Summary of Security Items from December 15 through December 21, 2004
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to items appearing in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Bugs,
Holes, & Patches
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name | Risk | Source |
ASP Calendar 1.0 | A vulnerability exists which could let a remote malicious user obtain unauthorized administrative access. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Active Server Corner ASP Calendar Administrative Access | High | Bugtraq, December 14, 2004 |
ASP-Rider | A vulnerability exists due the way user provided data is parsed, which could let a remote malicious user bypass the authentication mechanism and obtain administrative privileges. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | ASP-Rider Remote SQL Injection | High | Securiteam, December 15, 2004 |
Ability Server 2.25-2.34 | A buffer overflow vulnerability exists in the processing of the APPE FTP command, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. Exploit scripts have been published. | Ability Server 'APPE FTP' Command Buffer Overflow | High | SecurityTracker Alert ID, 1012464, December 8, 2004 SecurityFocus, December 16, 2004 |
eTrust EZ Antivirus 7.0, 7.0.1 .1-7.0.1.4, 7.0.1, 7.0.2 .1, 7.0.2, 7.0.3, 7.0.4 | A vulnerability exists due to insecure default file permissions on installed files, which could let a malicious user bypass security restrictions or obtain elevated privileges. Update available at: There is no exploit code required. | Computer Associates eTrust EZ Antivirus Local Insecure Default Installation CVE Name: | Medium | iDEFENSE Security Advisory, December 15, 2004 |
Crystal FTP Pro 2.8
| A buffer overflow vulnerability exists due to a boundary error in the handling No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Crystal FTP Pro Buffer Overflow | High | Securiteam, December 19, 2004 |
Codename Eagle 1.42 & prior | A remote Denial of Service vulnerability exists when a malicious user submits an empty UDP datagram. No workaround or patch available at time of publishing. An exploit script has been published. | Codename Eagle UDP Packet Processing Remote Denial of Service | Low | Secunia Advisory, SecurityFocus, December 13, 2004 |
Instant Messenger 6.0 build 149-build 155, 6.0 | Multiple vulnerabilities exist: a vulnerability exists when parsing 'http:' and 'news:' links that are embedded in sent messages, which could let a remote malicious user execute arbitrary code; a vulnerability exists when a remote malicious user submits packets with embedded '.dll' files, which could let the client execute some of the functions; a vulnerability exists in the DCC connection feature, which could let a remote malicious user obtain sensitive information; a buffer overflow vulnerability exists due to a boundary error when sending images, which could let a remote malicious user execute arbitrary code; a vulnerability exists when small images are allowed to be sent even when the 'image send' option is disabled; a buffer overflow vulnerability exists when assembling divided sent files that contain specially crafted length values, which could let a remote malicious user execute arbitrary code; and an integer overflow vulnerability exists when handling receiving files through DCC that contain a specially crafted file length value.
Users are advised to contact the vendor for more information on obtaining the fixed packages. There is no exploit script required; however, a Proof of Concept exploit has been published. | Gadu-Gadu Multiple Remote Input Validation Vulnerabilities | Medium/ High (High if arbitrary code can be executed) | Secunia Advisory, SA13450, December 17, 2004 |
Google Desktop Search prior to 121004 | A vulnerability exists because it is possible for Java applets (and possibly The vendor has released a fixed version (121004) as of December 10, 2004. Currently we are not aware of any exploits for this vulnerability. Vulnerability has appeared in the Press and other public media. | Google Desktop Search | Medium | Secunia Advisory, SA13567, December 21, 2004 |
GamePort 3.0, 3.1, 4.0 | Multiple vulnerabilities exist in the client and server that could let a remote malicious user obtain unauthorized access and execute arbitrary code.
