMS_XMLSCHEMA and DBMS_XMLSCHEMA_INT Packages that include procedures to register and delete XML schemas. These packages contain the public procedures GENERATESCHEMA and GENERATESCHEMAS that are vulnerable to buffer overflow attacks.
367ed9eab6261d53ec2bfcaf1f65901f75fa8a8fa1f0d9139fb4c8389da1b9d7
Argeniss Security Advisory - Oracle database servers versions 8i and 9i are susceptible to directory traversal attacks.
fbdd2328be239c99f2f1f4d9662604a2451eee01ce19ea3fcb94fd2005ce1cc0
ISS Security Advisory - A flaw in the ProFTPD Unix FTP server versions 1.2.7 through 1.2.9rc2 allows an attacker capable of uploading files the ability to trigger a buffer overflow and execute arbitrary code.
0b7e33b20eb6e39707bf6f99835e0d7b6a4c02fe435aa0e95c32fea7585d8dee
ISS Security Advisory - ISS X-Force has discovered a flaw in the PeopleSoft PeopleTools application framework. Attackers could exploit a vulnerability to write arbitrary files with attacker-defined data under the permissions of the Web server via the "SchedulerTransfer" servlet.
d4e4a170931e409182da4f67336e84fd3dcb57e5a8ce070bb07f6abbfceb3062
ISS Security Advisory - A remote root vulnerability has been discovered in Sendmail v5.79 to 8.12.7 in the crackaddr() function which is used to parse headers. This vulnerability is especially dangerous because the exploit can be delivered within an email message and the attacker doesn't need any specific knowledge of the target to launch a successful attack.
a777b9ea2ee630fe2497afce3a91ff81fed5df586e37de4d937c084f3d483e7f
ISS Security Advisory - Snort v1.8 through 1.9.0 contains a remote root vulnerability in the processing of fragmented RPC traffic. Since fragment sizes are not properly checked against the remaining buffer space, remote attackers can execute arbitrary code as root by sending a packet to any IP in network space a snort sensor is listening to. Successful exploitation does not generate log entries, and non-executable stacks do not offer protection.
bc99632cf2915e3fd09192db51188d45a561de0df9f9c62671d14df80a1747b9
ISS Security Advisory - The "Microsoft SQL Slammer Worm" is spreading via unpatched SQL servers. Once a vulnerable computer is compromised, the worm will infect that target, randomly select a new target, and resend the exploit and propagation code to that host sending a large amount of network traffic in the process which crashes some network equipment.
3a77fcd92ec00163f9ca845cd4c731f4b077b50ac1f7c0901d732242725f76d2
ISS Security Advisory - Bind 8 v8.3.3-REL and below and Bind 4 v4.9.10-REL and below contain a flaw in the formation of DNS responses containing SIG resource records (RR) that allows remote code execution. Two denial of service vulnerabilities exist as well. A workaround is available by turning off recursive DNS functionality.
415591543028456a7c65c52b6e53dedc3d552efa7ad0f398790215825ae30993
This tool can be used to scan IIS servers for the unicode directory traversal vulnerability.
d68555136e1216e01f665bb28f94c34d9fa82ebd4c0629f79f500a373361d1c4
ISS Security Advisory - A vulnerability found in the manner used by Internet Scanner to parse certain types of non-standard HTTP responses can result in a remotely exploitable buffer overflow condition. This affects Internet Scanner version 6.2.1 for Windows (NT/2000) and has been corrected with X-Press Update 6.17.
34566c0ce8925f26dbbf2bf5886377abce98ca70c2881f2aaf17c71614aaae00
ISS Security Advisory - Polycom ViewStation videoconferencing products contain several remote vulnerabilities which allow attackers to gather information about the device, retrieve files, crash the device, and monitor videoconferences. Polycom ViewStation 7.2 and earlier and Polycom ViewStation FX/VS 4000 version 4.1.5 and below are affected.
0e9546d6ec69efb53f99fa0cb060c52d2a61dadc43f6032a89ce7704eb741851
ISS Security Advisory - Windows NT, 2000, and XP can be crashed remotely by sending a malformed packet to port 139, triggering a heap overflow. MS02-045.
b74704a2cee3637e1a2e674c5a67573beff65a176eec97554c88e17a844cc641
ISS Security Advisory - Microsoft Exchange Server v5.5 contains a remotely exploitable buffer overflow. This flaw allows attackers to either crash Exchange and block all inbound and outbound email delivery or allow an attacker to gain complete control of the server.
a61e4caccffff08e6577f171e4763c83baf57da3c8f3bcfb4e8dd5b42fca11c8
ISS Security Advisory - ISS X-Force has discovered a vulnerability in the HP-UX line printer daemon (rlpdaemon) that allows a remote or local user to execute arbitrary code with root privileges. Affected versions include HP-UX 10.01, 10.10, 10.20, 11.00, and 11.11.
