VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-200106-0139 CVE-2001-0483 Raptor Firewall HTTP Request Proxying Vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set. Raptor Firewall is a product distributed and maintained by Axent Technologies, Inc. Raptor is an Enterprise-level firewall, providing a mixture of features and performance. A problem in the software package could allow intruders access to private web resources. By using the nearest interface of the firewall as a proxy, it is possible to access a system connected to the other interface of the firewall within TCP ports 79-99, and 200-65535. The firewall will only permit connections to the other side on ports in this range, excluding port 80, and using HTTP. This affects firewall rules that permit HTTP traffic. Therefore, it is possible for a malicious user to access internal web assets, and potentially gain access to sensitive information. Axent Raptor firewall version 6.5 has a misconfiguration
VAR-200105-0093 CVE-2001-0288 Cisco Switch and router vulnerabilities CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Cisco switches and routers running IOS 12.1 and earlier produce predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. Over the past several years, a variety of attacks against TCP initial sequence number (ISN) generation have been discussed. A vulnerability exists in some TCP/IP stack implementations that use random increments for initial sequence numbers. Such implementations are vulnerable to statistical attack, which could allow an attacker to predict, within a reasonable range, sequence numbers of future and existing connections. By predicting a sequence number, several attacks could be performed; an attacker could disrupt or hijack existing connections, or spoof future connections
VAR-200106-0189 CVE-2001-0455 Sun Solaris SNMP proxy agent /opt/SUNWssp/bin/snmpd contains buffer overflow CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Cisco Aironet 340 Series wireless bridge before 8.55 does not properly disable access to the web interface, which allows remote attackers to modify its configuration. The SNMP proxy agent on certain large Solaris systems contains a buffer overflow. It may be possible, though it is unconfirmed, that an intruder could use this flaw to execute code with root privileges. Solaris is the Unix Operating System variant distributed and maintained by Sun Microsystems. Solaris is a freely available operating system designed to run on systems of varying size with maximum scalability. A problem with the SNMP Daemon included in the SUNWsspop package results in a buffer overflow, and potentially the execution of arbitrary code. Upon parsing the argv[0] variable from the command line, this information is stored in a static buffer. The static buffer is vulnerable to being overflowed at 700 bytes of data. This vulnerability is only present on systems acting as the System Service Processor for an E10000, or on any system with the SUNWsspop package installed. A remote attacker could exploit this vulnerability to modify the configuration. -----BEGIN PGP SIGNED MESSAGE----- Internet Security Systems Security Alert Summary April 5, 2001 Volume 6 Number 5 X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php This summary can be found at http://xforce.iss.net/alerts/vol-6_num-5.php _____ Contents: * 80 Reported Vulnerabilities * Risk Factor Key _____ Date Reported: 03/01/2001 Brief Description: Palm OS Debug Mode allows attacker to bypass password Risk Factor: Low Attack Type: Host Based Platforms Affected: Palm OS 3.5.2, Palm OS 3.3 Vulnerability: palm-debug-bypass-password X-Force URL: http://xforce.iss.net/static/6196.php Date Reported: 03/01/2001 Brief Description: Microsoft Exchange malformed URL request could cause a denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Microsoft Exchange 2000 Vulnerability: exchange-malformed-url-dos X-Force URL: http://xforce.iss.net/static/6172.php Date Reported: 03/02/2001 Brief Description: Mailx buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: OpenLinux 2.4, OpenLinux 2.3, Linux Debian 2.2 Vulnerability: mailx-bo X-Force URL: http://xforce.iss.net/static/6181.php Date Reported: 03/02/2001 Brief Description: SunFTP allows attackers to gain unauthorized file access Risk Factor: Low Attack Type: Host Based Platforms Affected: SunFTP 1.0 Build 9 Vulnerability: sunftp-gain-access X-Force URL: http://xforce.iss.net/static/6195.php Date Reported: 03/02/2001 Brief Description: WinZip /zipandemail option buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows 2000 All versions, Winzip 8.0, Windows NT All versions Vulnerability: winzip-zipandemail-bo X-Force URL: http://xforce.iss.net/static/6191.php Date Reported: 03/04/2001 Brief Description: Broker FTP Server allows remote attacker to delete files outside the FTP root Risk Factor: Medium Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-delete-files X-Force URL: http://xforce.iss.net/static/6190.php Date Reported: 03/04/2001 Brief Description: Broker FTP allows remote user to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-list-directories X-Force URL: http://xforce.iss.net/static/6189.php Date Reported: 03/04/2001 Brief Description: INDEXU allows attackers to gain unauthorized system access Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: INDEXU 2.0beta and earlier Vulnerability: indexu-gain-access X-Force URL: http://xforce.iss.net/static/6202.php Date Reported: 03/04/2001 Brief Description: Fastream FTP++ Client allows user to download files outside of Web root directory Risk Factor: Medium Attack Type: Network Based Platforms Affected: Fastream FTP++ Server 2.0 Vulnerability: fastream-ftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6187.php Date Reported: 03/04/2001 Brief Description: SlimServe HTTPd directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: SlimServe HTTPd 1.1 and earlier Vulnerability: slimserve-httpd-directory-traversal X-Force URL: http://xforce.iss.net/static/6186.php Date Reported: 03/04/2001 Brief Description: WFTPD Pro buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: WFTPD Pro 3.00 Vulnerability: wftpd-pro-bo X-Force URL: http://xforce.iss.net/static/6184.php Date Reported: 03/05/2001 Brief Description: IRCd tkserv buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: IRCd All versions, tkserv 1.3.0 and earlier Vulnerability: irc-tkserv-bo X-Force URL: http://xforce.iss.net/static/6193.php Date Reported: 03/06/2001 Brief Description: War FTPD could allow attackers to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: WarFTPD 1.67b4 Vulnerability: warftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6197.php Date Reported: 03/06/2001 Brief Description: Internet Explorer could allow execution of commands when used with Telnet Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Internet Explorer 5.5, Services for Unix 2.0, Windows NT All versions, Windows 2000 All versions, Internet Explorer 5.01 Vulnerability: ie-telnet-execute-commands X-Force URL: http://xforce.iss.net/static/6230.php Date Reported: 03/07/2001 Brief Description: Cisco Aironet Web access allows remote attacker to view/modify configuration Risk Factor: Low Attack Type: Network Based Platforms Affected: Aironet 340 Series Wireless Bridge Firmware 8.07, Aironet 340 Series Wireless Bridge Firmware 8.24, Aironet 340 Series Wireless Bridge Firmware 7.x Vulnerability: cisco-aironet-web-access X-Force URL: http://xforce.iss.net/static/6200.php Date Reported: 03/07/2001 Brief Description: Netscape Directory Server buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Netscape Directory Server 4.1, Netscape Directory Server 4.12, Windows NT All versions Vulnerability: netscape-directory-server-bo X-Force URL: http://xforce.iss.net/static/6233.php Date Reported: 03/07/2001 Brief Description: Proftpd contains configuration error in postinst script when running as root Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-postinst-root X-Force URL: http://xforce.iss.net/static/6208.php Date Reported: 03/07/2001 Brief Description: proftpd /var symlink Risk Factor: Medium Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-var-symlink X-Force URL: http://xforce.iss.net/static/6209.php Date Reported: 03/07/2001 Brief Description: man2html remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: man2html prior to 1.5.23 Vulnerability: man2html-remote-dos X-Force URL: http://xforce.iss.net/static/6211.php Date Reported: 03/07/2001 Brief Description: Linux ePerl buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, ePerl prior to 2.2.14, Linux Debian 2.2, Linux Mandrake 7.1 Vulnerability: linux-eperl-bo X-Force URL: http://xforce.iss.net/static/6198.php Date Reported: 03/08/2001 Brief Description: Novell NetWare could allow attackers to gain unauthorized access Risk Factor: Medium Attack Type: Network Based Platforms Affected: Novell NetWare 4.01, Novell NetWare 5.1, Novell NetWare 3.1, Novell NetWare 4.11, Novell NetWare 5.0 Vulnerability: novell-netware-unauthorized-access X-Force URL: http://xforce.iss.net/static/6215.php Date Reported: 03/08/2001 Brief Description: Linux sgml-tools symlink attack Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, sgml-tools prior to 1.0.9-15, Linux Mandrake 7.2, Linux Immunix OS 6.2, Linux Immunix OS 7.0 Beta, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Red Hat 6.2, Linux Debian 2.2, Linux Mandrake 7.1, Linux Red Hat 5.2 Vulnerability: sgmltools-symlink X-Force URL: http://xforce.iss.net/static/6201.php Date Reported: 03/08/2001 Brief Description: HP-UX asecure denial of service Risk Factor: Medium Attack Type: Host Based Platforms Affected: HP-UX 10.10, HP-UX 10.20, HP-UX 11, HP-UX 10.01 Vulnerability: hp-asecure-dos X-Force URL: http://xforce.iss.net/static/6212.php Date Reported: 03/08/2001 Brief Description: ascdc Afterstep buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: ascdc 0.3 Vulnerability: ascdc-afterstep-bo X-Force URL: http://xforce.iss.net/static/6204.php Date Reported: 03/08/2001 Brief Description: Microsoft IIS WebDAV denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: IIS 5.0 Vulnerability: iis-webdav-dos X-Force URL: http://xforce.iss.net/static/6205.php Date Reported: 03/08/2001 Brief Description: WEBsweeper HTTP request denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: WEBsweeper 4.0, Windows NT All versions Vulnerability: websweeper-http-dos X-Force URL: http://xforce.iss.net/static/6214.php Date Reported: 03/09/2001 Brief Description: FOLDOC allows remote attackers to execute commands Risk Factor: Medium Attack Type: Network Based Platforms Affected: FOLDEC All versions Vulnerability: foldoc-cgi-execute-commands X-Force URL: http://xforce.iss.net/static/6217.php Date Reported: 03/09/2001 Brief Description: slrn newsreader wrapping/unwrapping buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Immunix OS 7.0 Beta, Linux Debian 2.2, Linux Red Hat 7.0, Linux Immunix OS 6.2, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2 Vulnerability: slrn-wrapping-bo X-Force URL: http://xforce.iss.net/static/6213.php Date Reported: 03/09/2001 Brief Description: Linux mutt package contains format string when using IMAP Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Mandrake 7.0, Linux Mandrake 7.1, Linux Conectiva, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2, Linux Red Hat 5.2 Vulnerability: mutt-imap-format-string X-Force URL: http://xforce.iss.net/static/6235.php Date Reported: 03/10/2001 Brief Description: FormMail could be used to flood servers with anonymous email Risk Factor: High Attack Type: Network Based Platforms Affected: FormMail 1.0 to 1.6, Linux All versions Vulnerability: formmail-anonymous-flooding X-Force URL: http://xforce.iss.net/static/6242.php Date Reported: 03/11/2001 Brief Description: Half-Life Server config file buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-config-file-bo X-Force URL: http://xforce.iss.net/static/6221.php Date Reported: 03/11/2001 Brief Description: Half-Life Server exec command buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-exec-bo X-Force URL: http://xforce.iss.net/static/6219.php Date Reported: 03/11/2001 Brief Description: Half-Life Server map command buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-bo X-Force URL: http://xforce.iss.net/static/6218.php Date Reported: 03/11/2001 Brief Description: Half-Life Server 'map' command format string Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-format-string X-Force URL: http://xforce.iss.net/static/6220.php Date Reported: 03/11/2001 Brief Description: Ikonboard allows remote attackers to read files Risk Factor: Medium Attack Type: Network Based Platforms Affected: Ikonboard 2.1.7b and earlier Vulnerability: ikonboard-cgi-read-files X-Force URL: http://xforce.iss.net/static/6216.php Date Reported: 03/12/2001 Brief Description: timed daemon remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Linux SuSE 7.1, Linux Mandrake 7.2, Linux SuSE 7.0, Linux- Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, FreeBSD 4.x, Linux Mandrake 7.0, Linux SuSE 6.1, Linux Mandrake 7.1, FreeBSD 3.x, Linux SuSE 6.3, Linux SuSE 6.4, Linux SuSE 6.2 Vulnerability: timed-remote-dos X-Force URL: http://xforce.iss.net/static/6228.php Date Reported: 03/12/2001 Brief Description: imap, ipop2d and ipop3d buffer overflows Risk Factor: Low Attack Type: Network Based Platforms Affected: OpenLinux eServer 2.3.1, OpenLinux eBuilder for ECential 3.0, OpenLinux eDesktop 2.4, OpenLinux 2.3, Linux SuSE 6.1, Linux Conectiva Vulnerability: imap-ipop2d-ipop3d-bo X-Force URL: http://xforce.iss.net/static/6269.php Date Reported: 03/12/2001 Brief Description: rwhod remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: FreeBSD 3.x, FreeBSD 4.x, Unix All versions Vulnerability: rwhod-remote-dos X-Force URL: http://xforce.iss.net/static/6229.php Date Reported: 03/13/2001 Brief Description: SunOS snmpd argv[0] buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: SunOS 5.8 Vulnerability: snmpd-argv-bo X-Force URL: http://xforce.iss.net/static/6239.php Date Reported: 03/13/2001 Brief Description: Mesa utah-glx symbolic link Risk Factor: Medium Attack Type: Host Based Platforms Affected: Mesa prior to 3.3-14, Linux Mandrake 7.2 Vulnerability: mesa-utahglx-symlink X-Force URL: http://xforce.iss.net/static/6231.php Date Reported: 03/14/2001 Brief Description: Linux FTPfs buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux 2.2.x, FTPfs 0.1.1 Vulnerability: ftpfs-bo X-Force URL: http://xforce.iss.net/static/6234.php Date Reported: 03/15/2001 Brief Description: Solaris snmpXdmid malformed DMI request buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Solaris 7, Solaris 8, Solaris 2.6 Vulnerability: solaris-snmpxdmid-bo X-Force URL: http://xforce.iss.net/static/6245.php Date Reported: 03/15/2001 Brief Description: vBulletin PHP Web forum allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Network Based Platforms Affected: vBulletin 1.1.5 and earlier, vBulletin 2.0beta2 and earlier, Windows All versions, Unix All versions Vulnerability: vbulletin-php-elevate-privileges X-Force URL: http://xforce.iss.net/static/6237.php Date Reported: 03/15/2001 Brief Description: MDaemon WorldClient Web services denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows NT All versions, Windows 2000 All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-webservices-dos X-Force URL: http://xforce.iss.net/static/6240.php Date Reported: 03/16/2001 Brief Description: SSH ssheloop.c denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: SSH for Windows Server 2.4, SSH for Windows Server 2.5, Windows All versions Vulnerability: ssh-ssheloop-dos X-Force URL: http://xforce.iss.net/static/6241.php Date Reported: 03/18/2001 Brief Description: Eudora HTML emails could allow remote execution of code Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows All versions, Eudora 5.0.2 Vulnerability: eudora-html-execute-code X-Force URL: http://xforce.iss.net/static/6262.php Date Reported: 03/19/2001 Brief Description: ASPSeek s.cgi buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux All versions, ASPSeek 1.0.3 and earlier Vulnerability: aspseek-scgi-bo X-Force URL: http://xforce.iss.net/static/6248.php Date Reported: 03/20/2001 Brief Description: HSLCTF HTTP denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: AIX All versions, Unix All versions, HSLCTF 1.0 Vulnerability: hslctf-http-dos X-Force URL: http://xforce.iss.net/static/6250.php Date Reported: 03/20/2001 Brief Description: LICQ received URL execute commands Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, LICQ All, Linux Mandrake 7.1, Linux Red Hat 7.0, Linux Mandrake 7.2 Vulnerability: licq-url-execute-commands X-Force URL: http://xforce.iss.net/static/6261.php Date Reported: 03/20/2001 Brief Description: SurfControl SuperScout allows user to bypass filtering rules Risk Factor: Medium Attack Type: Network Based Platforms Affected: SurfControl SuperScout 3.0.2 and prior, Windows NT 4.0, Windows 2000 All versions Vulnerability: superscout-bypass-filtering X-Force URL: http://xforce.iss.net/static/6300.php Date