VARIoT IoT vulnerabilities database

VAR-199912-0159 | CVE-2000-0041 | apple's macOS Vulnerability in |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack. apple's macOS Exists in unspecified vulnerabilities.None. The implementation of Open Transport in MacOS 9 includes a weakness that could allow an attacker to use the Mac as a traffic amplifier in a DoS attack against another computer.
A specially-crafted 29-byte UDP packet can be sent to a machine running MacOS 9. The Mac will then respond with a 1500 byte ICMP packet. If the first UDP packet is sent with a spoofed IP address of a third machine, and these spoofed triggger packets are sent to several MacOS 9 machines,, it will create an effective DoS of the third machine due to bandwidth starvation. There are a large number of ICMP datagram vulnerabilities in the Macintosh system. Attackers use these vulnerabilities as amplifiers to carry out attacks
VAR-199912-0149 | CVE-2000-0119 | Virus Scanning Recycle Bin Exclusions for Multiple Vendors |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The default configurations for McAfee Virus Scan and Norton Anti-Virus virus checkers do not check files in the RECYCLED folder that is used by the Windows Recycle Bin utility, which allows attackers to store malicious code without detection. Many commercial virus scanners for Windows platforms exclude the Recycled folder on the hard drive from their scans. The Recycled folder is where Win9x operating systems keep files that have been deleted via the GUI but not purged from the Recycle Bin. Files of any nature can be manually placed in the Recycled folder. Therefore, it is possible for any user or program to put code into that folder that will never be subject to virus scans.
Although WinNT makes use of a folder called 'Recycler' for similar purposes, many virus scanners for NT still have the 'Recycled' folder listed in the exclusions.
Note that other virus scanners than those listed under the 'info' tab may be vulnerable as well. document
VAR-199912-0194 | CVE-2000-0024 | Microsoft IIS Authentication avoidance vulnerability in handling escape characters |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the "Escape Character Parsing" vulnerability. IIS accepts escaped characters that are not valid hexadecimal digits. All webservers that are compliant with RFC 1738 accept hexadecimal digits that are preceded by a percent sign, but IIS will also accept invalid hex digits and translate some of them into valid ASCII characters. This provides a third means of constructing URLs (plaintext, valid hex, and invalid hex) that may be used to bypass third-party access control mechanisms and intrusion detection systems. This issue does not provide a means of compromising the IIS server itself
VAR-199912-0146 | CVE-1999-1497 | IMail Weak Password Encryption Vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. The encryption scheme used is weak and has been broken. The following description of the mechanism used is quoted from Matt Conover's post to Bugtraq, linked to in full in the Credits section.
ENCRYPTION SCHEME Take the lowercase of the account name, split it up by letter and convert each letter to its ASCII equivalent. Next, find the difference between each letter and the first letter. Take each letter of the password, find it's ASCII equivalent and add the offset (ASCII value of first char of the account name minus 97) then subtract the corresponding difference. Use the differences recursively if the password length is greater than the length of the account name. This gives you the character's new ASCII value. Next, Look it up the new ASCII value in the ASCII-ENCRYPTED table (see http://www.w00w00.org/imail_map.txt) and you now have the encrypted letter.
Example:
Account Name: mike
m = 109
i = 105
k = 107
e = 101
Differences:
First - First: 0
First - Second: 4
First - Third: 2
First - Fourth: 8
Unencrypted Password: rocks
r = 114
o = 111
c = 99
k = 107
s = 115
(ASCII value + offset) - difference:
offset: (109 - 97) = 12
(114 + 12) - 0 = 126
(111 + 12) - 4 = 119
(99 + 12) - 2 = 109
(107 + 12) - 8 = 111
(115 + 12) - 0 = 127
126 = DF
119 = D8
109 = CE
111 = D0
127 = E0
Encrypted Password: DFD8CED0E0
The decryption scheme is a little easier. First, like the encryption scheme, take the account name, split it up by letter and convert each letter to its ASCII equivalent. Next, find the difference between each letter and the first letter. Now split the encrypted password by two characters (e.g., EFDE = EF DE) then look up their ASCII equivalent within the ASCII-ENCRYPTED table (see http://www.w00w00.org/imail_map.txt). Take that ASCII value and add the corresponding difference.Look this value up in the ascii table. This table is made by taking the ASCII value of the first character of the account name and setting it equal to 'a'.