fc8855c32af05bfe561174dc0946a2ed415b60808e50f138370be7dc3d2426dc
ISS discovered a buffer overflow vulnerability in the Subprocess Control Server (dtspcd) in all Unix variants running CDE (Common Desktop Environment) system. The vulnerability in the dtspcd daemon allows remote attackers to execute arbitrary commands on a target system as root. Many unix flavors are affected.
d1bfc5d62d8c313808c9f569fae242504771c9276aac917e265af53497e54bf5
ISS Security Advisory - A remote denial of service vulnerability has been found in Citrix MetaFrame, an application server that works with Windows Terminal Services. This vulnerability causes a MetaFrame installation to crash or "blue screen" and requires an affected system to be restarted manually.
4ac34a8787598472e233d32474352c12be8616df6bec830ac5dd73fd29b0f80d
ISS Security Advisory - A format string vulnerability has been found in the tooltalk service (rpc.ttdbserverd) on multiple versions of HP-UX, IBM AIX, IRIX, DG-UX, and Solaris. ToolTalk contains a "syslog()" call that will interpret user-supplied formatting arguments. This call is insecure and allows remote attackers to control formatting and manipulate data at arbitrary locations in the memory of the running executable.
7b3937ec0ff2a6f8ab2b30dddccd69238b157ccf162a4101a1d63bff08da76b8
ISS Security Advisory - A buffer overflow has been discovered in the HP-UX line printer daemon (rlpdaemon) which allows a remote or local attacker to execute arbitrary code with superuser privilege. Affected versions include HP-UX 10.01, 10.10, 10.20, 11.00, and 11.11. Rlpdaemon is configured to run by default even if it is not being used.
b5a445dab3717a3385ee1bfe58ee3b898d4e1161c8f436be861fcb4c1556bd65
ISS Security Advisory - X-Force has discovered buffer overflow vulnerabilities in two popular Remote Authentication Dial-In User Server (RADIUS) implementations. The vulnerabilities in this advisory allow attackers to launch Denial of Service (DoS) attacks against critical network components, bypass 802.11 WLAN access control, and compromise and control protected network resources. Affected versions include Merit 3.6b RADIUS and Lucent 2.1-2 RADIUS. Prior releases are also vulnerable.
d5d80e70fd98ab61af0a31f821187d5887d6b3bb8563e79b3a40554e82a4ba19
ISS Security Alert - A flaw exists in Microsoft Internet Information Server (IIS) that may allow remote attackers to view directory structures, view and delete files, execute arbitrary commands, and deny service to the server. It is possible for attackers to craft URLs that take advantage of a flaw in IIS URL decoding routines. Security mechanisms within these routines can be bypassed. All recent versions of IIS are affected by this vulnerability.
0678361f10357557833b2a2d33b82e84b3523cf921e44d95ea0e3d806abb98d1
ISS Security Advisory - A buffer overflow has been discovered in IRIX rpc.espd, which is installed by default on all current SGI IRIX installations. Remote attackers without accounts can execute commands as root. Patch available here.
6326566a243bd93810f222cdd5171dd79f90bd2adba15b8689aaae8416431796
ISS Security Advisory - Windows 2000 running IIS 5.0 has a serious remote vulnerability in the ISAPI printer extension. More information available here.
775b962801b88729d6a6728a04293da2e67437ad128f3b5ef34731e52f9cb69e
The Stick ddos tool overloads IDS systems with false positives, causing them to fail. Paper on stick available here.
da1612bccb80ba244587e23c1bfb6b0a07c6e7e404ffbe49e615f9ba4a14b6a8
ISS Security Alert - Remote Vulnerabilities in BIND versions 4 and 8. Bind 8 has a buffer overflow in the TSIG handling code - Bind 4 has several buffer overflows. Affected versions include v4.9.3 through 4.9.7 and 8.2 through 8.2.3-T9B. Fix available here.
5e7225bf4a9af61e978fa9688324e60943dcb7419ee5c653d86f400962442dd1
ISS Security Alert - Ramen Linux Worm. A self-propagating worm known as Ramen is currently exploiting well-known holes (wu-ftp, rpc.statd, and LPRng) in unpatched Red Hat Linux 6.2 systems and in early versions of Red Hat 7.0. In addition to scanning for additional systems and propagating to vulnerable systems, the worm also defaces Web servers it encounters by replacing the "index.html" file. It may also interfere with some networks supporting multicasting.
5fafe03a3ac411b8a7266fdb981c05bf1655ddbeb36af33ffcc0cace05e380fc