Reported: 03/20/2001 Brief Description: DGUX lpsched buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: DG/UX All versions Vulnerability: dgux-lpsched-bo X-Force URL: http://xforce.iss.net/static/6258.php Date Reported: 03/20/2001 Brief Description: REDIPlus stock trading software stores passwords in plaintext Risk Factor: Medium Attack Type: Host Based Platforms Affected: REDIPlus 1.0, Windows All versions Vulnerability: rediplus-weak-security X-Force URL: http://xforce.iss.net/static/6276.php Date Reported: 03/20/2001 Brief Description: FCheck open() function allows the execution of commands Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO All versions, FCheck prior to 2.07.59, SunOS All versions, Windows All versions, Unix All versions, HP-UX All versions, Linux All versions, Solaris All versions, AIX All versions, BSD All versions Vulnerability: fcheck-open-execute-commands X-Force URL: http://xforce.iss.net/static/6256.php Date Reported: 03/20/2001 Brief Description: NTMail long URL denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows 2000 All versions, NTMail 6, Windows NT 4.0 Vulnerability: ntmail-long-url-dos X-Force URL: http://xforce.iss.net/static/6249.php Date Reported: 03/21/2001 Brief Description: VIM text editor allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: VIM All versions, Linux Red Hat 5.2, Linux Red Hat 6.2, Linux Red Hat 7.0 Vulnerability: vim-elevate-privileges X-Force URL: http://xforce.iss.net/static/6259.php Date Reported: 03/22/2001 Brief Description: FreeBSD UFS/EXT2FS could allow disclosure of deleted data Risk Factor: Medium Attack Type: Host Based Platforms Affected: UFS All versions, EXT2FS All versions, FreeBSD All versions Vulnerability: ufs-ext2fs-data-disclosure X-Force URL: http://xforce.iss.net/static/6268.php Date Reported: 03/22/2001 Brief Description: Microsoft invalid digital certificates could be used for spoofing Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows ME All versions, Windows 95 All versions, Windows 98 All versions, Windows 2000 All versions, Windows NT All versions Vulnerability: microsoft-invalid-digital-certificates X-Force URL: http://xforce.iss.net/static/6265.php Date Reported: 03/23/2001 Brief Description: Akopia Interchange could allow attacker to gain administrative access Risk Factor: Low Attack Type: Network Based Platforms Affected: Akopia Interchange 4.5.3 and 4.6.3 Vulnerability: akopia-interchange-gain-access X-Force URL: http://xforce.iss.net/static/6273.php Date Reported: 03/23/2001 Brief Description: Solaris /opt/JSParm/bin/perfmon allows user to create files with root privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 2.x Vulnerability: solaris-perfmon-create-files X-Force URL: http://xforce.iss.net/static/6267.php Date Reported: 03/23/2001 Brief Description: Windows user.dmp file insecure permissions Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows NT All versions, Windows 2000 All versions Vulnerability: win-userdmp-insecure-permission X-Force URL: http://xforce.iss.net/static/6275.php Date Reported: 03/23/2001 Brief Description: Compaq Web-enabled management software could allow users to bypass proxy settings Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Compaq Web-Enabled Management All versions Vulnerability: compaq-wbm-bypass-proxy X-Force URL: http://xforce.iss.net/static/6264.php Date Reported: 03/25/2001 Brief Description: MDaemon IMAP SELECT and EXAMINE command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-imap-command-dos X-Force URL: http://xforce.iss.net/static/6279.php Date Reported: 03/25/2001 Brief Description: HP-UX 11.11 newgrp(1) command allows users to gain additional privileges Risk Factor: High Attack Type: Host Based Platforms Affected: HP-UX 11.11 Vulnerability: hp-newgrp-additional-privileges X-Force URL: http://xforce.iss.net/static/6282.php Date Reported: 03/26/2001 Brief Description: 602Pro LAN SUITE webprox.dll denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, 602Pro LAN SUITE 2000a All versions Vulnerability: lan-suite-webprox-dos X-Force URL: http://xforce.iss.net/static/6281.php Date Reported: 03/26/2001 Brief Description: BEA WebLogic Server could allow attackers to browse Web directories Risk Factor: High Attack Type: Network Based Platforms Affected: WebLogic Server 6.0, Windows All versions Vulnerability: weblogic-browse-directories X-Force URL: http://xforce.iss.net/static/6283.php Date Reported: 03/27/2001 Brief Description: Solaris tip buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 8, Solaris 2.5.1, Solaris 2.6, Solaris 7 Vulnerability: solaris-tip-bo X-Force URL: http://xforce.iss.net/static/6284.php Date Reported: 03/27/2001 Brief Description: SonicWALL IKE pre-shared key is 48 bytes instead of 128 bytes Risk Factor: Medium Attack Type: Network Based Platforms Affected: SonicWALL TELE2 6.0.0, SonicWALL SOHO2 6.0.0 Vulnerability: sonicwall-ike-shared-keys X-Force URL: http://xforce.iss.net/static/6304.php Date Reported: 03/27/2001 Brief Description: Anaconda Foundation Clipper directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Anaconda Foundation Clipper 3.3 Vulnerability: anaconda-clipper-directory-traversal X-Force URL: http://xforce.iss.net/static/6286.php Date Reported: 03/27/2001 Brief Description: Microsoft Visual Studio VB-TSQL buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows 2000 All versions, Microsoft Visual Studio 6.0 Enterprise Ed., Windows NT All versions Vulnerability: visual-studio-vbtsql-bo X-Force URL: http://xforce.iss.net/static/6288.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer deliver buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-deliver-bo X-Force URL: http://xforce.iss.net/static/6302.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpadmin buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpadmin-bo X-Force URL: http://xforce.iss.net/static/6291.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpforms buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpforms-bo X-Force URL: http://xforce.iss.net/static/6293.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpshut buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpshut-bo X-Force URL: http://xforce.iss.net/static/6290.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpusers buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpusers-bo X-Force URL: http://xforce.iss.net/static/6292.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer recon buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-recon-bo X-Force URL: http://xforce.iss.net/static/6289.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer sendmail buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-sendmail-bo X-Force URL: http://xforce.iss.net/static/6303.php Date Reported: 03/28/2001 Brief Description: Inframail POST command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Inframail 3.97a and earlier, Linux All versions Vulnerability: inframail-post-dos X-Force URL: http://xforce.iss.net/static/6297.php Date Reported: 03/28/2001 Brief Description: Cisco VPN 3000 Concentrators Telnet denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco VPN 3000 Concentrators prior to 3.0.00 Vulnerability: cisco-vpn-telnet-dos X-Force URL: http://xforce.iss.net/static/6298.php Date Reported: 03/28/2001 Brief Description: WebSite Professional remote manager service denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: O'Reilly WebSite Pro 3.0.37 Vulnerability: website-pro-remote-dos X-Force URL: http://xforce.iss.net/static/6295.php Date Reported: 03/28/2001 Brief Description: Windows Me and Plus! 98 could allow the recovery of Compressed Folder passwords Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows 98 All versions, Windows 98 Second Edition, Windows ME All versions Vulnerability: win-compressed-password-recovery X-Force URL: http://xforce.iss.net/static/6294.php _____ Risk Factor Key: High Any vulnerability that provides an attacker with immediate access into a machine, gains superuser access, or bypasses a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. Medium Any vulnerability that provides information that has a high potential of giving system access to an intruder. Example: A misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password. Low Any vulnerability that provides information that potentially could lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods. ________ Internet Security Systems is the leading global provider of security management solutions for the Internet, protecting digital assets and ensuring safe and uninterrupted e-business. With its industry-leading intrusion detection and vulnerability assessment, remote managed security services, and strategic consulting and education offerings, ISS is a trusted security provider to more than 8,000 customers worldwide including 21 of the 25 largest U.S. commercial banks and the top 10 U.S. telecommunications companies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe, Latin America and the Middle East. For more information, visit the Internet Security Systems web site at www.iss.net or call 888-901-7477. Copyright (c) 2001 by Internet Security Systems, Inc. Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server. Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBOszkuDRfJiV99eG9AQFlewP8C6v84pW6UR171S6OThwkg/P7ylXIMY3P jO+w8ohAvbsa90iLFMlGo6YY0pIKSwlacQErryVFfVcRLQ1gIQhBxoIQlwrNkB6m XWnhroR/R7rzatML9cnHzpQKUK7Hax3LSxdxZQQwIDISxBZ4aeOTQwD+seuIos8t 8PVD8c9UO3g= =1xgg -----END PGP SIGNATURE-----
VAR-200106-0176 CVE-2001-0427 Sun Solaris SNMP proxy agent /opt/SUNWssp/bin/snmpd contains buffer overflow CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Cisco VPN 3000 series concentrators before 2.5.2(F) allow remote attackers to cause a denial of service via a flood of invalid login requests to (1) the SSL service, or (2) the telnet service, which do not properly disconnect the user after several failed login attempts. The SNMP proxy agent on certain large Solaris systems contains a buffer overflow. It may be possible, though it is unconfirmed, that an intruder could use this flaw to execute code with root privileges. Solaris is the Unix Operating System variant distributed and maintained by Sun Microsystems. Solaris is a freely available operating system designed to run on systems of varying size with maximum scalability. A problem with the SNMP Daemon included in the SUNWsspop package results in a buffer overflow, and potentially the execution of arbitrary code. Upon parsing the argv[0] variable from the command line, this information is stored in a static buffer. The static buffer is vulnerable to being overflowed at 700 bytes of data. This vulnerability is only present on systems acting as the System Service Processor for an E10000, or on any system with the SUNWsspop package installed. VPN 3060 Concentrator is prone to a denial-of-service vulnerability. Concentrators prior to Cisco VPN 3000 Series versions 2.5.2(F) have a vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Internet Security Systems Security Alert Summary April 5, 2001 Volume 6 Number 5 X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php This summary can be found at http://xforce.iss.net/alerts/vol-6_num-5.php _____ Contents: * 80 Reported Vulnerabilities * Risk Factor Key _____ Date Reported: 03/01/2001 Brief Description: Palm OS Debug Mode allows attacker to bypass password Risk Factor: Low Attack Type: Host Based Platforms Affected: Palm OS 3.5.2, Palm OS 3.3 Vulnerability: palm-debug-bypass-password X-Force URL: http://xforce.iss.net/static/6196.php Date Reported: 03/01/2001 Brief Description: Microsoft Exchange malformed URL request could cause a denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Microsoft Exchange 2000 Vulnerability: exchange-malformed-url-dos X-Force URL: http://xforce.iss.net/static/6172.php Date Reported: 03/02/2001 Brief Description: Mailx buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: OpenLinux 2.4, OpenLinux 2.3, Linux Debian 2.2 Vulnerability: mailx-bo X-Force URL: http://xforce.iss.net/static/6181.php Date Reported: 03/02/2001 Brief Description: SunFTP allows attackers to gain unauthorized file access Risk Factor: Low Attack Type: Host Based Platforms Affected: SunFTP 1.0 Build 9 Vulnerability: sunftp-gain-access X-Force URL: http://xforce.iss.net/static/6195.php Date Reported: 03/02/2001 Brief Description: WinZip /zipandemail option buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows 2000 All versions, Winzip 8.0, Windows NT All versions Vulnerability: winzip-zipandemail-bo X-Force URL: http://xforce.iss.net/static/6191.php Date Reported: 03/04/2001 Brief Description: Broker FTP Server allows remote attacker to delete files outside the FTP root Risk Factor: Medium Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-delete-files X-Force URL: http://xforce.iss.net/static/6190.php Date Reported: 03/04/2001 Brief Description: Broker FTP allows remote user to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-list-directories X-Force URL: http://xforce.iss.net/static/6189.php Date Reported: 03/04/2001 Brief Description: INDEXU allows attackers to gain unauthorized system access Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: INDEXU 2.0beta and earlier Vulnerability: indexu-gain-access X-Force URL: http://xforce.iss.net/static/6202.php Date Reported: 03/04/2001 Brief Description: Fastream FTP++ Client allows user to download files outside of Web root directory Risk Factor: Medium Attack Type: Network Based Platforms Affected: Fastream FTP++ Server 2.0 Vulnerability: fastream-ftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6187.php Date Reported: 03/04/2001 Brief Description: SlimServe HTTPd directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: SlimServe HTTPd 1.1 and earlier Vulnerability: slimserve-httpd-directory-traversal X-Force URL: http://xforce.iss.net/static/6186.php Date Reported: 03/04/2001 Brief Description: WFTPD Pro buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: WFTPD Pro 3.00 Vulnerability: wftpd-pro-bo X-Force URL: http://xforce.iss.net/static/6184.php Date Reported: 03/05/2001 Brief Description: IRCd tkserv buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: IRCd All versions, tkserv 1.3.0 and earlier Vulnerability: irc-tkserv-bo X-Force URL: http://xforce.iss.net/static/6193.php Date Reported: 03/06/2001 Brief Description: War FTPD could allow attackers to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: WarFTPD 1.67b4 Vulnerability: warftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6197.php Date Reported: 03/06/2001 Brief Description: Internet Explorer could allow execution of commands when used with Telnet Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Internet Explorer 5.5, Services for Unix 2.0, Windows NT All versions, Windows 2000 All versions, Internet Explorer 5.01 Vulnerability: ie-telnet-execute-commands X-Force URL: http://xforce.iss.net/static/6230.php Date Reported: 03/07/2001 Brief Description: Cisco Aironet Web access allows remote attacker to view/modify configuration Risk Factor: Low Attack Type: Network Based Platforms Affected: Aironet 340 Series Wireless Bridge Firmware 8.07, Aironet 340 Series Wireless Bridge Firmware 8.24, Aironet 340 Series Wireless Bridge Firmware 7.x Vulnerability: cisco-aironet-web-access X-Force URL: http://xforce.iss.net/static/6200.php Date Reported: 03/07/2001 Brief Description: Netscape Directory Server buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Netscape Directory Server 4.1, Netscape Directory Server 4.12, Windows NT All versions Vulnerability: netscape-directory-server-bo X-Force URL: http://xforce.iss.net/static/6233.php Date Reported: 03/07/2001 Brief Description: Proftpd contains configuration error in postinst script when running as root Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-postinst-root X-Force URL: http://xforce.iss.net/static/6208.php Date Reported: 03/07/2001 Brief Description: proftpd /var symlink Risk Factor: Medium Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-var-symlink X-Force URL: http://xforce.iss.net/static/6209.php Date Reported: 03/07/2001 Brief Description: man2html remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: man2html prior to 1.5.23 Vulnerability: man2html-remote-dos X-Force URL: http://xforce.iss.net/static/6211.php Date Reported: 03/07/2001 Brief Description: Linux ePerl buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, ePerl prior to 2.2.14, Linux Debian 2.2, Linux Mandrake 7.1 Vulnerability: linux-eperl-bo X-Force URL: http://xforce.iss.net/static/6198.php Date Reported: 03/08/2001 Brief Description: Novell NetWare could allow attackers to gain unauthorized access Risk Factor: Medium Attack Type: Network Based Platforms Affected: Novell NetWare 4.01, Novell NetWare 5.1, Novell NetWare 3.1, Novell NetWare 4.11, Novell NetWare 5.0 Vulnerability: novell-netware-unauthorized-access X-Force URL: http://xforce.iss.net/static/6215.php Date Reported: 03/08/2001 Brief Description: Linux sgml-tools symlink attack Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, sgml-tools