No workaround or patch available at time of publishing. An exploit has been published. | Interactive Studio GamePort Multiple Vulnerabilities | Medium/ High (High if arbitrary code can be executed) | Bugtraq, December 17, 2004 |
Mailserver 5.0, 5.1, 5.1.1, 5.6.3-5.6.5, 5.7.0-5.7.10, 6.0-6.0.4, ServerFirewall 1.0, WinRoute Firewall 5.0.1-5.0.9, 5.1-5.1.10, 5.10, 6.0-6.0.8 | A vulnerability exists because a universal secret key is used to extract plain text from credential hashes and is stored in the WinRoute Firewall, Kerio ServerFirewall, and Kerio MailServer binaries, which could let a malicious user obtain sensitive information. Updates available at: Currently we are not aware of any exploits for this vulnerability. | Multiple Kerio Products Universal Secret Key Storage CVE Name: | Medium | The Secure Computer Group at the University of a Coruna & dotpi.com Information Technologies Research Labs Security Advisory, December 14, 2004 |
Internet Explorer 6.0, SP1&SP2 | A vulnerability exists in the DHTML Edit ActiveX control, which could let a remote malicious user inject arbitrary scripting code into a different window on the target user's system.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Microsoft Internet Explorer DHTML Edit Control Script Injection | High | Bugtraq, December 15, 2004 |
Internet Explorer (IE) 6 on Windows XP SP2 and Windows 2000 | A vulnerability exists that could permit a remote malicious user to invoke the execCommand 'SaveAs' function via a custom HTTP 404 Not Found error message to download arbitrary files to the target user's system without the XP SP2 warning messages. Internet Explorer does not properly process URLs with certain extraneous characters. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Microsoft IE Custom 404 Error Message & execCommand SaveAs File Download | High | SecuriTeam, November 22, 2004 US-CERT Vulnerability Note, VU#743974, December 17, 2004 |
Windows Media Player 9.0 | Two vulnerabilities exist: a vulnerability exists because the artist, album name, and song name information can be overwritten in a media file, which could let a remote malicious user execute arbitrary code; and a vulnerability exists in the 'getItemInfoByAtom()' function, which could let a remote malicious user obtain sensitive information. Update available at: An exploit has been published. | Windows Media Player ActiveX Control Media File Attribute Corruption | Medium/ High | SecurityTracker Alert ID, 1012626, December 20, 2004 |
Windows NT Server 4.0 SP 6a, NT Server 4.0 Terminal Server Edition SP 6, Windows 2000 Server SP 3 & SP4, Windows Server 2003, 2003 64-Bit Edition | A vulnerability exists due to an unchecked buffer in the handling of the 'Name' parameter from certain packets, which could let a remote malicious user execute arbitrary code. Updates available at: Currently we are not aware of any exploits for this vulnerability. | Microsoft WINS Name Validation CVE Name: | High | Microsoft Security Bulletin, SB04-045, December 14, 2004 US-CERT Vulnerability Note, VU#378160, December 16, 2004 |
NetMail 3.10, 3.10 a-3.10 g | Multiple vulnerabilities exist: a buffer overflow vulnerability exists in the IMAP functionality, which could let a remote malicious user execute arbitrary code; a vulnerability exists due to a failure to properly integrate with Symantec antivirus software, which could let a remote malicious user bypass anti-virus screening; and several remote Denial of Service vulnerabilities exist.
Updates available at: Currently we are not aware of any exploits for these vulnerabilities. | Novell NetMail Multiple Remote Vulnerabilities | Low/ Medium/ High (High if arbitrary code can be executed) | Novell Technical Information Document, TID2970425, December 13, 2004 |
Winamp 5.07 | A remote Denial of Service vulnerability exists due to a failure to properly process '.mp4' and '.m4a' files. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Nullsoft Winamp Malformed MP4 Remote Denial of Service | Low | SecurityTracker Alert ID, 1012525, December 15, 2004 |
FirstClass 8.0 | A remote Denial of Service vulnerability exists in the HTTP Daemon Search function. Customers are advised to contact the vendor for further details in regard to obtaining and applying an appropriate fix. An exploit script has been published. | OpenText FirstClass HTTP Daemon Search Function Remote Denial of Service | Low | SecurityTracker Alert ID, 1012478, December 11, 2004 SecurityFocus, December 16, 2004 |
WinRar 3.0 .0, 3.0, 3.10, beta 5, beta 3, 3.11, 3.20, 3.40, 3.41 | A client-side buffer overflow vulnerability exists in the file name functionality due to insufficient validation of user-supplied strings length prior to copying them into static process buffers, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. An exploit script has been published. | RARLAB WinRAR File Name Remote Client-Side Buffer Overflow | High | K-Otik Security Advisory, December 17, 2004 |
Backup Exec 8.0, 8.5, 8.6, 9.0, 9.1 | A buffer overflow vulnerability exists due to a boundary error in the Agent Hotfix available at: Currently we are not aware of any exploits for this vulnerability. | VERITAS Backup Exec Buffer Overflow CVE Name: | High | Veritas Software Security Advisory, 273419, December 16, 2004 |
name=unix>UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