EXAMPLE
Account Name: mike
m = 109
i = 105
k = 107
e = 101
Differences:
First - First: 0
First - Second: 4
First - Third: 2
First - Fourth: 8
Encrypted Password: DFD8CED0E0
DF = 126
D8 = 119
CE = 109
D0 = 111
E0 = 127
Add Difference:
126 + 0 = 126
119 + 4 = 123
109 + 2 = 111
111 + 8 = 119
127 + 0 = 127
Look up in table (see http://www.w00w00.org/imail_map.txt):
126 = r
123 = o
111 = c
119 = k
127 = s
Unencrypted Password: rocks
VAR-199912-0073 | CVE-1999-0998 | Cisco Security hole |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Cache Engine allows an attacker to replace content in the cache.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0074 | CVE-1999-1000 | Cisco Cache Engine Security hole |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0075 | CVE-1999-1001 | Cisco Security hole |
CVSS V2: 2.6 CVSS V3: - Severity: LOW |
Cisco Cache Engine allows a remote attacker to gain access via a null username and password.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0077 | CVE-1999-1004 | Norton Anti-Virus protection NAV2000 program POP server POProxy Buffer overflow vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command. The vulnerability is caused by a large USER command
VAR-199912-0163 | CVE-2000-0068 | Intel InBusiness Email station daynad Program authorization problem vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
daynad program in Intel InBusiness E-mail Station does not require authentication, which allows remote attackers to modify its configuration, delete files, or read mail. InBusiness eMail Station is prone to a remote security vulnerability. Vulnerability in the daynad program of Intel's InBusiness e-mail site
VAR-199911-0070 | CVE-1999-1548 | Cabletron SSR ARP Flood DoS Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cabletron SmartSwitch Router (SSR) 8000 firmware 2.x can only handle 200 ARP requests per second allowing a denial of service attack to succeed with a flood of ARP requests exceeding that limit. There is a vulnerability in Cabletron SmartSwitch Router (SSR) 8000 firmware 2.x
VAR-199911-0073 | CVE-1999-1508 | Tektronix PhaserLink Web Server vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Web server in Tektronix PhaserLink Printer 840.0 and earlier allows a remote attacker to gain administrator access by directly calling undocumented URLs such as ncl_items.html and ncl_subjects.html. Certain versions of the Tektronix PhaserLink printer ship with a webserver designed to help facilitate configuration of the device. This service is essentially administrator level access as it can completely modify the system characteristics, restart the machine, asign services etc. Once the password is obtained by the user, they can manipulate the printer in any way they see fit. There is a bug in the web server on Tektronix PhaserLink Printer 840.0 and earlier
VAR-199911-0072 | CVE-1999-1550 | F5 Software BigIP of bigconf.cgi Script leaking file content vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
bigconf.conf in F5 BIG/ip 2.1.2 and earlier allows remote attackers to read arbitrary files by specifying the target file in the "file" parameter. BigIP is a load balancing system from F5 software. It has a web-based configuration system, which is vulnerable to several standard CGI attacks. According to Guy Cohen <guy@crypto.org.il>, it is possible to view arbitrary files on the BSDI system which it is installed on. To add to this, the configuration program is installed setuid root. This is considered a local vulnerability since htaccess authentication is required to get to the configuration area. No more information on this vulnerability is available. It has a web management interface and configures the program through some CGI scripts. There is an input validation vulnerability in the \"bigconf.cgi\" script in the software package, allowing remote attackers to view arbitrary system files with the authority of the Web Server process. The bug finder did not provide further clarification
VAR-199911-0051 | CVE-1999-0843 | Cisco Router security vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port. Cisco Router is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause a denial-of-service condition
VAR-199911-0028 | CVE-1999-0946 | Microsoft IE Yamaha MidiPlug Buffer Overflow Vulnerability |
CVSS V2: 5.1 CVSS V3: - Severity: MEDIUM |
Buffer overflow in Yamaha MidiPlug via a Text variable in an EMBED tag. There is a buffer overflow in the MidiPlug that may allow arbitrary code to be executed on the local host. Instructions in the text variable may be executed when a user visits the malicious web page