prior to 1.0.9-15, Linux Mandrake 7.2, Linux Immunix OS 6.2, Linux Immunix OS 7.0 Beta, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Red Hat 6.2, Linux Debian 2.2, Linux Mandrake 7.1, Linux Red Hat 5.2 Vulnerability: sgmltools-symlink X-Force URL: http://xforce.iss.net/static/6201.php Date Reported: 03/08/2001 Brief Description: HP-UX asecure denial of service Risk Factor: Medium Attack Type: Host Based Platforms Affected: HP-UX 10.10, HP-UX 10.20, HP-UX 11, HP-UX 10.01 Vulnerability: hp-asecure-dos X-Force URL: http://xforce.iss.net/static/6212.php Date Reported: 03/08/2001 Brief Description: ascdc Afterstep buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: ascdc 0.3 Vulnerability: ascdc-afterstep-bo X-Force URL: http://xforce.iss.net/static/6204.php Date Reported: 03/08/2001 Brief Description: Microsoft IIS WebDAV denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: IIS 5.0 Vulnerability: iis-webdav-dos X-Force URL: http://xforce.iss.net/static/6205.php Date Reported: 03/08/2001 Brief Description: WEBsweeper HTTP request denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: WEBsweeper 4.0, Windows NT All versions Vulnerability: websweeper-http-dos X-Force URL: http://xforce.iss.net/static/6214.php Date Reported: 03/09/2001 Brief Description: FOLDOC allows remote attackers to execute commands Risk Factor: Medium Attack Type: Network Based Platforms Affected: FOLDEC All versions Vulnerability: foldoc-cgi-execute-commands X-Force URL: http://xforce.iss.net/static/6217.php Date Reported: 03/09/2001 Brief Description: slrn newsreader wrapping/unwrapping buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Immunix OS 7.0 Beta, Linux Debian 2.2, Linux Red Hat 7.0, Linux Immunix OS 6.2, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2 Vulnerability: slrn-wrapping-bo X-Force URL: http://xforce.iss.net/static/6213.php Date Reported: 03/09/2001 Brief Description: Linux mutt package contains format string when using IMAP Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Mandrake 7.0, Linux Mandrake 7.1, Linux Conectiva, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2, Linux Red Hat 5.2 Vulnerability: mutt-imap-format-string X-Force URL: http://xforce.iss.net/static/6235.php Date Reported: 03/10/2001 Brief Description: FormMail could be used to flood servers with anonymous email Risk Factor: High Attack Type: Network Based Platforms Affected: FormMail 1.0 to 1.6, Linux All versions Vulnerability: formmail-anonymous-flooding X-Force URL: http://xforce.iss.net/static/6242.php Date Reported: 03/11/2001 Brief Description: Half-Life Server config file buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-config-file-bo X-Force URL: http://xforce.iss.net/static/6221.php Date Reported: 03/11/2001 Brief Description: Half-Life Server exec command buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-exec-bo X-Force URL: http://xforce.iss.net/static/6219.php Date Reported: 03/11/2001 Brief Description: Half-Life Server map command buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-bo X-Force URL: http://xforce.iss.net/static/6218.php Date Reported: 03/11/2001 Brief Description: Half-Life Server 'map' command format string Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-format-string X-Force URL: http://xforce.iss.net/static/6220.php Date Reported: 03/11/2001 Brief Description: Ikonboard allows remote attackers to read files Risk Factor: Medium Attack Type: Network Based Platforms Affected: Ikonboard 2.1.7b and earlier Vulnerability: ikonboard-cgi-read-files X-Force URL: http://xforce.iss.net/static/6216.php Date Reported: 03/12/2001 Brief Description: timed daemon remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Linux SuSE 7.1, Linux Mandrake 7.2, Linux SuSE 7.0, Linux- Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, FreeBSD 4.x, Linux Mandrake 7.0, Linux SuSE 6.1, Linux Mandrake 7.1, FreeBSD 3.x, Linux SuSE 6.3, Linux SuSE 6.4, Linux SuSE 6.2 Vulnerability: timed-remote-dos X-Force URL: http://xforce.iss.net/static/6228.php Date Reported: 03/12/2001 Brief Description: imap, ipop2d and ipop3d buffer overflows Risk Factor: Low Attack Type: Network Based Platforms Affected: OpenLinux eServer 2.3.1, OpenLinux eBuilder for ECential 3.0, OpenLinux eDesktop 2.4, OpenLinux 2.3, Linux SuSE 6.1, Linux Conectiva Vulnerability: imap-ipop2d-ipop3d-bo X-Force URL: http://xforce.iss.net/static/6269.php Date Reported: 03/12/2001 Brief Description: rwhod remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: FreeBSD 3.x, FreeBSD 4.x, Unix All versions Vulnerability: rwhod-remote-dos X-Force URL: http://xforce.iss.net/static/6229.php Date Reported: 03/13/2001 Brief Description: SunOS snmpd argv[0] buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: SunOS 5.8 Vulnerability: snmpd-argv-bo X-Force URL: http://xforce.iss.net/static/6239.php Date Reported: 03/13/2001 Brief Description: Mesa utah-glx symbolic link Risk Factor: Medium Attack Type: Host Based Platforms Affected: Mesa prior to 3.3-14, Linux Mandrake 7.2 Vulnerability: mesa-utahglx-symlink X-Force URL: http://xforce.iss.net/static/6231.php Date Reported: 03/14/2001 Brief Description: Linux FTPfs buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux 2.2.x, FTPfs 0.1.1 Vulnerability: ftpfs-bo X-Force URL: http://xforce.iss.net/static/6234.php Date Reported: 03/15/2001 Brief Description: Solaris snmpXdmid malformed DMI request buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Solaris 7, Solaris 8, Solaris 2.6 Vulnerability: solaris-snmpxdmid-bo X-Force URL: http://xforce.iss.net/static/6245.php Date Reported: 03/15/2001 Brief Description: vBulletin PHP Web forum allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Network Based Platforms Affected: vBulletin 1.1.5 and earlier, vBulletin 2.0beta2 and earlier, Windows All versions, Unix All versions Vulnerability: vbulletin-php-elevate-privileges X-Force URL: http://xforce.iss.net/static/6237.php Date Reported: 03/15/2001 Brief Description: MDaemon WorldClient Web services denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows NT All versions, Windows 2000 All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-webservices-dos X-Force URL: http://xforce.iss.net/static/6240.php Date Reported: 03/16/2001 Brief Description: SSH ssheloop.c denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: SSH for Windows Server 2.4, SSH for Windows Server 2.5, Windows All versions Vulnerability: ssh-ssheloop-dos X-Force URL: http://xforce.iss.net/static/6241.php Date Reported: 03/18/2001 Brief Description: Eudora HTML emails could allow remote execution of code Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows All versions, Eudora 5.0.2 Vulnerability: eudora-html-execute-code X-Force URL: http://xforce.iss.net/static/6262.php Date Reported: 03/19/2001 Brief Description: ASPSeek s.cgi buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux All versions, ASPSeek 1.0.3 and earlier Vulnerability: aspseek-scgi-bo X-Force URL: http://xforce.iss.net/static/6248.php Date Reported: 03/20/2001 Brief Description: HSLCTF HTTP denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: AIX All versions, Unix All versions, HSLCTF 1.0 Vulnerability: hslctf-http-dos X-Force URL: http://xforce.iss.net/static/6250.php Date Reported: 03/20/2001 Brief Description: LICQ received URL execute commands Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, LICQ All, Linux Mandrake 7.1, Linux Red Hat 7.0, Linux Mandrake 7.2 Vulnerability: licq-url-execute-commands X-Force URL: http://xforce.iss.net/static/6261.php Date Reported: 03/20/2001 Brief Description: SurfControl SuperScout allows user to bypass filtering rules Risk Factor: Medium Attack Type: Network Based Platforms Affected: SurfControl SuperScout 3.0.2 and prior, Windows NT 4.0, Windows 2000 All versions Vulnerability: superscout-bypass-filtering X-Force URL: http://xforce.iss.net/static/6300.php Date Reported: 03/20/2001 Brief Description: DGUX lpsched buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: DG/UX All versions Vulnerability: dgux-lpsched-bo X-Force URL: http://xforce.iss.net/static/6258.php Date Reported: 03/20/2001 Brief Description: REDIPlus stock trading software stores passwords in plaintext Risk Factor: Medium Attack Type: Host Based Platforms Affected: REDIPlus 1.0, Windows All versions Vulnerability: rediplus-weak-security X-Force URL: http://xforce.iss.net/static/6276.php Date Reported: 03/20/2001 Brief Description: FCheck open() function allows the execution of commands Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO All versions, FCheck prior to 2.07.59, SunOS All versions, Windows All versions, Unix All versions, HP-UX All versions, Linux All versions, Solaris All versions, AIX All versions, BSD All versions Vulnerability: fcheck-open-execute-commands X-Force URL: http://xforce.iss.net/static/6256.php Date Reported: 03/20/2001 Brief Description: NTMail long URL denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows 2000 All versions, NTMail 6, Windows NT 4.0 Vulnerability: ntmail-long-url-dos X-Force URL: http://xforce.iss.net/static/6249.php Date Reported: 03/21/2001 Brief Description: VIM text editor allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: VIM All versions, Linux Red Hat 5.2, Linux Red Hat 6.2, Linux Red Hat 7.0 Vulnerability: vim-elevate-privileges X-Force URL: http://xforce.iss.net/static/6259.php Date Reported: 03/22/2001 Brief Description: FreeBSD UFS/EXT2FS could allow disclosure of deleted data Risk Factor: Medium Attack Type: Host Based Platforms Affected: UFS All versions, EXT2FS All versions, FreeBSD All versions Vulnerability: ufs-ext2fs-data-disclosure X-Force URL: http://xforce.iss.net/static/6268.php Date Reported: 03/22/2001 Brief Description: Microsoft invalid digital certificates could be used for spoofing Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows ME All versions, Windows 95 All versions, Windows 98 All versions, Windows 2000 All versions, Windows NT All versions Vulnerability: microsoft-invalid-digital-certificates X-Force URL: http://xforce.iss.net/static/6265.php Date Reported: 03/23/2001 Brief Description: Akopia Interchange could allow attacker to gain administrative access Risk Factor: Low Attack Type: Network Based Platforms Affected: Akopia Interchange 4.5.3 and 4.6.3 Vulnerability: akopia-interchange-gain-access X-Force URL: http://xforce.iss.net/static/6273.php Date Reported: 03/23/2001 Brief Description: Solaris /opt/JSParm/bin/perfmon allows user to create files with root privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 2.x Vulnerability: solaris-perfmon-create-files X-Force URL: http://xforce.iss.net/static/6267.php Date Reported: 03/23/2001 Brief Description: Windows user.dmp file insecure permissions Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows NT All versions, Windows 2000 All versions Vulnerability: win-userdmp-insecure-permission X-Force URL: http://xforce.iss.net/static/6275.php Date Reported: 03/23/2001 Brief Description: Compaq Web-enabled management software could allow users to bypass proxy settings Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Compaq Web-Enabled Management All versions Vulnerability: compaq-wbm-bypass-proxy X-Force URL: http://xforce.iss.net/static/6264.php Date Reported: 03/25/2001 Brief Description: MDaemon IMAP SELECT and EXAMINE command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-imap-command-dos X-Force URL: http://xforce.iss.net/static/6279.php Date Reported: 03/25/2001 Brief Description: HP-UX 11.11 newgrp(1) command allows users to gain additional privileges Risk Factor: High Attack Type: Host Based Platforms Affected: HP-UX 11.11 Vulnerability: hp-newgrp-additional-privileges X-Force URL: http://xforce.iss.net/static/6282.php Date Reported: 03/26/2001 Brief Description: 602Pro LAN SUITE webprox.dll denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, 602Pro LAN SUITE 2000a All versions Vulnerability: lan-suite-webprox-dos X-Force URL: http://xforce.iss.net/static/6281.php Date Reported: 03/26/2001 Brief Description: BEA WebLogic Server could allow attackers to browse Web directories Risk Factor: High Attack Type: Network Based Platforms Affected: WebLogic Server 6.0, Windows All versions Vulnerability: weblogic-browse-directories X-Force URL: http://xforce.iss.net/static/6283.php Date Reported: 03/27/2001 Brief Description: Solaris tip buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 8, Solaris 2.5.1, Solaris 2.6, Solaris 7 Vulnerability: solaris-tip-bo X-Force URL: http://xforce.iss.net/static/6284.php Date Reported: 03/27/2001 Brief Description: SonicWALL IKE pre-shared key is 48 bytes instead of 128 bytes Risk Factor: Medium Attack Type: Network Based Platforms Affected: SonicWALL TELE2 6.0.0, SonicWALL SOHO2 6.0.0 Vulnerability: sonicwall-ike-shared-keys X-Force URL: http://xforce.iss.net/static/6304.php Date Reported: 03/27/2001 Brief Description: Anaconda Foundation Clipper directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Anaconda Foundation Clipper 3.3 Vulnerability: anaconda-clipper-directory-traversal X-Force URL: http://xforce.iss.net/static/6286.php Date Reported: 03/27/2001 Brief Description: Microsoft Visual Studio VB-TSQL buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows 2000 All versions, Microsoft Visual Studio 6.0 Enterprise Ed., Windows NT All versions Vulnerability: visual-studio-vbtsql-bo X-Force URL: http://xforce.iss.net/static/6288.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer deliver buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-deliver-bo X-Force URL: http://xforce.iss.net/static/6302.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpadmin buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpadmin-bo X-Force URL: http://xforce.iss.net/static/6291.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpforms buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpforms-bo X-Force URL: http://xforce.iss.net/static/6293.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpshut buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpshut-bo X-Force URL: http://xforce.iss.net/static/6290.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpusers buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpusers-bo X-Force URL: http://xforce.iss.net/static/6292.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer recon buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-recon-bo X-Force URL: http://xforce.iss.net/static/6289.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer sendmail buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-sendmail-bo X-Force URL: http://xforce.iss.net/static/6303.php Date Reported: 03/28/2001 Brief Description: Inframail POST command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Inframail 3.97a and earlier, Linux All versions Vulnerability: inframail-post-dos X-Force URL: http://xforce.iss.net/static/6297.php Date Reported: 03/28/2001 Brief Description: Cisco VPN 3000 Concentrators Telnet denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco VPN 3000 Concentrators prior to 3.0.00 Vulnerability: cisco-vpn-telnet-dos X-Force URL: http://xforce.iss.net/static/6298.php Date Reported: 03/28/2001 Brief Description: WebSite Professional remote manager service denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: O'Reilly WebSite Pro 3.0.37 Vulnerability: website-pro-remote-dos X-Force URL: http://xforce.iss.net/static/6295.php Date Reported: 03/28/2001 Brief Description: Windows Me and Plus! 98 could allow the recovery of Compressed Folder passwords Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows 98 All versions, Windows 98 Second Edition, Windows ME All versions Vulnerability: win-compressed-password-recovery X-Force URL: http://xforce.iss.net/static/6294.php _____ Risk Factor Key: High Any vulnerability that provides an attacker with immediate access into a machine, gains superuser access, or bypasses a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. Medium Any vulnerability that provides information that has a high potential of giving system access to an intruder. Example: A misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password. Low Any vulnerability that provides information that potentially could lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods. ________ Internet Security Systems is the leading global provider of security management solutions for the Internet, protecting digital assets and ensuring safe and uninterrupted e-business. With its industry-leading intrusion detection and vulnerability assessment, remote managed security services, and strategic consulting and education offerings, ISS is a trusted security provider to more than 8,000 customers worldwide including 21 of the 25 largest U.S. commercial banks and the top 10 U.S. telecommunications companies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe, Latin America and the Middle East. For more information, visit the Internet Security Systems web site at www.iss.net or call 888-901-7477. Copyright (c) 2001 by Internet Security Systems, Inc. Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server. Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBOszkuDRfJiV99eG9AQFlewP8C6v84pW6UR171S6OThwkg/P7ylXIMY3P jO+w8ohAvbsa90iLFMlGo6YY0pIKSwlacQErryVFfVcRLQ1gIQhBxoIQlwrNkB6m XWnhroR/R7rzatML9cnHzpQKUK7Hax3LSxdxZQQwIDISxBZ4aeOTQwD+seuIos8t 8PVD8c9UO3g= =1xgg -----END PGP SIGNATURE-----