Adobe Acrobat Reader 5.0.9 for Unix | A buffer overflow vulnerability exists in in Adobe Acrobat Reader for Unix. A remote malicious user can execute arbitrary code on the target system. A remote user can create a specially crafted PDF file that, when processed by the target user, will trigger a buffer overflow in the mailListIsPdf() function and execute arbitrary code. The code will run with the privileges of the target user. The vendor has issued a fixed version (5.0.10): http://www.adobe.com/support/techdocs/331153.html Gentoo: Currently we are not aware of any exploits for this vulnerability. | Adobe Acrobat Reader mailListIsPdf() Buffer Overflow CVE Name: | High | iDEFENSE Security Advisory 12.14.04 Gentoo Security Advisory, GLSA 200412-12 / acroread, December 16, 2004 |
QwikMail 0.3 | A vulnerability was reported in QwikMail. A remote malicious user can send mail via the target system. A remote user can connect to the target service and send an SMTP string to enable the mail to be forwarded. The command will overflow a buffer allocated to hold the local IP address. The software permits the localhost (127.0.0.1) to relay mail. A fix is available via CVS at: A Proof of Concept exploit has been published. | Amir Malik QwikMail Buffer Overflow | High | SecurityTracker Alert ID, 1012561, December 16, 2004 |
pcal 0.7.1 | Two vulnerabilities were reported in pcal. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted calendar file that, when processed by the target user with pcal, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflows reside in the getline() function in 'pcalutil.c' and the get_holiday() function in 'readfile.c'. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Andrew W. Rogers pcal Buffer Overflows | High | SecurityTracker Alert ID, 1012592, December 16, 2004 |
GREED (Get and Resume Elite EDition) 0.81p | Multiple vulnerabilities exist in GREED, which can be exploited by malicious people to compromise a user's system. A boundary error and an input validation error in the 'DownloadLoop()' function can be exploited to cause a buffer overflow. No workaround or patch available at time of publishing. Proofs of Concept exploit scripts have been published. | Anoakie Turner GREED 'DownloadLoop()' Function | High | Secunia Advisory ID, SA13534, December 17, 2004 |
Safari 1.2.4 | A vulnerability exists which could allow a remote malicious user to inject content into an open window in certain cases to spoof web site contents. If the target name of an open window is known, a remote user can create Javascript that, when loaded by the target user, will display arbitrary content in the opened window. A remote user can exploit this to spoof the content of potentially trusted web sites. Apple has issued a fix as part of Security Update 2004-12-02, available at: A Proof of Concept exploit has been published. | Apple Safari Open Windows Injection | High | SecurityTracker Alert ID, 1012459, December 10, 2004 |
Safari 1.0 - 1.2.3 | A vulnerability exists that that allows a malicious user to misrepresent the status bar in the browser, allowing vulnerable users to be mislead into following a link to a malicious site. The issue presents itself when an user creates an HTML form with the submit 'value' property set to a legitimate site and the 'action' property set to the attacker-specified site.
No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Apple Safari Web Browser HTML Form Status Bar Misrepresentation | Medium | SecurityFocus Bugtraq ID,11949, December 15, 2004 |
Atari800 1.3.1 & prior | Several buffer overflow vulnerabilities exist in the 'log.c' and 'rt-config.c' files due to insufficient boundary checks, which could let a malicious user execute arbitrary code with root privileges. The vendor reports that the vulnerability described in 'log.c' is fixed in versions after 2003-11-13, and that they are currently looking into the issue in 'rt-config.c'. Debian: An exploit script has been published. | Atari800 Emulator Multiple Buffer Overflows CVE Name: | High | Securiteam, November 25, 2004 PacketStorm, December 11, 2004 Debian Security Advisory, DSA-609-1 atari800, December 14, 2004 |
2fax 3.04 | A vulnerability was reported in 2fax. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted e-mail, web page, or other file that, when processed by the target user with 2fax, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the expandtabs() function in '2fax.c' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | AtBas 2fax expandtabs() Buffer Overflow | High | Secunia Advisory ID, SA13500, December 17, 2004 |
Filter 2.6.1 | A vulnerability exists in Filter that could allow a remote malicious user to cause arbitrary code to be executed by the target user. A remote user can send a specially crafted e-mail that, when processed by Filter, will execute arbitrary code on the target user's system. The code will run with the privileges of the Filter process. The buffer overflow resides in the save_embedded_address() function in 'filter.c.' The vendor plans to issue a fix in the pending version 2.6.2. A Proof of Concept exploit script has been published. | Bolthole Filter save_embedded _address() Buffer Overflow | High | SecurityTracker Alert ID, 1012560, December 16, 2004 |
csv2xml 0.5.1 | A vulnerability was reported in csv2xml. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted CSV file that, when processed by the target user with 'csv2xml -m=2,' will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the get_csv_token() function in 'csv2xml.cpp.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | BSD csv2xml get_csv_token() Buffer Overflow | High | SecurityTracker Alert ID, 1012582, December 16, 2004 |