VAR-199911-0013 | CVE-1999-1077 | apple's macOS Vulnerability in |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Idle locking function in MacOS 9 allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock. apple's macOS Exists in unspecified vulnerabilities.None. Under MacOS the key combination CMD-PWR (Command key + Power Key) or the programmer's switch (on models that have one) will start up the micro-debugger or an assembly debugger such as MacsBug. This behavior occurs even while the screen is locked after the user becoming idle. This allows a user to drop into the debugger and kill the screen lock process and obtain access to the desktop. There is a vulnerability in the idle lock function in the MacOS 9 version
VAR-199910-0007 | CVE-1999-1076 | apple's macOS Vulnerability in |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session. apple's macOS Exists in unspecified vulnerabilities.None. MacOS 9 includes an idle-activated console lock feature, similar to a screensaver password in other operating systems. After a certain length of user inactivity, a dialog box appears stating that a password must be entered. After the user clicks 'OK' another dialog box appears offering the option to either supply a password or to log out the current user. If the 'log out' option is chosen, any programs running will start to shut down. In certain programs, dialog boxes are created in the shutdown process (for example, "Exit without saving? OK/Cancel"). If the user selects 'Cancel', the shutdown process is aborted and the user is returned to the current session without ever having to enter a password. There is a vulnerability in the Idle locking function in the MacOS 9 version
VAR-199910-0025 | CVE-1999-0905 | Axent Raptor Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Denial of service in Axent Raptor firewall via malformed zero-length IP options. According to an advisory posted to bugtraq by the perdue CERIAS labs, setting the SECURITY and TIMESTAMP IP options length to 0 can cause an infinite loop to occur within the code that handles the options (resulting in the software freezing). A consequence of this is a remote denial of service. This vulnerability can be caused by an incorrect zero-length IP option
VAR-199910-0020 | CVE-1999-0895 | Check Point Firewall - 1 LDAP Verification vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Firewall-1 does not properly restrict access to LDAP attributes. With FireWall-1 Version 4.0 Checkpoint introduced support for the Lightweight Directory Access Protocol (LDAP) for user authentication. It looks like there's a bug in Checkpoint's ldap code which under certain circumstances can lead to unauthorized access to protected systems behind the firewall.
A user can authenticate himself at the firewall providing a valid username and password. The firewall acts as a ldap client, validating the credentials by a directory server using the ldap protocol. After successful authentication access will be granted to systems protected by the firewall.
In contrast to authentication using the Radius or SecurID protocol, after successful authentication the directory server can supply the firewall with additional ldap attributes for the user like the time and day of a week a user is allowed to login, the source addresses a user can run a client from, or the system behind the firewall a user is allowed to access. This can be done individual for each user.
In general I think that's a great idea but it seems Checkpoint made something wrong interpreting the ldap attribute 'fw1allowed-dst' which is supposed to control in detail which protected network object a user can access.
It seems this attribute is ignored by the firewall software, granting access to all protected network objects instead.
Example:
------ Server 'Foo'
|
Internet --- FW-1 ---|
|
------ Server 'Bar'
Supposed there's a user 'Sid' with access only to Server 'Foo', and a second user 'Nancy' with access restricted to Server 'Bar', both controlled by the ldap protocol, using the ldap attribute 'fw1allowed-dst'. The bug will cause that both, Sid and Nancy, will have access to Foo and to Bar.
[Quoted from the post by Olaf Selke with permission]
VAR-199910-0010 | CVE-1999-0791 | Hybrid Cable Modem Remote Configuration Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Hybrid Network cable modems do not include an authentication mechanism for administration, allowing remote attackers to compromise the system through the HSMP protocol. The cable modems use a protocol called HSMP, which uses UDP as its transport layer protocol. This makes it trivial to spoof packets and possible for hackers to compromise cable-modem subscribers anonymously. The possible consequences of this problem being exploited are very serious and range from denial of service attacks to running arbitrary code on the modem
VAR-199912-0052 | CVE-1999-1233 | IIS Restrict access vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
IIS 4.0 does not properly restrict access for the initial session request from a user's IP address if the address does not resolve to a DNS domain, aka the "Domain Resolution" vulnerability. Any subsequent requests will be denied