VAR-200106-0110 CVE-2001-0328 Multiple TCP/IP implementations may use statistically predictable initial sequence numbers CVSS V2: 5.0
CVSS V3: -
Severity: Medium
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. Attacks against TCP initial sequence number generation have been discussed for some time now. It has long been recognized that the ability to know or predict ISNs can lead to TCP connection hijacking or spoofing. What was not previously illustrated was just how predictable one commonly-used method of randomizing new connection ISNs is in some modern TCP/IP implementations. A vulnerability exists in some TCP/IP stack implementations that use random increments for initial sequence numbers. Such implementations are vulnerable to statistical attack, which could allow an attacker to predict, within a reasonable range, sequence numbers of future and existing connections. By predicting a sequence number, several attacks could be performed; an attacker could disrupt or hijack existing connections, or spoof future connections. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 HP SECURITY BULLETIN HPSBTU01210 REVISION: 0 SSRT4743, SSRT4884 rev.0 - HP Tru64 UNIX TCP/IP remote Denial of Service (DoS) NOTICE: There are no restrictions for distribution of this Security Bulletin provided that it remains complete and intact. The information in this Security Bulletin should be acted upon as soon as possible. INITIAL RELEASE: 15 July 2005 POTENTIAL SECURITY IMPACT: Remote Denial of Service (DoS) SOURCE: Hewlett-Packard Company HP Software Security Response Team VULNERABILITY SUMMARY: Several potential security vulnerabilities have been identified in the HP Tru64 UNIX TCP/IP including ICMP, and Initial Sequence Number generation (ISNs). These exploits could result in a remote Denial of Service (DoS) from network throughput reduction for TCP connections, the reset of TCP connections, or TCP spoofing. REFERENCES: CERT CA-2001-09, NISCC Vulnerability Advisory VU#498440 VU#532967, CAN-2004-0790 CAN-2004-0791 CAN-2004-1060 CAN-2001-0328 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Tru64 UNIX 5.1B-3 HP Tru64 UNIX 5.1B-2/PK4 HP Tru64 UNIX 5.1A PK HP Tru64 UNIX 4.0G PK4 HP Tru64 UNIX 4.0F PK8 BACKGROUND: Special Instructions for the Customer The Internet Control Message Protocol (ICMP) (RFC 792) is used in the Internet Architecture to perform fault-isolation and recovery (RFC816), which is the group of actions that hosts and routers take to determine if a network failure has occurred. The industry standard TCP specification (RFC 793) has a vulnerability whereby ICMP packets can be used to perform a variety of attacks such as blind connection reset attacks and blind throughput-reduction attacks. Blind connection reset attacks can be triggered by an attacker sending forged ICMP "Destination Unreachable, host unreachable" packets or ICMP "Destination Unreachable, port unreachable" packets. Blind throughput-reduction attacks can be caused by an attacker sending a forged ICMP type 4 (Source Quench) packet. Path MTU Discovery (RFC 1191) describes a technique for dynamically discovering the MTU (maximum transmission unit) of an arbitrary internet path. This protocol uses ICMP packets from the router to discover the MTU for a TCP connection path. An attacker can reduce the throughput of a TCP connection by sending forged ICMP packets (or their IPv6 counterpart) to the discovering host, causing an incorrect Path MTU setting. HP has addressed these potential vulnerabilities by providing a new kernel tunable in Tru64 UNIX V5.1B and 5.1A, icmp_tcpseqcheck. In Tru64 4.0F and 4.0G, HP has introduced two new kernel tunables, icmp_tcpseqcheck and icmp_rejectcodemask. The icmp_rejectcodemask tunable is already available in Tru64 UNIX V5.1B and 5.1A. icmp_tcpseqcheck The icmp_tcpseqcheck variable mitigates ICMP attacks against TCP by checking that the TCP sequence number contained in the payload of the ICMP error message is within the range of the data already sent but not yet acknowledged. An ICMP error message that does not pass this check is discarded. This behavior protects TCP against spoofed ICMP packets. Set the tunable as follows: icmp_tcpseqcheck=1 (default) Provides a level of protection that reduces the possibility of considering a spoofed ICMP packet as valid to one in two raised to the thirty-second power. icmp_tcpseqcheck=0 Retains existing behavior, i.e., accepts all ICMP packets icmp_rejectcodemask In the Requirements for IP Version 4 Routers (RFC 1812), research suggests that the use of ICMP Source Quench packets is an ineffective (and unfair) antidote for congestion. Thus, HP recommends completely ignoring ICMP Source Quench packets using the icmp_rejectcodemask tunable. The icmp_rejectcodemask is a bitmask that designates the ICMP codes that the system should reject. For example, to reject ICMP Source Quench packets, set the mask bit position for the ICMP_SOURCEQUENCH code 4, which is two to the 4th power = 16 (0x10 hex). The icmp_rejectcodemask tunable can be used to reject any ICMP packet type, or multiple masks can be combined to reject more than one type. Note: the ICMP type codes are defined in "/usr/include/netinet/ip_icmp.h". Set the tunable as follows: icmp_rejectcodemask = 0x10 Rejects ICMP Source Quench packets icmp_rejectcodemask = 0 (default) Retains existing behavior, i.e., accepts all ICMP packets Adjusting the variables The ICMP sequence check variable (icmp_tcpseqcheck) can be adjusted using the sysconfig and sysconfigdb commands: # sysconfig -q inet icmp_tcpseqcheck inet: icmp_tcpseqcheck = 1 # sysconfig -r inet icmp_tcpseqcheck=0 icmp_tcpseqcheck: reconfigured # sysconfig -q inet icmp_tcpseqcheck inet: icmp_tcpseqcheck = 0 # sysconfig -q inet icmp_tcpseqcheck > /tmp/icmp_tcpseqcheck_merge # sysconfigdb -m -f /tmp/icmp_tcpseqcheck_merge inet # sysconfigdb -l inet inet: icmp_tcpseqcheck = 1 Similarly, the icmp_rejectcodemask variable can be adjusted using the sysconfig and sysconfigdb commands: # sysconfig -q inet icmp_rejectcodemask inet: icmp_rejectcodemask = 0 # sysconfig -r inet icmp_rejectcodemask=0x10 icmp_rejectcodemask: reconfigured # sysconfig -q inet icmp_rejectcodemask inet: icmp_rejectcodemask = 16 # sysconfig -q inet icmp_rejectcodemask > /tmp/icmp_rejectcodemask_merge # sysconfigdb -m -f /tmp/icmp_rejectcodemask_merge inet # sysconfigdb -l inet inet: icmp_rejectcodemask = 16 RESOLUTION: Until the corrections are available in a mainstream release patch kit, HP is releasing the following Early Release Patch (ERP) kits publicly for use by any customer. The ERP kits use dupatch to install and will not install over any installed Customer Specific Patches (CSPs) that have file intersections with the ERPs. Contact your service provider for assistance if the ERP installation is blocked by any of your installed CSPs. The fixes contained in the ERP kits are scheduled to be available in the following mainstream patch kits: HP Tru64 Unix 5.1B-4 Early Release Patches The ERPs deliver the following file: /sys/BINARY/inet.mod HP Tru64 UNIX 5.1B-3 ERP Kit Name: T64KIT0025925-V51BB26-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025925-V51BB26-ES-20050628 MD5 checksum: 129251787a426320af16cd584b982027 HP Tru64 UNIX 5.1B-2/PK4 ERP Kit Name: T64KIT0025924-V51BB25-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025924-V51BB25-ES-20050628 MD5 checksum: 5fcc77a6876db6d10ef07ac96e11b3af HP Tru64 UNIX 5.1A PK6 ERP Kit Name: T64KIT0025922-V51AB24-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025922-V51AB24-ES-20050628 MD5 checksum: 7c373b35c95945651a1cfda96bf71421 HP Tru64 UNIX 4.0G PK4 ERP Kit Name: T64KIT0025920-V40GB22-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025920-V40GB22-ES-20050628 MD5 checksum: 13849fd555239d75d300d1cb46dc995f HP Tru64 UNIX 4.0F PK8 ERP Kit Name: DUXKIT0025921-V40FB22-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025920-V40GB22-ES-20050628 MD5 checksum: 743b614d39f185802701b7f2dd14ffa5 MD5 checksums are available from the ITRC patch database main page: http://www.itrc.hp.com/service/patch/mainPage.do - From the patch database main page, click Tru64 UNIX, then click verifying MD5 checksums under useful links. General ITRC Patch Page: http://www.itrc.hp.com/service/patch/mainPage SUPPORT: For further information, contact normal HP Services support channel. REPORT: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com. It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To obtain the security-alert PGP key please send an e-mail message to security-alert@hp.com with the Subject of 'get key' (no quotes). SUBSCRIBE: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA& langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your IRTC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your IRTC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page Subscriber's choice for Business: sign-in. On the Web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number: GN = HP General SW, MA = HP Management Agents, MI = Misc. 3rd party SW, MP = HP MPE/iX, NS = HP NonStop Servers, OV = HP OpenVMS, PI = HP Printing & Imaging, ST = HP Storage SW, TL = HP Trusted Linux, TU = HP Tru64 UNIX, UX = HP-UX, VV = HP Virtual Vault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." (c)Copyright 2005 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: PGP 8.1 iQA/AwUBQtuSLuAfOvwtKn1ZEQJXrwCgpDVfLyXvXZd3sF6bswgQ3DLz5jcAoNt2 As7Gf9BY697IdlYjIlmrirG1 =143G -----END PGP SIGNATURE-----
VAR-200106-0093 CVE-2001-0376 Sun Solaris SNMP proxy agent /opt/SUNWssp/bin/snmpd contains buffer overflow CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
SonicWALL Tele2 and SOHO firewalls with 6.0.0.0 firmware using IPSEC with IKE pre-shared keys do not allow for the use of full 128 byte IKE pre-shared keys, which is the intended design of the IKE pre-shared key, and only support 48 byte keys. This allows a remote attacker to brute force attack the pre-shared keys with significantly less resources than if the full 128 byte IKE pre-shared keys were used. The SNMP proxy agent on certain large Solaris systems contains a buffer overflow. It may be possible, though it is unconfirmed, that an intruder could use this flaw to execute code with root privileges. Solaris is the Unix Operating System variant distributed and maintained by Sun Microsystems. Solaris is a freely available operating system designed to run on systems of varying size with maximum scalability. A problem with the SNMP Daemon included in the SUNWsspop package results in a buffer overflow, and potentially the execution of arbitrary code. Upon parsing the argv[0] variable from the command line, this information is stored in a static buffer. The static buffer is vulnerable to being overflowed at 700 bytes of data. This vulnerability is only present on systems acting as the System Service Processor for an E10000, or on any system with the SUNWsspop package installed. Tele2 is prone to a remote security vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Internet Security Systems Security Alert Summary April 5, 2001 Volume 6 Number 5 X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php This summary can be found at http://xforce.iss.net/alerts/vol-6_num-5.php _____ Contents: * 80 Reported Vulnerabilities * Risk Factor Key _____ Date Reported: 03/01/2001 Brief Description: Palm OS Debug Mode allows attacker to bypass password Risk Factor: Low Attack Type: Host Based Platforms Affected: Palm OS 3.5.2, Palm OS 3.3 Vulnerability: palm-debug-bypass-password X-Force URL: http://xforce.iss.net/static/6196.php Date Reported: 03/01/2001 Brief Description: Microsoft Exchange malformed URL request could cause a denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Microsoft Exchange 2000 Vulnerability: exchange-malformed-url-dos X-Force URL: http://xforce.iss.net/static/6172.php Date Reported: 03/02/2001 Brief Description: Mailx buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: OpenLinux 2.4, OpenLinux 2.3, Linux Debian 2.2 Vulnerability: mailx-bo X-Force URL: http://xforce.iss.net/static/6181.php Date Reported: 03/02/2001 Brief Description: SunFTP allows attackers to gain unauthorized file access Risk Factor: Low Attack Type: Host Based Platforms Affected: SunFTP 1.0 Build 9 Vulnerability: sunftp-gain-access X-Force URL: http://xforce.iss.net/static/6195.php Date Reported: 03/02/2001 Brief Description: WinZip /zipandemail option buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows 2000 All versions, Winzip 8.0, Windows NT All versions Vulnerability: winzip-zipandemail-bo X-Force URL: http://xforce.iss.net/static/6191.php Date Reported: 03/04/2001 Brief Description: Broker FTP Server allows remote attacker to delete files outside the FTP root Risk Factor: Medium Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-delete-files X-Force URL: http://xforce.iss.net/static/6190.php Date Reported: 03/04/2001 Brief Description: Broker FTP allows remote user to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-list-directories X-Force URL: http://xforce.iss.net/static/6189.php Date Reported: 03/04/2001 Brief Description: INDEXU allows attackers to gain unauthorized system access Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: INDEXU 2.0beta and earlier Vulnerability: indexu-gain-access X-Force URL: http://xforce.iss.net/static/6202.php Date Reported: 03/04/2001 Brief Description: Fastream FTP++ Client allows user to download files outside of Web root directory Risk Factor: Medium Attack Type: Network Based Platforms Affected: Fastream FTP++ Server 2.0 Vulnerability: fastream-ftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6187.php Date Reported: 03/04/2001 Brief Description: SlimServe HTTPd directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: SlimServe HTTPd 1.1 and earlier Vulnerability: slimserve-httpd-directory-traversal X-Force URL: http://xforce.iss.net/static/6186.php Date Reported: 03/04/2001 Brief Description: WFTPD Pro buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: WFTPD Pro 3.00 Vulnerability: wftpd-pro-bo X-Force URL: http://xforce.iss.net/static/6184.php Date Reported: 03/05/2001 Brief Description: IRCd tkserv buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: IRCd All versions, tkserv 1.3.0 and earlier Vulnerability: irc-tkserv-bo X-Force URL: http://xforce.iss.net/static/6193.php Date Reported: 03/06/2001 Brief Description: War FTPD could allow attackers to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: WarFTPD 1.67b4 Vulnerability: warftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6197.php Date Reported: 03/06/2001 Brief Description: Internet Explorer could allow execution of commands when used with Telnet Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Internet Explorer 5.5, Services for Unix 2.0, Windows NT All versions, Windows 2000 All versions, Internet Explorer 5.01 Vulnerability: ie-telnet-execute-commands X-Force URL: http://xforce.iss.net/static/6230.php Date Reported: 03/07/2001 Brief Description: Cisco Aironet Web access allows remote attacker to view/modify configuration Risk Factor: Low Attack Type: Network Based Platforms Affected: Aironet 340 Series Wireless Bridge Firmware 8.07, Aironet 340 Series Wireless Bridge Firmware 8.24, Aironet 340 Series Wireless Bridge Firmware 7.x Vulnerability: cisco-aironet-web-access X-Force URL: http://xforce.iss.net/static/6200.php Date Reported: 03/07/2001 Brief Description: Netscape Directory Server buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Netscape Directory Server 4.1, Netscape Directory Server 4.12, Windows NT All versions Vulnerability: netscape-directory-server-bo X-Force URL: http://xforce.iss.net/static/6233.php Date Reported: 03/07/2001 Brief Description: Proftpd contains configuration error in postinst script when running as root Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-postinst-root X-Force URL: http://xforce.iss.net/static/6208.php Date Reported: 03/07/2001 Brief Description: proftpd /var symlink Risk Factor: Medium Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-var-symlink X-Force URL: http://xforce.iss.net/static/6209.php Date Reported: 03/07/2001 Brief Description: man2html remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: man2html prior to 1.5.23 Vulnerability: man2html-remote-dos X-Force URL: http://xforce.iss.net/static/6211.php Date Reported: 03/07/2001 Brief Description: Linux ePerl buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, ePerl prior to 2.2.14, Linux Debian 2.2, Linux Mandrake 7.1 Vulnerability: linux-eperl-bo X-Force URL: http://xforce.iss.net/static/6198.php Date Reported: 03/08/2001 Brief Description: Novell NetWare could allow attackers to gain unauthorized access Risk Factor: Medium Attack Type: Network Based Platforms Affected: Novell NetWare 4.01, Novell NetWare 5.1, Novell NetWare 