Junkie: 0.3.1 | Two vulnerabilities were reported in Junkie. A remote server can cause arbitrary commands to be executed by the target user. A remote server can send a specially crafted FTP response to the connected Junkie client to execute arbitrary commands on the target user's system. The commands will run with the privileges of the target user. The flaws can be exploited if the target user selects 'View' or 'Download' for multiple files on the remote FTP server. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | BSD Junkie Input Validation Holes | High | SecurityTracker Alert ID, 1012571, December 16, 2004 |
tnftp 20030825 | A vulnerability was reported in tnftp. A remote server can write to arbitrary files on the target system. A remote FTP server can send a specially crafted FTP response to the connected tnftp client to write to arbitrary files on the target user's system with the privileges of the target user. The mget() function in 'cmds.c' does not validate server-supplied filenames and uses the server-supplied filename (including slashes) as a local filename. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | BSD tnftp mget() Input Validation Hole | High | Secunia Advisory ID, SA13516, December 17, 2004 |
imlib 1.x | Multiple vulnerabilities exist due to integer overflows within the image decoding routines. This can be exploited to cause buffer overflows by tricking a user into viewing a specially crafted image in an application linked against the vulnerable library. Gentoo: Red Hat: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | Carsten Haitzler imlib Image Decoding Integer Overflow CVE Name: | High | Secunia Advisory ID, Red Hat Advisory, RHSA-2004:651-03, December 10, 2004 SecurityFocus, December 14, 2004 |
abc2mtex 1.6.1 | A vulnerability was reported in abc2mtex. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ABC file that, when processed by the target user with abc2mtex, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the process_abc() function in 'abc.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Chris Walshaw abc2mtex process_abc() Buffer Overflow | High | Secunia Advisory ID, SA13522, December 17, 2004 |
Perl Crypt::ECB 1.1 -2, 1.1 | A vulnerability exists because plain texts containing the ASCII character '0' is incorrectly encoded, which results in a weaker encryption and encoding collisions and may make it easier to brute force passwords. No workaround or patch available at time of publishing. There is no exploit code required; however; a Proof of Concept exploit has been published. | Christoph Appel Perl Crypt::ECB Incorrect Block Encryption | Medium | Securiteam, December 21, 2004 |
abctab2ps 1.6.3 | A vulnerability was reported in abctab2ps. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ABC file that, when processed by the target user with abctab2ps, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflows reside in the write_heading() function in 'subs.cpp' and the trim_title() function in 'parse.cpp.'
No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Christoph Dalitz abctab2ps Buffer Overflows | High | SecurityTracker Alert ID, 1012578, December 16, 2004 |
Cscope 13.0, 15.1, 15.3-15.5 | Several vulnerabilities exist: a vulnerability exists due to the insecure creation of temporary files, which could let a malicious user obtain elevated privileges; and a buffer overflow vulnerability exists when parsing source code with '#include' statements, which could let a malicious user execute arbitrary code.
SCO: UnixWare 7.1.4, 7.1.3, 7.1.1: ftp://ftp.sco.com/pub/updates/UnixWare/ Gentoo: Debian: Proofs of Concept exploits have been published. | Cscope Insecure Temporary File Creation & #include Statement Buffer Overflow CVE Name: | Medium/ High (High if arbitrary code can be executed) | DV RX171104 Advisory, November 17, 2004 SCO Security Advisory, SCOSA-2004.21, December 9, 2004 Gentoo Linux Security Advisory, GLSA 200412-11 / cscope, December 16, 2004 Debian Security Advisory |
xlreader 0.9.0 | A buffer overflow vulnerability exists in book_format_sql() in 'format.c' that could allow a remote malicious user to execute arbitrary code on the target system. A remote user can create a specially crafted Excel document that, when processed via 'xlreader -s' by the target user, will trigger an overflow and execute arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | David Giffin xlreader book_format_sql() Buffer Overflow | High | SecurityTracker Alert ID, 1012540, December 16, 2004 |
Yanf 0.4 | A vulnerability exists that could allow a remote malicious user to cause arbitrary code to be executed by the target user. A remote server can send a specially crafted HTTP response to the connected Yanf client to execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the get() function in 'src/get.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Gastón Kleiman Yanf get() Buffer Overflow | High | SecurityTracker Alert ID, 1012557, December 16, 2004 |
gdlib 2.0.23, 2.0.26-2.0.28 | A vulnerability exists in the 'gdImageCreateFromPngCtx()' function when processing PNG images due to insufficient sanity checking on size values, which could let a remote malicious user execute arbitrary code.