3.1, Novell NetWare 4.11, Novell NetWare 5.0 Vulnerability: novell-netware-unauthorized-access X-Force URL: http://xforce.iss.net/static/6215.php Date Reported: 03/08/2001 Brief Description: Linux sgml-tools symlink attack Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, sgml-tools prior to 1.0.9-15, Linux Mandrake 7.2, Linux Immunix OS 6.2, Linux Immunix OS 7.0 Beta, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Red Hat 6.2, Linux Debian 2.2, Linux Mandrake 7.1, Linux Red Hat 5.2 Vulnerability: sgmltools-symlink X-Force URL: http://xforce.iss.net/static/6201.php Date Reported: 03/08/2001 Brief Description: HP-UX asecure denial of service Risk Factor: Medium Attack Type: Host Based Platforms Affected: HP-UX 10.10, HP-UX 10.20, HP-UX 11, HP-UX 10.01 Vulnerability: hp-asecure-dos X-Force URL: http://xforce.iss.net/static/6212.php Date Reported: 03/08/2001 Brief Description: ascdc Afterstep buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: ascdc 0.3 Vulnerability: ascdc-afterstep-bo X-Force URL: http://xforce.iss.net/static/6204.php Date Reported: 03/08/2001 Brief Description: Microsoft IIS WebDAV denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: IIS 5.0 Vulnerability: iis-webdav-dos X-Force URL: http://xforce.iss.net/static/6205.php Date Reported: 03/08/2001 Brief Description: WEBsweeper HTTP request denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: WEBsweeper 4.0, Windows NT All versions Vulnerability: websweeper-http-dos X-Force URL: http://xforce.iss.net/static/6214.php Date Reported: 03/09/2001 Brief Description: FOLDOC allows remote attackers to execute commands Risk Factor: Medium Attack Type: Network Based Platforms Affected: FOLDEC All versions Vulnerability: foldoc-cgi-execute-commands X-Force URL: http://xforce.iss.net/static/6217.php Date Reported: 03/09/2001 Brief Description: slrn newsreader wrapping/unwrapping buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Immunix OS 7.0 Beta, Linux Debian 2.2, Linux Red Hat 7.0, Linux Immunix OS 6.2, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2 Vulnerability: slrn-wrapping-bo X-Force URL: http://xforce.iss.net/static/6213.php Date Reported: 03/09/2001 Brief Description: Linux mutt package contains format string when using IMAP Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Mandrake 7.0, Linux Mandrake 7.1, Linux Conectiva, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2, Linux Red Hat 5.2 Vulnerability: mutt-imap-format-string X-Force URL: http://xforce.iss.net/static/6235.php Date Reported: 03/10/2001 Brief Description: FormMail could be used to flood servers with anonymous email Risk Factor: High Attack Type: Network Based Platforms Affected: FormMail 1.0 to 1.6, Linux All versions Vulnerability: formmail-anonymous-flooding X-Force URL: http://xforce.iss.net/static/6242.php Date Reported: 03/11/2001 Brief Description: Half-Life Server config file buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-config-file-bo X-Force URL: http://xforce.iss.net/static/6221.php Date Reported: 03/11/2001 Brief Description: Half-Life Server exec command buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-exec-bo X-Force URL: http://xforce.iss.net/static/6219.php Date Reported: 03/11/2001 Brief Description: Half-Life Server map command buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-bo X-Force URL: http://xforce.iss.net/static/6218.php Date Reported: 03/11/2001 Brief Description: Half-Life Server 'map' command format string Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-format-string X-Force URL: http://xforce.iss.net/static/6220.php Date Reported: 03/11/2001 Brief Description: Ikonboard allows remote attackers to read files Risk Factor: Medium Attack Type: Network Based Platforms Affected: Ikonboard 2.1.7b and earlier Vulnerability: ikonboard-cgi-read-files X-Force URL: http://xforce.iss.net/static/6216.php Date Reported: 03/12/2001 Brief Description: timed daemon remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Linux SuSE 7.1, Linux Mandrake 7.2, Linux SuSE 7.0, Linux- Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, FreeBSD 4.x, Linux Mandrake 7.0, Linux SuSE 6.1, Linux Mandrake 7.1, FreeBSD 3.x, Linux SuSE 6.3, Linux SuSE 6.4, Linux SuSE 6.2 Vulnerability: timed-remote-dos X-Force URL: http://xforce.iss.net/static/6228.php Date Reported: 03/12/2001 Brief Description: imap, ipop2d and ipop3d buffer overflows Risk Factor: Low Attack Type: Network Based Platforms Affected: OpenLinux eServer 2.3.1, OpenLinux eBuilder for ECential 3.0, OpenLinux eDesktop 2.4, OpenLinux 2.3, Linux SuSE 6.1, Linux Conectiva Vulnerability: imap-ipop2d-ipop3d-bo X-Force URL: http://xforce.iss.net/static/6269.php Date Reported: 03/12/2001 Brief Description: rwhod remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: FreeBSD 3.x, FreeBSD 4.x, Unix All versions Vulnerability: rwhod-remote-dos X-Force URL: http://xforce.iss.net/static/6229.php Date Reported: 03/13/2001 Brief Description: SunOS snmpd argv[0] buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: SunOS 5.8 Vulnerability: snmpd-argv-bo X-Force URL: http://xforce.iss.net/static/6239.php Date Reported: 03/13/2001 Brief Description: Mesa utah-glx symbolic link Risk Factor: Medium Attack Type: Host Based Platforms Affected: Mesa prior to 3.3-14, Linux Mandrake 7.2 Vulnerability: mesa-utahglx-symlink X-Force URL: http://xforce.iss.net/static/6231.php Date Reported: 03/14/2001 Brief Description: Linux FTPfs buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux 2.2.x, FTPfs 0.1.1 Vulnerability: ftpfs-bo X-Force URL: http://xforce.iss.net/static/6234.php Date Reported: 03/15/2001 Brief Description: Solaris snmpXdmid malformed DMI request buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Solaris 7, Solaris 8, Solaris 2.6 Vulnerability: solaris-snmpxdmid-bo X-Force URL: http://xforce.iss.net/static/6245.php Date Reported: 03/15/2001 Brief Description: vBulletin PHP Web forum allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Network Based Platforms Affected: vBulletin 1.1.5 and earlier, vBulletin 2.0beta2 and earlier, Windows All versions, Unix All versions Vulnerability: vbulletin-php-elevate-privileges X-Force URL: http://xforce.iss.net/static/6237.php Date Reported: 03/15/2001 Brief Description: MDaemon WorldClient Web services denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows NT All versions, Windows 2000 All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-webservices-dos X-Force URL: http://xforce.iss.net/static/6240.php Date Reported: 03/16/2001 Brief Description: SSH ssheloop.c denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: SSH for Windows Server 2.4, SSH for Windows Server 2.5, Windows All versions Vulnerability: ssh-ssheloop-dos X-Force URL: http://xforce.iss.net/static/6241.php Date Reported: 03/18/2001 Brief Description: Eudora HTML emails could allow remote execution of code Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows All versions, Eudora 5.0.2 Vulnerability: eudora-html-execute-code X-Force URL: http://xforce.iss.net/static/6262.php Date Reported: 03/19/2001 Brief Description: ASPSeek s.cgi buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux All versions, ASPSeek 1.0.3 and earlier Vulnerability: aspseek-scgi-bo X-Force URL: http://xforce.iss.net/static/6248.php Date Reported: 03/20/2001 Brief Description: HSLCTF HTTP denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: AIX All versions, Unix All versions, HSLCTF 1.0 Vulnerability: hslctf-http-dos X-Force URL: http://xforce.iss.net/static/6250.php Date Reported: 03/20/2001 Brief Description: LICQ received URL execute commands Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, LICQ All, Linux Mandrake 7.1, Linux Red Hat 7.0, Linux Mandrake 7.2 Vulnerability: licq-url-execute-commands X-Force URL: http://xforce.iss.net/static/6261.php Date Reported: 03/20/2001 Brief Description: SurfControl SuperScout allows user to bypass filtering rules Risk Factor: Medium Attack Type: Network Based Platforms Affected: SurfControl SuperScout 3.0.2 and prior, Windows NT 4.0, Windows 2000 All versions Vulnerability: superscout-bypass-filtering X-Force URL: http://xforce.iss.net/static/6300.php Date Reported: 03/20/2001 Brief Description: DGUX lpsched buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: DG/UX All versions Vulnerability: dgux-lpsched-bo X-Force URL: http://xforce.iss.net/static/6258.php Date Reported: 03/20/2001 Brief Description: REDIPlus stock trading software stores passwords in plaintext Risk Factor: Medium Attack Type: Host Based Platforms Affected: REDIPlus 1.0, Windows All versions Vulnerability: rediplus-weak-security X-Force URL: http://xforce.iss.net/static/6276.php Date Reported: 03/20/2001 Brief Description: FCheck open() function allows the execution of commands Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO All versions, FCheck prior to 2.07.59, SunOS All versions, Windows All versions, Unix All versions, HP-UX All versions, Linux All versions, Solaris All versions, AIX All versions, BSD All versions Vulnerability: fcheck-open-execute-commands X-Force URL: http://xforce.iss.net/static/6256.php Date Reported: 03/20/2001 Brief Description: NTMail long URL denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows 2000 All versions, NTMail 6, Windows NT 4.0 Vulnerability: ntmail-long-url-dos X-Force URL: http://xforce.iss.net/static/6249.php Date Reported: 03/21/2001 Brief Description: VIM text editor allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: VIM All versions, Linux Red Hat 5.2, Linux Red Hat 6.2, Linux Red Hat 7.0 Vulnerability: vim-elevate-privileges X-Force URL: http://xforce.iss.net/static/6259.php Date Reported: 03/22/2001 Brief Description: FreeBSD UFS/EXT2FS could allow disclosure of deleted data Risk Factor: Medium Attack Type: Host Based Platforms Affected: UFS All versions, EXT2FS All versions, FreeBSD All versions Vulnerability: ufs-ext2fs-data-disclosure X-Force URL: http://xforce.iss.net/static/6268.php Date Reported: 03/22/2001 Brief Description: Microsoft invalid digital certificates could be used for spoofing Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows ME All versions, Windows 95 All versions, Windows 98 All versions, Windows 2000 All versions, Windows NT All versions Vulnerability: microsoft-invalid-digital-certificates X-Force URL: http://xforce.iss.net/static/6265.php Date Reported: 03/23/2001 Brief Description: Akopia Interchange could allow attacker to gain administrative access Risk Factor: Low Attack Type: Network Based Platforms Affected: Akopia Interchange 4.5.3 and 4.6.3 Vulnerability: akopia-interchange-gain-access X-Force URL: http://xforce.iss.net/static/6273.php Date Reported: 03/23/2001 Brief Description: Solaris /opt/JSParm/bin/perfmon allows user to create files with root privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 2.x Vulnerability: solaris-perfmon-create-files X-Force URL: http://xforce.iss.net/static/6267.php Date Reported: 03/23/2001 Brief Description: Windows user.dmp file insecure permissions Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows NT All versions, Windows 2000 All versions Vulnerability: win-userdmp-insecure-permission X-Force URL: http://xforce.iss.net/static/6275.php Date Reported: 03/23/2001 Brief Description: Compaq Web-enabled management software could allow users to bypass proxy settings Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Compaq Web-Enabled Management All versions Vulnerability: compaq-wbm-bypass-proxy X-Force URL: http://xforce.iss.net/static/6264.php Date Reported: 03/25/2001 Brief Description: MDaemon IMAP SELECT and EXAMINE command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-imap-command-dos X-Force URL: http://xforce.iss.net/static/6279.php Date Reported: 03/25/2001 Brief Description: HP-UX 11.11 newgrp(1) command allows users to gain additional privileges Risk Factor: High Attack Type: Host Based Platforms Affected: HP-UX 11.11 Vulnerability: hp-newgrp-additional-privileges X-Force URL: http://xforce.iss.net/static/6282.php Date Reported: 03/26/2001 Brief Description: 602Pro LAN SUITE webprox.dll denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, 602Pro LAN SUITE 2000a All versions Vulnerability: lan-suite-webprox-dos X-Force URL: http://xforce.iss.net/static/6281.php Date Reported: 03/26/2001 Brief Description: BEA WebLogic Server could allow attackers to browse Web directories Risk Factor: High Attack Type: Network Based Platforms Affected: WebLogic Server 6.0, Windows All versions Vulnerability: weblogic-browse-directories X-Force URL: http://xforce.iss.net/static/6283.php Date Reported: 03/27/2001 Brief Description: Solaris tip buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 8, Solaris 2.5.1, Solaris 2.6, Solaris 7 Vulnerability: solaris-tip-bo X-Force URL: http://xforce.iss.net/static/6284.php Date Reported: 03/27/2001 Brief Description: SonicWALL IKE pre-shared key is 48 bytes instead of 128 bytes Risk Factor: Medium Attack Type: Network Based Platforms Affected: SonicWALL TELE2 6.0.0, SonicWALL SOHO2 6.0.0 Vulnerability: sonicwall-ike-shared-keys X-Force URL: http://xforce.iss.net/static/6304.php Date Reported: 03/27/2001 Brief Description: Anaconda Foundation Clipper directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Anaconda Foundation Clipper 3.3 Vulnerability: anaconda-clipper-directory-traversal X-Force URL: http://xforce.iss.net/static/6286.php Date Reported: 03/27/2001 Brief Description: Microsoft Visual Studio VB-TSQL buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows 2000 All versions, Microsoft Visual Studio 6.0 Enterprise Ed., Windows NT All versions Vulnerability: visual-studio-vbtsql-bo X-Force URL: http://xforce.iss.net/static/6288.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer deliver buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-deliver-bo X-Force URL: http://xforce.iss.net/static/6302.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpadmin buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpadmin-bo X-Force URL: http://xforce.iss.net/static/6291.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpforms buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpforms-bo X-Force URL: http://xforce.iss.net/static/6293.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpshut buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpshut-bo X-Force URL: http://xforce.iss.net/static/6290.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpusers buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpusers-bo X-Force URL: http://xforce.iss.net/static/6292.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer recon buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-recon-bo X-Force URL: http://xforce.iss.net/static/6289.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer sendmail buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-sendmail-bo X-Force URL: http://xforce.iss.net/static/6303.php Date Reported: 03/28/2001 Brief Description: Inframail POST command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Inframail 3.97a and earlier, Linux All versions Vulnerability: inframail-post-dos X-Force URL: http://xforce.iss.net/static/6297.php Date Reported: 03/28/2001 Brief Description: Cisco VPN 3000 Concentrators Telnet denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco VPN 3000 Concentrators prior to 3.0.00 Vulnerability: cisco-vpn-telnet-dos X-Force URL: http://xforce.iss.net/static/6298.php Date Reported: 03/28/2001 Brief Description: WebSite Professional remote manager service denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: O'Reilly WebSite Pro 3.0.37 Vulnerability: website-pro-remote-dos X-Force URL: http://xforce.iss.net/static/6295.php Date Reported: 03/28/2001 Brief Description: Windows Me and Plus! 98 could allow the recovery of Compressed Folder passwords Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows 98 All versions, Windows 98 Second Edition, Windows ME All versions Vulnerability: win-compressed-password-recovery X-Force URL: http://xforce.iss.net/static/6294.php _____ Risk Factor Key: High Any vulnerability that provides an attacker with immediate access into a machine, gains superuser access, or bypasses a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. Medium Any vulnerability that provides information that has a high potential of giving system access to an intruder. Example: A misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password. Low Any vulnerability that provides information that potentially could lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods. ________ Internet Security Systems is the leading global provider of security management solutions for the Internet, protecting digital assets and ensuring safe and uninterrupted e-business. With its industry-leading intrusion detection and vulnerability assessment, remote managed security services, and strategic consulting and education offerings, ISS is a trusted security provider to more than 8,000 customers worldwide including 21 of the 25 largest U.S. commercial banks and the top 10 U.S. telecommunications companies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe, Latin America and the Middle East. For more information, visit the Internet Security Systems web site at www.iss.net or call 888-901-7477. Copyright (c) 2001 by Internet Security Systems, Inc. Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server. Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBOszkuDRfJiV99eG9AQFlewP8C6v84pW6UR171S6OThwkg/P7ylXIMY3P jO+w8ohAvbsa90iLFMlGo6YY0pIKSwlacQErryVFfVcRLQ1gIQhBxoIQlwrNkB6m XWnhroR/R7rzatML9cnHzpQKUK7Hax3LSxdxZQQwIDISxBZ4aeOTQwD+seuIos8t 8PVD8c9UO3g= =1xgg -----END PGP SIGNATURE-----
VAR-200103-0029 CVE-2000-0368 Classic Cisco IOS Access sensitive data vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Classic Cisco IOS 9.1 and later allows attackers with access to the login prompt to obtain portions of the command history of previous users, which may allow the attacker to access sensitive data. IOS is prone to a local security vulnerability. Vulnerabilities exist in Classic Cisco IOS 9.1 and later versions
VAR-200106-0028 CVE-2001-0151 Sun Solaris SNMP proxy agent /opt/SUNWssp/bin/snmpd contains buffer overflow CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
IIS 5.0 allows remote attackers to cause a denial of service via a series of malformed WebDAV requests. The SNMP proxy agent on certain large Solaris systems contains a buffer overflow. It may be possible, though it is unconfirmed, that an intruder could use this flaw to execute code with root privileges. Microsoft IIS of Web DAV Has a flaw in handling invalid requests, CPU There is a vulnerability that uses a lot of resources.Web DAV Service disruption (DoS) It may be in a state. Solaris is the Unix Operating System variant distributed and maintained by Sun Microsystems. Solaris is a freely available operating system designed to run on systems of varying size with maximum scalability. A problem with the SNMP Daemon included in the SUNWsspop package results in a buffer overflow, and potentially the execution of arbitrary code. Upon parsing the argv[0] variable from the command line, this information is stored in a static buffer. The static buffer is vulnerable to being overflowed at 700 bytes of data. This vulnerability is only present on systems acting as the System Service Processor for an E10000, or on any system with the SUNWsspop package installed. This vulnerability is also known to restart all IIS services. WebDAV contains a flaw in the handling of certain malformed requests. Submitting a valid WebDAV request containing numerous ':' could cause a remote restart of the server. This vulnerability has been known to affect the server performance and could lead to a denial of service condition, however this has not been verified. -----BEGIN PGP SIGNED MESSAGE----- Internet Security Systems Security Alert Summary April 5, 2001 Volume 6 Number 5 X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php This summary can be found at http://xforce.iss.net/alerts/vol-6_num-5.php _____ Contents: * 80 Reported Vulnerabilities * Risk Factor Key _____ Date Reported: 03/01/2001 Brief Description: Palm OS Debug Mode allows attacker to bypass password Risk Factor: Low Attack Type: Host Based Platforms Affected: Palm OS 3.5.2, Palm OS 3.3 Vulnerability: palm-debug-bypass-password X-Force URL: http://xforce.iss.net/static/6196.php Date Reported: 03/01/2001 Brief Description: Microsoft Exchange malformed URL request could cause a denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Microsoft Exchange 2000 Vulnerability: exchange-malformed-url-dos X-Force URL: http://xforce.iss.net/static/6172.php Date Reported: 03/02/2001 Brief Description: Mailx buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: OpenLinux 2.4, OpenLinux 2.3, Linux Debian 2.2 Vulnerability: mailx-bo X-Force URL: http://xforce.iss.net/static/6181.php Date Reported: 03/02/2001 Brief Description: SunFTP allows attackers to gain unauthorized file access Risk Factor: Low Attack Type: Host Based Platforms Affected: SunFTP 1.0 Build 9 Vulnerability: sunftp-gain-access X-Force URL: http://xforce.iss.net/static/6195.php Date Reported: 03/02/2001 Brief Description: WinZip /zipandemail option buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows 2000 All versions, Winzip 8.0, Windows NT All versions Vulnerability: winzip-zipandemail-bo X-Force URL: http://xforce.iss.net/static/6191.php Date Reported: 03/04/2001 Brief Description: Broker FTP Server allows remote attacker to delete files outside the FTP root Risk Factor: Medium Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-delete-files X-Force URL: http://xforce.iss.net/static/6190.php Date Reported: 03/04/2001 Brief Description: Broker FTP allows remote user to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-list-directories X-Force URL: http://xforce.iss.net/static/6189.php Date Reported: 03/04/2001 Brief Description: INDEXU allows attackers to gain unauthorized system access Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: INDEXU 2.0beta and earlier Vulnerability: indexu-gain-access X-Force URL: http://xforce.iss.net/static/6202.php Date Reported: 03/04/2001 Brief Description: Fastream FTP++ Client allows user to download files outside of Web root directory Risk Factor: Medium Attack Type: Network Based Platforms Affected: Fastream FTP++ Server 2.0 Vulnerability: fastream-ftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6187.php Date Reported: 03/04/2001 Brief Description: SlimServe HTTPd directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: SlimServe HTTPd 1.1 and earlier Vulnerability: slimserve-httpd-directory-traversal X-Force URL: http://xforce.iss.net/static/6186.php Date Reported: 03/04/2001 Brief Description: WFTPD Pro buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: WFTPD Pro 3.00 Vulnerability: wftpd-pro-bo X-Force URL: http://xforce.iss.net/static/6184.php Date Reported: 03/05/2001 Brief Description: IRCd tkserv buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: IRCd All versions, tkserv 1.3.0 and earlier Vulnerability: irc-tkserv-bo X-Force URL: http://xforce.iss.net/static/6193.php Date Reported: 03/06/2001 Brief Description: War FTPD could allow attackers to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: WarFTPD 1.67b4 Vulnerability: warftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6197.php Date Reported: 03/06/2001 Brief Description: Internet Explorer could allow execution of commands when used with Telnet Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Internet Explorer 5.5, Services for Unix 2.0, Windows NT All versions, Windows 2000 All versions, Internet Explorer 5.01 Vulnerability: ie-telnet-execute-commands X-Force URL: http://xforce.iss.net/static/6230.php Date Reported: 03/07/2001 Brief Description: Cisco Aironet Web access allows remote attacker to view/modify configuration Risk Factor: Low Attack Type: Network Based Platforms Affected: Aironet 340 Series Wireless Bridge Firmware 8.07, Aironet 340 Series Wireless Bridge Firmware 8.24, Aironet 340 Series Wireless Bridge Firmware 7.x Vulnerability: cisco-aironet-web-access X-Force URL: http://xforce.iss.net/static/6200.php Date Reported: 03/07/2001 Brief Description: Netscape Directory Server buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Netscape Directory Server 4.1, Netscape Directory Server 4.12, Windows NT All versions Vulnerability: netscape-directory-server-bo X-Force URL: http://xforce.iss.net/static/6233.php Date Reported: 03/07/2001 Brief Description: Proftpd contains configuration error in postinst script when running as root Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-postinst-root X-Force URL: http://xforce.iss.net/static/6208.php Date Reported: 03/07/2001 Brief Description: proftpd /var symlink Risk Factor: Medium Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-var-symlink X-Force URL: http://xforce.iss.net/static/6209.php Date Reported: 03/07/2001 Brief Description: man2html remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: man2html prior to 1.5.23 Vulnerability: man2html-remote-dos X-Force URL: http://xforce.iss.net/static/6211.php Date Reported: 03/07/2001 Brief Description: Linux ePerl buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, ePerl prior to 2.2.14, Linux Debian 2.2, Linux Mandrake 7.1 Vulnerability: linux-eperl-bo X-Force URL: http://xforce.iss.net/static/6198.php Date Reported: 03/08/2001 Brief Description: Novell NetWare could allow attackers to gain unauthorized access Risk Factor: Medium Attack Type: Network Based Platforms Affected: Novell NetWare 4.01, Novell NetWare 5.1, Novell NetWare 3.1, Novell NetWare 4.11, Novell NetWare 5.0 Vulnerability: novell-netware-unauthorized-access X-Force URL: http://xforce.iss.net/static/6215.php Date Reported: 03/08/2001 Brief Description: Linux sgml-tools symlink attack Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, sgml-tools prior to 1.0.9-15, Linux Mandrake 7.2, Linux Immunix OS 6.2, Linux Immunix OS 7.0 Beta, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Red Hat 6.2, Linux Debian 2.2, Linux Mandrake 7.1, Linux Red Hat 5.2 Vulnerability: sgmltools-symlink X-Force URL: http://xforce.iss.net/static/6201.php Date Reported: 03/08/2001 Brief Description: HP-UX asecure denial of service Risk Factor: Medium Attack Type: Host Based Platforms Affected: HP-UX 10.10, HP-UX 10.20, HP-UX 11, HP-UX 10.01 Vulnerability: hp-asecure-dos X-Force URL: http://xforce.iss.net/static/6212.php Date Reported: 03/08/2001 Brief Description: ascdc Afterstep buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: ascdc 0.3 Vulnerability: ascdc-afterstep-bo X-Force URL: http://xforce.iss.net/static/6204.php Date Reported: 03/08/2001 Brief Description: Microsoft IIS WebDAV denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: IIS 5.0 Vulnerability: iis-webdav-dos X-Force URL: http://xforce.iss.net/static/6205.php Date Reported: 03/08/2001 Brief Description: WEBsweeper HTTP request denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: WEBsweeper 4.0, Windows NT All versions Vulnerability: websweeper-http-dos X-Force URL: http://xforce.iss.net/static/6214.php Date Reported: 03/09/2001 Brief Description: FOLDOC allows remote attackers to execute commands Risk Factor: Medium Attack Type: Network Based Platforms Affected: FOLDEC All versions Vulnerability: foldoc-cgi-execute-commands X-Force URL: http://xforce.iss.net/static/6217.php Date Reported: 03/09/2001 Brief Description: slrn newsreader wrapping/unwrapping buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Immunix OS 7.0 Beta, Linux Debian 2.2, Linux Red Hat 7.0, Linux Immunix OS 6.2, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2 Vulnerability: slrn-wrapping-bo X-Force URL: http://xforce.iss.net/static/6213.php Date Reported: 03/09/2001 Brief Description: Linux mutt package contains format string when using IMAP Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Mandrake 7.0, Linux Mandrake 7.1, Linux Conectiva, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2, Linux Red Hat 5.2 Vulnerability: mutt-imap-format-string X-Force URL: http://xforce.iss.net/static/6235.php Date Reported: 03/10/2001 Brief Description: FormMail could be used to flood servers with anonymous email Risk Factor: High Attack Type: Network Based Platforms Affected: FormMail 1.0 to 1.6, Linux All versions Vulnerability: formmail-anonymous-flooding X-Force URL: http://xforce.iss.net/static/6242.php Date Reported: 03/11/2001 Brief Description: Half-Life Server config file buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-config-file-bo X-Force URL: http://xforce.iss.net/static/6221.php Date Reported: 03/11/2001 Brief Description: Half-Life Server exec command buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-exec-bo X-Force URL: http://xforce.iss.net/static/6219.php Date Reported: 03/11/2001 Brief Description: Half-Life Server map command buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-bo X-Force URL: http://xforce.iss.net/static/6218.php Date Reported: 03/11/2001 Brief Description: Half-Life Server 'map' command format string Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-format-string X-Force URL: http://xforce.iss.net/static/6220.php Date Reported: 03/11/2001 Brief Description: Ikonboard allows remote attackers to read files Risk Factor: Medium Attack Type: Network Based Platforms Affected: Ikonboard 2.1.7b and earlier Vulnerability: ikonboard-cgi-read-files X-Force URL: http://xforce.iss.net/static/6216.php Date Reported: 03/12/2001 Brief Description: timed daemon remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Linux SuSE 7.1, Linux Mandrake 7.2, Linux SuSE 7.0, Linux- Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, FreeBSD 4.x, Linux Mandrake 7.0, Linux SuSE 6.1, Linux Mandrake 7.1, FreeBSD 3.x, Linux SuSE 6.3, Linux SuSE 6.4, Linux SuSE 6.2 Vulnerability: timed-remote-dos X-Force URL: http://xforce.iss.net/static/6228.php Date Reported: 03/12/2001 Brief Description: imap, ipop2d and ipop3d buffer overflows Risk Factor: Low Attack Type: Network Based Platforms Affected: OpenLinux eServer 2.3.1, OpenLinux eBuilder for ECential 3.0, OpenLinux eDesktop 2.4, OpenLinux 2.3, Linux SuSE 6.1, Linux Conectiva Vulnerability: imap-ipop2d-ipop3d-bo X-Force URL: http://xforce.iss.net/static/6269.php Date Reported: 03/12/2001 Brief Description: rwhod remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: FreeBSD 3.x, FreeBSD 4.x, Unix All versions Vulnerability: rwhod-remote-dos X-Force URL: http://xforce.iss.net/static/6229.php Date Reported: 03/13/2001 Brief Description: SunOS snmpd argv[0] buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: SunOS 5.8 Vulnerability: snmpd-argv-bo X-Force URL: http://xforce.iss.net/static/6239.php Date Reported: 03/13/2001 Brief Description: Mesa utah-glx symbolic link Risk Factor: Medium Attack Type: Host Based Platforms Affected: Mesa prior to 3.3-14, Linux Mandrake 7.2 Vulnerability: mesa-utahglx-symlink X-Force URL: http://xforce.iss.net/static/6231.php Date Reported: 03/14/2001 Brief Description: Linux FTPfs buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux 2.2.x, FTPfs 0.1.1 Vulnerability: ftpfs-bo X-Force URL: http://xforce.iss.net/static/6234.php Date Reported: 03/15/2001 Brief Description: Solaris snmpXdmid malformed DMI request buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Solaris 7, Solaris 8, Solaris 2.6 Vulnerability: solaris-snmpxdmid-bo X-Force URL: http://xforce.iss.net/static/6245.php Date Reported: 03/15/2001 Brief Description: vBulletin PHP Web forum allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Network Based Platforms Affected: vBulletin 1.1.5 and earlier, vBulletin 2.0beta2 and earlier, Windows All versions, Unix All versions Vulnerability: vbulletin-php-elevate-privileges X-Force URL: http://xforce.iss.net/static/6237.php Date Reported: 03/15/2001 Brief Description: MDaemon WorldClient Web services denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows NT All versions, Windows 2000 All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-webservices-dos X-Force URL: http://xforce.iss.net/static/6240.php Date Reported: 03/16/2001 Brief Description: SSH ssheloop.c denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: SSH for Windows Server 2.4, SSH for Windows Server 2.5, Windows All versions Vulnerability: ssh-ssheloop-dos X-Force URL: http://xforce.iss.net/static/6241.php Date Reported: 03/18/2001 Brief Description: Eudora HTML emails could allow remote execution of code Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows All versions, Eudora 5.0.2 Vulnerability: eudora-html-execute-code X-Force URL: http://xforce.iss.net/static/6262.php Date Reported: 03/19/2001 Brief Description: ASPSeek s.cgi buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux All versions, ASPSeek 1.0.3 and earlier Vulnerability: aspseek-scgi-bo X-Force URL: http://xforce.iss.net/static/6248.php Date Reported: 03/20/2001 Brief Description: HSLCTF HTTP denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: AIX All versions, Unix All versions, HSLCTF 1.0 Vulnerability: hslctf-http-dos X-Force URL: http://xforce.iss.net/static/6250.php Date Reported: 03/20/2001 Brief Description: LICQ received URL execute commands Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, LICQ All, Linux Mandrake 7.1, Linux Red Hat 7.0, Linux Mandrake 7.2 Vulnerability: licq-url-execute-commands X-Force URL: http://xforce.iss.net/static/6261.php Date Reported: 03/20/2001 Brief Description: SurfControl SuperScout allows user to bypass filtering rules Risk Factor: Medium Attack Type: Network Based Platforms Affected: SurfControl SuperScout 3.0.2 and prior, Windows NT 4.0, Windows 2000 All versions Vulnerability: superscout-bypass-filtering X-Force URL: http://xforce.iss.net/static/6300.php Date Reported: 03/20/2001 Brief Description: DGUX lpsched buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: DG/UX All versions Vulnerability: dgux-lpsched-bo X-Force URL: http://xforce.iss.net/static/6258.php Date Reported: 03/20/2001 Brief Description: REDIPlus stock trading software stores passwords in plaintext Risk Factor: Medium Attack Type: Host Based Platforms