OpenPKG: Ubuntu: Gentoo: Debian: Fedora: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Trustix: SUSE: Debian: Red Hat: An exploit script has been published. | GD Graphics Library Remote Integer Overflow CVE Name: | High | Secunia Advisory, Gentoo Linux Security Advisory, GLSA 200411-08, November 3, 2004 Ubuntu Security Notice, USN-21-1, November 9, 2004 Debian Security Advisories, DSA 589-1 & 591-1, November 9, 2004 Fedora Update Notifications, Mandrakelinux Security Update Advisory, MDKSA-2004:132, November 15, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0058, November 16, 2004 Ubuntu Security Notice, USN-25-1, November 16, 2004 SUSE Security Summary Report, SUSE-SR:2004:001, November 24, 2004 Debian Security Advisories, DSA 601-1 & 602-1, November 29, 2004 Red Hat Advisory, RHSA-2004:638-09, December 17, 2004 |
a2ps 4.13 | A vulnerability exists that could allow a malicious user to execute arbitrary shell commands on the target system. a2ps will execute shell commands contained within filenames. A user can create a specially crafted filename that, when processed by a2ps, will execute shell commands with the privileges of the a2ps process. A patch for FreeBSD is available at: Debian: A Proof of Concept exploit has been published. | GNU a2ps Filenames Shell Commands Execution | High | SecurityTracker Alert ID, 1012475, December 10, 2004 Debian Security Advisory |
Aspell 0.50.5; Gentoo Linux 1.4 | A buffer overflow vulnerability exists in the 'word-list-compress' utility due to insufficient bounds checking, which could let a malicious user execute arbitrary code. Gentoo:
href="http://security.gentoo.org/glsa/glsa-200406-14.xml"> OpenPKG:
href="ftp://ftp.openpkg.org/"> Mandrakesoft: Proofs of Concept exploits have been published. | GNU Aspell Stack Buffer Overflow CVE Name: | High | Securiteam, June 14, 2004 Gentoo Linux Security Advisory, GLSA 200406-14, June 17, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.042, September 15, 2004 Mandrakesoft Security Advisory MDKSA-2004:153, December 20, 2004
|
ChBg 1.5 | A vulnerability was reported in ChBg. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ChBg scenario file that, when processed by the target user with ChBg, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the simplify_path() function in 'config.c.' FreeBSD is not affected because PATH_MAX is set to 1024, preventing the buffer overflow. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU ChBg simplify_path() Buffer Overflow | High | Secunia Advisory ID, SA13529, December 17, 2004 |
Convex 3D 0.8pre1 | A vulnerability exists that could allow a remote malicious user to cause arbitrary code to be executed by the target user. A remote user can create a specially crafted 3DS file that, when processed by the target user with Convex 3D, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the readObjectChunk() function in '3dsimp.cpp.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU Convex 3D readObjectChunk() Buffer Overflow | High | SecurityTracker Alert ID, 1012555, December 16, 2004 |
CUPS 1.1.22 | A vulnerability was reported in CUPS in the processing of HPGL files. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted HPGL file that, when printed by the target user with CUPS, will execute arbitrary code on the target user's system. The code will run with the privileges of the 'lp' user. The buffer overflow resides in the ParseCommand() function in 'hpgl-input.c.' Fixes are available in the CVS repository and are included in version Fedora: A Proof of Concept exploit script has been published. | GNU CUPS HPGL ParseCommand() Buffer Overflow | High | CUPS Advisory STR #1023, December 16, 2004 |
CUPS Ippasswd 1.1.22 | A vulnerability was reported in the CUPS lppasswd utility. A local malicious user can truncate or modify certain files and cause Denial of Service conditions on the target system. There are flaws in the way that lppasswd edits the '/usr/local/etc/cups/passwd' file. Fixes are available in the CVS repository and are included in version Fedora: A Proof of Concept exploit has been published. | GNU CUPS lppasswd Denial of Service | Low | SecurityTracker Alert ID, 1012602, December 16, 2004 |
DXFscope 0.2 | A buffer overflow vulnerability exists in the dxfin() function in 'd.c' that could allow a remote malicious user to execute arbitrary code on the target system. A remote user can create a specially crafted DXF file that, when viewed by the target user with DXFscope, will execute arbitrary code on the target user's system. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU DXFscope dxfin() Buffer Overflow | High | SecurityTracker Alert ID, 1012541, December 16, 2004 |