Affected: REDIPlus 1.0, Windows All versions Vulnerability: rediplus-weak-security X-Force URL: http://xforce.iss.net/static/6276.php Date Reported: 03/20/2001 Brief Description: FCheck open() function allows the execution of commands Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO All versions, FCheck prior to 2.07.59, SunOS All versions, Windows All versions, Unix All versions, HP-UX All versions, Linux All versions, Solaris All versions, AIX All versions, BSD All versions Vulnerability: fcheck-open-execute-commands X-Force URL: http://xforce.iss.net/static/6256.php Date Reported: 03/20/2001 Brief Description: NTMail long URL denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows 2000 All versions, NTMail 6, Windows NT 4.0 Vulnerability: ntmail-long-url-dos X-Force URL: http://xforce.iss.net/static/6249.php Date Reported: 03/21/2001 Brief Description: VIM text editor allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: VIM All versions, Linux Red Hat 5.2, Linux Red Hat 6.2, Linux Red Hat 7.0 Vulnerability: vim-elevate-privileges X-Force URL: http://xforce.iss.net/static/6259.php Date Reported: 03/22/2001 Brief Description: FreeBSD UFS/EXT2FS could allow disclosure of deleted data Risk Factor: Medium Attack Type: Host Based Platforms Affected: UFS All versions, EXT2FS All versions, FreeBSD All versions Vulnerability: ufs-ext2fs-data-disclosure X-Force URL: http://xforce.iss.net/static/6268.php Date Reported: 03/22/2001 Brief Description: Microsoft invalid digital certificates could be used for spoofing Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows ME All versions, Windows 95 All versions, Windows 98 All versions, Windows 2000 All versions, Windows NT All versions Vulnerability: microsoft-invalid-digital-certificates X-Force URL: http://xforce.iss.net/static/6265.php Date Reported: 03/23/2001 Brief Description: Akopia Interchange could allow attacker to gain administrative access Risk Factor: Low Attack Type: Network Based Platforms Affected: Akopia Interchange 4.5.3 and 4.6.3 Vulnerability: akopia-interchange-gain-access X-Force URL: http://xforce.iss.net/static/6273.php Date Reported: 03/23/2001 Brief Description: Solaris /opt/JSParm/bin/perfmon allows user to create files with root privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 2.x Vulnerability: solaris-perfmon-create-files X-Force URL: http://xforce.iss.net/static/6267.php Date Reported: 03/23/2001 Brief Description: Windows user.dmp file insecure permissions Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows NT All versions, Windows 2000 All versions Vulnerability: win-userdmp-insecure-permission X-Force URL: http://xforce.iss.net/static/6275.php Date Reported: 03/23/2001 Brief Description: Compaq Web-enabled management software could allow users to bypass proxy settings Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Compaq Web-Enabled Management All versions Vulnerability: compaq-wbm-bypass-proxy X-Force URL: http://xforce.iss.net/static/6264.php Date Reported: 03/25/2001 Brief Description: MDaemon IMAP SELECT and EXAMINE command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-imap-command-dos X-Force URL: http://xforce.iss.net/static/6279.php Date Reported: 03/25/2001 Brief Description: HP-UX 11.11 newgrp(1) command allows users to gain additional privileges Risk Factor: High Attack Type: Host Based Platforms Affected: HP-UX 11.11 Vulnerability: hp-newgrp-additional-privileges X-Force URL: http://xforce.iss.net/static/6282.php Date Reported: 03/26/2001 Brief Description: 602Pro LAN SUITE webprox.dll denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, 602Pro LAN SUITE 2000a All versions Vulnerability: lan-suite-webprox-dos X-Force URL: http://xforce.iss.net/static/6281.php Date Reported: 03/26/2001 Brief Description: BEA WebLogic Server could allow attackers to browse Web directories Risk Factor: High Attack Type: Network Based Platforms Affected: WebLogic Server 6.0, Windows All versions Vulnerability: weblogic-browse-directories X-Force URL: http://xforce.iss.net/static/6283.php Date Reported: 03/27/2001 Brief Description: Solaris tip buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 8, Solaris 2.5.1, Solaris 2.6, Solaris 7 Vulnerability: solaris-tip-bo X-Force URL: http://xforce.iss.net/static/6284.php Date Reported: 03/27/2001 Brief Description: SonicWALL IKE pre-shared key is 48 bytes instead of 128 bytes Risk Factor: Medium Attack Type: Network Based Platforms Affected: SonicWALL TELE2 6.0.0, SonicWALL SOHO2 6.0.0 Vulnerability: sonicwall-ike-shared-keys X-Force URL: http://xforce.iss.net/static/6304.php Date Reported: 03/27/2001 Brief Description: Anaconda Foundation Clipper directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Anaconda Foundation Clipper 3.3 Vulnerability: anaconda-clipper-directory-traversal X-Force URL: http://xforce.iss.net/static/6286.php Date Reported: 03/27/2001 Brief Description: Microsoft Visual Studio VB-TSQL buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows 2000 All versions, Microsoft Visual Studio 6.0 Enterprise Ed., Windows NT All versions Vulnerability: visual-studio-vbtsql-bo X-Force URL: http://xforce.iss.net/static/6288.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer deliver buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-deliver-bo X-Force URL: http://xforce.iss.net/static/6302.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpadmin buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpadmin-bo X-Force URL: http://xforce.iss.net/static/6291.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpforms buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpforms-bo X-Force URL: http://xforce.iss.net/static/6293.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpshut buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpshut-bo X-Force URL: http://xforce.iss.net/static/6290.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpusers buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpusers-bo X-Force URL: http://xforce.iss.net/static/6292.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer recon buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-recon-bo X-Force URL: http://xforce.iss.net/static/6289.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer sendmail buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-sendmail-bo X-Force URL: http://xforce.iss.net/static/6303.php Date Reported: 03/28/2001 Brief Description: Inframail POST command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Inframail 3.97a and earlier, Linux All versions Vulnerability: inframail-post-dos X-Force URL: http://xforce.iss.net/static/6297.php Date Reported: 03/28/2001 Brief Description: Cisco VPN 3000 Concentrators Telnet denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco VPN 3000 Concentrators prior to 3.0.00 Vulnerability: cisco-vpn-telnet-dos X-Force URL: http://xforce.iss.net/static/6298.php Date Reported: 03/28/2001 Brief Description: WebSite Professional remote manager service denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: O'Reilly WebSite Pro 3.0.37 Vulnerability: website-pro-remote-dos X-Force URL: http://xforce.iss.net/static/6295.php Date Reported: 03/28/2001 Brief Description: Windows Me and Plus! 98 could allow the recovery of Compressed Folder passwords Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows 98 All versions, Windows 98 Second Edition, Windows ME All versions Vulnerability: win-compressed-password-recovery X-Force URL: http://xforce.iss.net/static/6294.php _____ Risk Factor Key: High Any vulnerability that provides an attacker with immediate access into a machine, gains superuser access, or bypasses a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. Medium Any vulnerability that provides information that has a high potential of giving system access to an intruder. Example: A misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password. Low Any vulnerability that provides information that potentially could lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods. ________ Internet Security Systems is the leading global provider of security management solutions for the Internet, protecting digital assets and ensuring safe and uninterrupted e-business. With its industry-leading intrusion detection and vulnerability assessment, remote managed security services, and strategic consulting and education offerings, ISS is a trusted security provider to more than 8,000 customers worldwide including 21 of the 25 largest U.S. commercial banks and the top 10 U.S. telecommunications companies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe, Latin America and the Middle East. For more information, visit the Internet Security Systems web site at www.iss.net or call 888-901-7477. Copyright (c) 2001 by Internet Security Systems, Inc. Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server. Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBOszkuDRfJiV99eG9AQFlewP8C6v84pW6UR171S6OThwkg/P7ylXIMY3P jO+w8ohAvbsa90iLFMlGo6YY0pIKSwlacQErryVFfVcRLQ1gIQhBxoIQlwrNkB6m XWnhroR/R7rzatML9cnHzpQKUK7Hax3LSxdxZQQwIDISxBZ4aeOTQwD+seuIos8t 8PVD8c9UO3g= =1xgg -----END PGP SIGNATURE-----
VAR-200106-0024 CVE-2001-0146 Microsoft Windows 2000 Internet Information Server (IIS) and Exchange 2000 vulnerable to DoS via malformed URL (MS01-014) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
IIS 5.0 and Microsoft Exchange 2000 allow remote attackers to cause a denial of service (memory allocation error) by repeatedly sending a series of specially formatted URL's. A vulnerability that affects Microsoft IIS 5.0 and Exchange 2000 allows an intruder to disrupt IIS web services and web-based mail services served via an Exchange server. Microsoft Exchange is subject to a denial of service condition due to the handling of web client requests. If an authenticated user requests a specially crafted URL multiple times to the host running Exchange, the web based mail service could stop responding. A restart of the service is required in order to gain normal functionality. Update: Microsoft IIS 5.0 suffers from a similar issue
VAR-200102-0115 CVE-2001-1434 IOS CVE-2001-1434 Remote Security Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an "snmp-server host" command, which creates a readable "community" community string if one has not been previously created. There is a vulnerability that permits unauthorized access to several switch and router products manufactured by Cisco Systems. An attacker who gains access to an affected device can read its configuration, creating an information leak. IOS is prone to a remote security vulnerability
VAR-200102-0117 CVE-2004-1776 Cisco IOS/X12-X15 has default SNMP read/write string of "cable-docsis" CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Cisco IOS 12.1(3) and 12.1(3)T allows remote attackers to read and modify device configuration data via the cable-docsis read-write community string used by the Data Over Cable Service Interface Specification (DOCSIS) standard. There is a vulnerability that permits unauthorized access to several switch and router products manufactured by Cisco Systems. An attacker who gains access to an affected device can read and modify its configuration, creating a denial-of-service condition, an information leak, or both. IOS is prone to a remote security vulnerability. Cisco IOS 12.1(3) and 12.1(3)T vulnerabilities
VAR-200108-0111 CVE-2001-0711 Cisco IOS ILMI SNMP Community String Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco IOS 11.x and 12.0 with ATM support allows attackers to cause a denial of service via the undocumented Interim Local Management Interface (ILMI) SNMP community string. There is a vulnerability in the remote management architecture for Asynchronous Transfer Mode (ATM) networking devices that permits unauthorized access to configuration information. An attacker who gains access to an affected device can read and modify its configuration, creating a denial-of-service condition, an information leak, or both. IOS is the operating system designed for various Cisco devices. It is maintained and distributed by Cisco systems. A problem in the versions of IOS 11.x and 12.0 could allow unauthorized access to certain configuration variables within a Cisco device. The ILMI SNMP Community string allows read and write access to system objects in the MIB-II community group. These configuration parameters do not affect the normal operation of the device, although if changed, can cause confusion or lead to a social engineering attack. It is possible for a malicious remote user to change configuration objects within the MIB-II Community, and rename the system, change the location name in the system, and/or the contact information for the system. This vulnerability affects only certain devices. There is a loophole in the SNMP implementation of IOS 11.x to 12.0 software, and remote attackers may use this loophole to obtain illegal access to the system
VAR-200111-0015 CVE-2001-0911 PHP-Nuke Cookie Fragile encryption mechanism vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
PHP-Nuke 5.1 stores user and administrator passwords in a base-64 encoded cookie, which could allow remote attackers to gain privileges by stealing or sniffing the cookie and decoding it. PHP-Nuke is a popular web based Portal system. It allows users to create accounts and contribute content to the site. When a user authenticates to a PHP-Nuke based page, a cookie is created which includes that user's account name and password. This password is encoded using Base 64 encoding, and can be immediately decoded by anyone with access to the cookies contents. This, an attacker able to gain access to this cookie may trivially learn the user's account name and password, and compromise that account. Older versions of PHP-Nuke may also be vulnerable. PostNuke 0.6.4(and possibly earlier versions) is also vulnerable. PHP Nuke uses a global variable named '$user'. It is normally retrieved from a cookie, but can be supplied in a URL. This value contains uuencoded values for the user information and the user's password hash. These values are decoded on the server and used in various SQL queries during the execution of PHP Nuke scripts. Several variables used in this query contain user-supplied input. These values may be injected into a uuencoded $user variable passed in a URL. Attackers may modify the query so that its logic forces retrieval of sensitive information associated with arbitrary users. This could be accomplished if the attacker has a valid username. If exploited, the attacker will have gained the encrypted password and user information of the target user. The password could then be brute-forced, allowing further compromises of security on the affected host, including arbitrary file access and remote command execution as the webserver process. There is a security issue in this CGI program, which may lead to the disclosure of sensitive information
VAR-200102-0075 CVE-2001-0039 IBM AIX setclock buffer overflow in remote timeserver argument CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP AUTH command by sending a base64-encoded user password whose length is between 80 and 136 bytes. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. There is a vulnerability in IPSwitch IMail version 6.0.5. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability By Sowhat of Nevis Labs Date: 2006.04.11 http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx CVE: CVE-2006-1189 Vendor Microsoft Inc. Products affected: Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 and Microsoft Windows XP Service Pack 1 Internet Explorer 6 for Microsoft Windows XP Service Pack 2 Internet Explorer 6 for Microsoft Windows Server 2003 Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft Windows Millennium Edition This vulnerability affects systems that use Double-Byte Character Sets. Systems that are affected are Windows language versions that use a Double Byte Character Set language. Examples of languages that use DBCS are Chinese, Japanese, and Korean languages. Customers using other language versions of Windows might also be affected if "Language for non-Unicode programs" has been set to a Double Byte Character Set language. Overview: There exists a buffer overflow in Microsoft Internet Explorer in the parsing of DBCS URLS. This vulnerability could allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This attack may be utilized wherever IE parses HTML, such as webpages, email, newsgroups, and within applications utilizing web-browsing functionality. Details: URLMON.DLL does not properly validate IDN containing double-byte character sets (DBCS), which may lead to remote code execution. Exploiting this vulnerability seems to need a lot of more work but we believe that exploitation is possible. POC: No PoC will be released for this. FIX: Microsoft has released an update for Internet Explorer which is set to address this issue. This can be downloaded from: http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx Vendor Response: 2005.12.29 Vendor notified via secure@microsoft.com 2005.12.29 Vendor responded 2006.04.11 Vendor released MS06-0xx patch 2006.04.11 Advisory released Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2006-1189 Greetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys, all XFocus and 0x557 guys :) References: 1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx 2. http://www.nsfocus.com/english/homepage/research/0008.htm 3. http://xforce.iss.net/xforce/xfdb/5729 4. http://www.securityfocus.com/bid/2100/discuss 5. http://www.inter-locale.com/whitepaper/IUC27-a303.html 6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx 7. [Mozilla Firefox IDN "Host:" Buffer Overflow] http://www.security-protocols.com/advisory/sp-x17-advisory.txt 8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow] http://www.security-protocols.com/advisory/sp-x18-advisory.txt 9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com /research/devnotes/1995/may/02/05.htm -- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"