jcabc2ps 20040902 | A vulnerability was reported in jcabc2ps. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ABC file that, when processed by the target user with jcabc2ps, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the switch_voice() function in 'parse.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU jcabc2ps switch_voice() Buffer Overflow | High | SecurityTracker Alert ID, 1012593, December 16, 2004 |
jpegtoavi 1.5 | A vulnerability exists that could allow a remote malicious user to cause arbitrary code to be executed by the target user. A remote user can create specially crafted JPEG files and a list of the JPEG filenames that, when processed by the target user with jpegtoavi, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the get_file_list_stdin() function in 'jpegtoavi.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU jpegtoavi get_file_list_stdin() Buffer Overflow | High | SecurityTracker Alert ID, 1012559, December 16, 2004 |
MPlayer 1.0pre5 | A vulnerability was reported in MPlayer in the processing of ASF streams. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ASF video stream that, when viewed by the target user with MPlayer, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. Gentoo: A Proof of Concept exploit script has been published. | GNU MPlayer ASF Streams Processing Buffer Overflow | High | SecurityTracker Alert ID, 1012562, December 16, 2004 Gentoo GLSA 200412-21 / MPlayer, December 12, 2004 |
NapShare 1.2 | A vulnerability was reported in NapShare when used with an 'extern' filter. A remote malicious user can execute arbitrary code on the target user's system. A remote user can create a specially crafted gnutella response to NapShare that will execute arbitrary code on the target user's system. The buffer overflow resides in the auto_filter_extern() function in 'auto.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU NapShare auto_filter_extern() Buffer Overflow | High | SecurityTracker Alert ID, 1012577, December 16, 2004 |
pgn2web 0.3 | A vulnerability was reported in pgn2web. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted PGN file that, when processed by the target user with pgn2web, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the process_moves() function in 'pgn2web.c.'
No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU pgn2web process_moves() Buffer Overflow | High | SecurityTracker Alert ID, 1012579, December 16, 2004 |
rtf2latex2e 1.0fc2 | A buffer overflow vulnerability exists that could allow a remote malicious user to execute arbitrary code on the target system. A remote user can create a specially crafted RTF file that, when processed by the target user with rtf2latex2e, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in ReadFontTbl() in 'reader.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU rtf2latex2e ReadFontTbl() Buffer Overflow | High | SecurityTracker Alert ID, 1012544, December 16, 2004 |
unrtf 0.19.3 | A vulnerability was reported in unrtf. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted RTF file that, when processed by the target user with unrtf, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the process_font_table() function in 'convert.c.'. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | GNU unrtf process_font_table() Buffer Overflow | High | SecurityTracker Alert ID, 1012595, December 16, 2004 |
Vim 6.x, GVim 6.x | Multiple vulnerabilities exist which can be exploited by local malicious users to gain escalated privileges. The vulnerabilities are caused due to some errors in the modelines options. This can be exploited to execute shell commands when a malicious file is opened. Successful exploitation can lead to escalated privileges but requires that modelines is enabled. Apply patch for vim 6.3: ftp://ftp.vim.org/pub/vim/patches/6.3/6.3.045 Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | GNU Vim / Gvim Modelines Command Execution Vulnerabilities CVE Name: | Medium | Gentoo Linux Security Advisory, GLSA 200412-10 / vim, December 15, 2004 |
xine-lib 1.x | Multiple vulnerabilities with unknown impacts exist due to errors in the PNM and Real RTSP clients. Update to version 1-rc8: Currently we are not aware of any exploits for these vulnerabilities. | GNU xine-lib Unspecified PNM and Real RTSP Clients Vulnerabilities | Not Specified | Secunia Advisory, SA13496, December 16, 2004 |
Yet Another MP3 Tool (YAMT) 0.5 | A vulnerability was reported in Yet Another MP3 Tool (YAMT). A remote malicious user can cause arbitrary commands to be executed by the target user. A remote user can create a specially crafted MP3 file that, when processed by the target user with the YAMT Sort feature, will execute arbitrary commands on the target user's system. The commands will run with the privileges of the target user. The flaw resides in the id3tag_sort() function in 'id3tag.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | GNU Yet Another MP3 Tool (YAMT) id3tag_sort() Input Validation Hole | High | SecurityTracker Alert ID, 1012583, December 16, 2004 |