VAR-200102-0077 CVE-2001-0041 IBM AIX setclock buffer overflow in remote timeserver argument

Related entries in the VARIoT exploits database: VAR-E-200012-0075
CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability By Sowhat of Nevis Labs Date: 2006.04.11 http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx CVE: CVE-2006-1189 Vendor Microsoft Inc. Products affected: Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 and Microsoft Windows XP Service Pack 1 Internet Explorer 6 for Microsoft Windows XP Service Pack 2 Internet Explorer 6 for Microsoft Windows Server 2003 Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft Windows Millennium Edition This vulnerability affects systems that use Double-Byte Character Sets. Systems that are affected are Windows language versions that use a Double Byte Character Set language. Examples of languages that use DBCS are Chinese, Japanese, and Korean languages. Customers using other language versions of Windows might also be affected if "Language for non-Unicode programs" has been set to a Double Byte Character Set language. Overview: There exists a buffer overflow in Microsoft Internet Explorer in the parsing of DBCS URLS. This vulnerability could allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This attack may be utilized wherever IE parses HTML, such as webpages, email, newsgroups, and within applications utilizing web-browsing functionality. Details: URLMON.DLL does not properly validate IDN containing double-byte character sets (DBCS), which may lead to remote code execution. Exploiting this vulnerability seems to need a lot of more work but we believe that exploitation is possible. POC: No PoC will be released for this. FIX: Microsoft has released an update for Internet Explorer which is set to address this issue. This can be downloaded from: http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx Vendor Response: 2005.12.29 Vendor notified via secure@microsoft.com 2005.12.29 Vendor responded 2006.04.11 Vendor released MS06-0xx patch 2006.04.11 Advisory released Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2006-1189 Greetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys, all XFocus and 0x557 guys :) References: 1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx 2. http://www.nsfocus.com/english/homepage/research/0008.htm 3. http://xforce.iss.net/xforce/xfdb/5729 4. http://www.securityfocus.com/bid/2100/discuss 5. http://www.inter-locale.com/whitepaper/IUC27-a303.html 6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx 7. [Mozilla Firefox IDN "Host:" Buffer Overflow] http://www.security-protocols.com/advisory/sp-x17-advisory.txt 8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow] http://www.security-protocols.com/advisory/sp-x18-advisory.txt 9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com /research/devnotes/1995/may/02/05.htm -- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"
VAR-200102-0027 CVE-2001-0055 IBM AIX setclock buffer overflow in remote timeserver argument CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
CBOS 2.4.1 and earlier in Cisco 600 routers allows remote attackers to cause a denial of service via a slow stream of TCP SYN packets. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. Broadband Operating System is prone to a denial-of-service vulnerability. CBOS 2.4.1 and earlier versions of the Cisco 600 router are vulnerable. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability By Sowhat of Nevis Labs Date: 2006.04.11 http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx CVE: CVE-2006-1189 Vendor Microsoft Inc. Products affected: Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 and Microsoft Windows XP Service Pack 1 Internet Explorer 6 for Microsoft Windows XP Service Pack 2 Internet Explorer 6 for Microsoft Windows Server 2003 Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft Windows Millennium Edition This vulnerability affects systems that use Double-Byte Character Sets. Systems that are affected are Windows language versions that use a Double Byte Character Set language. Examples of languages that use DBCS are Chinese, Japanese, and Korean languages. Customers using other language versions of Windows might also be affected if "Language for non-Unicode programs" has been set to a Double Byte Character Set language. Overview: There exists a buffer overflow in Microsoft Internet Explorer in the parsing of DBCS URLS. This vulnerability could allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This attack may be utilized wherever IE parses HTML, such as webpages, email, newsgroups, and within applications utilizing web-browsing functionality. Details: URLMON.DLL does not properly validate IDN containing double-byte character sets (DBCS), which may lead to remote code execution. Exploiting this vulnerability seems to need a lot of more work but we believe that exploitation is possible. POC: No PoC will be released for this. FIX: Microsoft has released an update for Internet Explorer which is set to address this issue. This can be downloaded from: http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx Vendor Response: 2005.12.29 Vendor notified via secure@microsoft.com 2005.12.29 Vendor responded 2006.04.11 Vendor released MS06-0xx patch 2006.04.11 Advisory released Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2006-1189 Greetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys, all XFocus and 0x557 guys :) References: 1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx 2. http://www.nsfocus.com/english/homepage/research/0008.htm 3. http://xforce.iss.net/xforce/xfdb/5729 4. http://www.securityfocus.com/bid/2100/discuss 5. http://www.inter-locale.com/whitepaper/IUC27-a303.html 6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx 7. [Mozilla Firefox IDN "Host:" Buffer Overflow] http://www.security-protocols.com/advisory/sp-x17-advisory.txt 8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow] http://www.security-protocols.com/advisory/sp-x18-advisory.txt 9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com /research/devnotes/1995/may/02/05.htm -- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"
VAR-200102-0029 CVE-2001-0057 IBM AIX setclock buffer overflow in remote timeserver argument CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attackers to cause a denial of service via a large ICMP echo (ping) packet. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. Broadband Operating System is prone to a denial-of-service vulnerability. The vulnerability exists in Cisco 600 routers running CBOS 2.4.1 and earlier versions. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability By Sowhat of Nevis Labs Date: 2006.04.11 http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx CVE: CVE-2006-1189 Vendor Microsoft Inc. Products affected: Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 and Microsoft Windows XP Service Pack 1 Internet Explorer 6 for Microsoft Windows XP Service Pack 2 Internet Explorer 6 for Microsoft Windows Server 2003 Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft Windows Millennium Edition This vulnerability affects systems that use Double-Byte Character Sets. Systems that are affected are Windows language versions that use a Double Byte Character Set language. Examples of languages that use DBCS are Chinese, Japanese, and Korean languages. Customers using other language versions of Windows might also be affected if "Language for non-Unicode programs" has been set to a Double Byte Character Set language. Overview: There exists a buffer overflow in Microsoft Internet Explorer in the parsing of DBCS URLS. This vulnerability could allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This attack may be utilized wherever IE parses HTML, such as webpages, email, newsgroups, and within applications utilizing web-browsing functionality. Details: URLMON.DLL does not properly validate IDN containing double-byte character sets (DBCS), which may lead to remote code execution. Exploiting this vulnerability seems to need a lot of more work but we believe that exploitation is possible. POC: No PoC will be released for this. FIX: Microsoft has released an update for Internet Explorer which is set to address this issue. This can be downloaded from: http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx Vendor Response: 2005.12.29 Vendor notified via secure@microsoft.com 2005.12.29 Vendor responded 2006.04.11 Vendor released MS06-0xx patch 2006.04.11 Advisory released Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2006-1189 Greetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys, all XFocus and 0x557 guys :) References: 1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx 2. http://www.nsfocus.com/english/homepage/research/0008.htm 3. http://xforce.iss.net/xforce/xfdb/5729 4. http://www.securityfocus.com/bid/2100/discuss 5. http://www.inter-locale.com/whitepaper/IUC27-a303.html 6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx 7. [Mozilla Firefox IDN "Host:" Buffer Overflow] http://www.security-protocols.com/advisory/sp-x17-advisory.txt 8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow] http://www.security-protocols.com/advisory/sp-x18-advisory.txt 9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com /research/devnotes/1995/may/02/05.htm -- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"
VAR-200102-0030 CVE-2001-0058 IBM AIX setclock buffer overflow in remote timeserver argument CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attackers to cause a denial of service via a URL that does not end in a space character. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability By Sowhat of Nevis Labs Date: 2006.04.11 http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx CVE: CVE-2006-1189 Vendor Microsoft Inc. Products affected: Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 and Microsoft Windows XP Service Pack 1 Internet Explorer 6 for Microsoft Windows XP Service Pack 2 Internet Explorer 6 for Microsoft Windows Server 2003 Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft Windows Millennium Edition This vulnerability affects systems that use Double-Byte Character Sets. Systems that are affected are Windows language versions that use a Double Byte Character Set language. Examples of languages that use DBCS are Chinese, Japanese, and Korean languages. Customers using other language versions of Windows might also be affected if "Language for non-Unicode programs" has been set to a Double Byte Character Set language. Overview: There exists a buffer overflow in Microsoft Internet Explorer in the parsing of DBCS URLS. This vulnerability could allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This attack may be utilized wherever IE parses HTML, such as webpages, email, newsgroups, and within applications utilizing web-browsing functionality. Details: URLMON.DLL does not properly validate IDN containing double-byte character sets (DBCS), which may lead to remote code execution. Exploiting this vulnerability seems to need a lot of more work but we believe that exploitation is possible. POC: No PoC will be released for this. FIX: Microsoft has released an update for Internet Explorer which is set to address this issue. This can be downloaded from: http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx Vendor Response: 2005.12.29 Vendor notified via secure@microsoft.com 2005.12.29 Vendor responded 2006.04.11 Vendor released MS06-0xx patch 2006.04.11 Advisory released Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2006-1189 Greetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys, all XFocus and 0x557 guys :) References: 1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx 2. http://www.nsfocus.com/english/homepage/research/0008.htm 3. http://xforce.iss.net/xforce/xfdb/5729 4. http://www.securityfocus.com/bid/2100/discuss 5. http://www.inter-locale.com/whitepaper/IUC27-a303.html 6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx 7. [Mozilla Firefox IDN "Host:" Buffer Overflow] http://www.security-protocols.com/advisory/sp-x17-advisory.txt 8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow] http://www.security-protocols.com/advisory/sp-x18-advisory.txt 9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com /research/devnotes/1995/may/02/05.htm -- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"
VAR-200105-0067 CVE-2001-0321 PHP-Nuke opendir.php Remote directory traversal vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
opendir.php script in PHP-Nuke allows remote attackers to read arbitrary files by specifying the filename as an argument to the requesturl parameter. PHP-Nuke is prone to a remote security vulnerability. PHP-Nuke is a popular website development and management tool. PHP-Nuke's opendir.php script implementation has an input validation vulnerability. < *Link: http://www.iss.net/security_center/static/6512.php* >
VAR-200102-0104 CVE-2001-0102 IBM AIX setclock buffer overflow in remote timeserver argument CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
"Multiple Users" Control Panel in Mac OS 9 allows Normal users to gain Owner privileges by removing the Users & Groups Data File, which effectively removes the Owner password and allows the Normal user to log in as the Owner account without a password. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. Apple Mac OS is prone to a local security vulnerability. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability By Sowhat of Nevis Labs Date: 2006.04.11 http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx CVE: CVE-2006-1189 Vendor Microsoft Inc. Products affected: Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 and Microsoft Windows XP Service Pack 1 Internet Explorer 6 for Microsoft Windows XP Service Pack 2 Internet Explorer 6 for Microsoft Windows Server 2003 Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft Windows Millennium Edition This vulnerability affects systems that use Double-Byte Character Sets. Systems that are affected are Windows language versions that use a Double Byte Character Set language. Examples of languages that use DBCS are Chinese, Japanese, and Korean languages. Customers using other language versions of Windows might also be affected if "Language for non-Unicode programs" has been set to a Double Byte Character Set language. Overview: There exists a buffer overflow in Microsoft Internet Explorer in the parsing of DBCS URLS. This vulnerability could allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This attack may be utilized wherever IE parses HTML, such as webpages, email, newsgroups, and within applications utilizing web-browsing functionality. Details: URLMON.DLL does not properly validate IDN containing double-byte character sets (DBCS), which may lead to remote code execution. Exploiting this vulnerability seems to need a lot of more work but we believe that exploitation is possible. POC: No PoC will be released for this. FIX: Microsoft has released an update for Internet Explorer which is set to address this issue. This can be downloaded from: http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx Vendor Response: 2005.12.29 Vendor notified via secure@microsoft.com 2005.12.29 Vendor responded 2006.04.11 Vendor released MS06-0xx patch 2006.04.11 Advisory released Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2006-1189 Greetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys, all XFocus and 0x557 guys :) References: 1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx 2. http://www.nsfocus.com/english/homepage/research/0008.htm 3. http://xforce.iss.net/xforce/xfdb/5729 4. http://www.securityfocus.com/bid/2100/discuss 5. http://www.inter-locale.com/whitepaper/IUC27-a303.html 6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx 7. [Mozilla Firefox IDN "Host:" Buffer Overflow] http://www.security-protocols.com/advisory/sp-x17-advisory.txt 8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow] http://www.security-protocols.com/advisory/sp-x18-advisory.txt 9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com /research/devnotes/1995/may/02/05.htm -- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"