Xine 1-rc5, 1-rc7 | A vulnerability was reported in Xine. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted file (such as an AVI file) that, when processed by the target user with Xine or xine-lib, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the open_aiff_file() function in 'demux_aiff.c.' A fix is available in the CVS repository. A Proof of Concept exploit script has been published. | GPL Xine open_aiff_file() Buffer Overflow | High | SecurityTracker Alert ID, 1012563, December 16, 2004 |
abcpp 1.3.0 | A vulnerability was reported in abcpp. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ABC file that, when processed by the target user with abcpp, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the handle_directive() function in 'abcpp.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Guido Gonzato abcpp handle_directive() Buffer Overflow | High | Secunia Advisory ID, SA13524, December 17, 2004 |
Mesh Viewer 0.2.2 | A vulnerability was reported in Mesh Viewer. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted mesh file that, when processed by the target user with Mesh Viewer, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the Mesh::type() function in 'mesh.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Helmut Cantzler Mesh Viewer dxfin() Buffer Overflow | High | SecurityTracker Alert ID, 1012580, December 16, 2004 |
HP-UX 11.x | A vulnerability exists which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is due to an unspecified error in the newgrp utility. Apply patches: http://www.itrc.hp.com/service/patch/mainPage.do Currently we are not aware of any exploits for this vulnerability. | HP-UX newgrp Privilege Escalation | Medium | Secunia Advisory ID, SA13565, December 20, 2004 |
A vulnerability was reported in html2hdml. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted HTML file that, when processed by the target user with html2hdml, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the remove_quote() function in 'convert.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | html2hdml remove_quote() Buffer Overflow | High | SecurityTracker Alert ID, 1012590, December 16, 2004 | |
AIX 5.x | Multiple vulnerabilities exist in AIX, which can be exploited by malicious, local users to gain escalated privileges. These vulnerabilities exist in the 'paginit' utility, the '/bin/Dctrl' utility, the 'uname' utility, and the 'grep' utility. Successful exploitation of the vulnerabilities allows execution of arbitrary code with 'root' privileges. Apply APARs: Currently we are not aware of any exploits for these vulnerabilities. | IBM AIX Multiple Privilege Escalation Vulnerabilities | High | iDEFENSE Security Advisory 12.20.04 |
IglooFTP 0.6.1 | A vulnerability was reported in IglooFTP. A remote server can write to arbitrary files on the target system. A remote FTP server can send a specially crafted FTP response to the connected IglooFTP client to write to arbitrary files on the target user's system with the privileges of the target user. The download_selection_recursive() function in 'ftplist.c' does not validate server-supplied filenames and uses the server-supplied filename as a local filename. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | IglooFTP download_selection_ recursive() Input Validation Hole | High | SecurityTracker Alert ID, 1012588, December 16, 2004 |
Zip 2.3 | A buffer overflow vulnerability exists due to a boundary error when doing recursive compression of directories with 'zip,' which could let a remote malicious user execute arbitrary code. Ubuntu: Fedora: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" SUSE: Red Hat: Currently we are not aware of any exploits for this vulnerability. | Info-ZIP Zip Remote Recursive Directory Compression Buffer Overflow CVE Name: | High | Bugtraq, November 3, 2004 Ubuntu Security Notice, USN-18-1, November 5, 2004 Fedora Update Notification, Gentoo Linux Security Advisory, GLSA 200411-16, November 9, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:141, November 26, 2004 SUSE Security Summary Report, SUSE-SR:2004:003, December 7, 2004 Red Hat Advisory, RHSA-2004:634-08, December 16, 2004 |
HTGET 0.93 | A buffer overflow vulnerability was reported in HTGET. A remote malicious user can cause arbitrary code to be executed. A remote user can create a specially crafted URL that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code.
Debian: Currently we are not aware of any exploits for this vulnerability. | J Whitham HTGET Buffer Overflow CVE Name: | High | Debian Security Advisory DSA-611-1 htget, December 20, 2004 |
abcm2ps 3.7.20 | A vulnerability was reported in abcm2ps. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ABC file that, when processed by the target user with abcm2ps, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the put_words() function in 'subs.c.' Gentoo: A Proof of Concept exploit script has been published. | Jean-François Moine abcm2ps put_words() Buffer Overflow | High | Secunia Advisory ID, SA13523, December 17, 2004 Gentoo Security Advisory, GLSA 200412-18 / abcm2ps, December 19, 2004 |
uml_utilities 20030903 | A vulnerability was reported in uml_utilities in the uml_net component. A local malicious user can disable the Ethernet interfaces on the target system. A local user can issue a specially crafted command to takedown an Ethernet interface. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Jeff Dike uml_utilities umt_net slip_down() Denial of Service | Low | SecurityTracker Alert ID, 1012603, December 16, 2004 |
Konqueror prior to 3.32 | Two vulnerabilities exist in KDE Konqueror, which can be exploited by malicious people to compromise a user's system.The vulnerabilities are caused due to some errors in the restriction of certain Java classes accessible via applets and Javascript. This can be exploited by a malicious applet to bypass the sandbox restriction and read or write arbitrary files. Update to version 3.3.2: Apply patch for 3.2.3: Currently we are not aware of any exploits for these vulnerabilities. | KDE Konqueror Java Sandbox Vulnerabilities | High | KDE Security Advisory, December 20, 2004 |
Konqueror 3.2.2-6
| A vulnerability exists which can be exploited by malicious people to spoof the content of websites. A website can inject content into another site's window if the target name of the window is known. This can be exploited by a malicious website to spoof the content of a pop-up window opened on a trusted website. Fedora: Mandrakesoft: Currently we are not aware of any exploits for this vulnerability. | KDE Konqueror Window Injection CVE Name: | Medium | Secunia Advisory ID, SA13254, December 8, 2004 Secunia Advisory ID, SA13486, December 16, 2004 Mandrakesoft Security Advisory, MDKSA-2004:150, December 15, 2004 |
KDE prior to 3.3.2 | When a user creates a link to a remote file using various KDE applications, the resulting link may include authentication credentials for the remote system. This may include Samba passwords for files located on SMB servers. Patches are available: Gentoo: Currently we are not aware of any exploits for this vulnerability. | KDE Privacy Vulnerability | Medium | KDE Security Advisory, December 9, 2004 US-CERT Vulnerability Note VU#305294, December 17, 2004 Gentoo Advisory, GLSA 200412-16 / KDE, December 19, 2004 |
Kerberos 5 krb5-1.3.5 and prior | A buffer overflow exists in the libkadm5srv administration library. A remote malicious user may be able to execute arbitrary code on an affected Key Distribution Center (KDC) host. There is a heap overflow in the password history handling code. A patch is available at: Currently we are not aware of any exploits for this vulnerability. | Kerberos libkadm5srv Heap Overflow CVE Name: | High | SecurityTracker Alert ID, 1012640, December 20, 2004 |
NASM 0.98.38 | A vulnerability was reported in NASM. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted asm file that, when processed by the target user with NASM, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the error() function in 'preproc.c.' Gentoo: A Proof of Concept exploit script has been published. | LGPL NASM error() Buffer Overflow | High | Secunia Advisory ID, SA13523, December 17, 2004 |
LibTIFF 3.6.1 | Several buffer overflow vulnerabilities exist: a vulnerability exists because a specially crafted image file can be created, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; a remote Denial of Service vulnerability exists in 'libtiff/tif_dirread.c' due to a division by zero error; and a vulnerability exists in the 'tif_next.c,' 'tif_thunder.c,' and 'tif_luv.c' RLE decoding routines, which could let a remote malicious user execute arbitrary code. Debian: Gentoo: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/"> OpenPKG: Trustix:
href="ftp://ftp.trustix.org/pub/trustix/updates/"> Mandrake: SuSE:
href="ftp://ftp.suse.com/pub/suse/"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2004-577.html"> Slackware: Conectiva: KDE: Update to version 3.3.2: Apple Mac OS X: Gentoo: KDE kfax: Proofs of Concept exploits have been published. | LibTIFF Buffer Overflows CVE Name: | Low/High (High if arbitrary code can be execute) | Gentoo Linux Security Advisory, GLSA 200410-11, October 13, 2004 Fedora Update Notification, OpenPKG Security Advisory, OpenPKG-SA-2004.043, October 14, 2004 Debian Security Advisory, DSA 567-1, October 15, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0054, October 15, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:109 & MDKSA-2004:111, October 20 & 21, 2004 SuSE Security Announcement, SUSE-SA:2004:038, October 22, 2004 RedHat Security Advisory, RHSA-2004:577-16, October 22, 2004 Slackware Security Advisory, SSA:2004-305-02, November 1, 2004 Conectiva Linux Security Announcement, CLA-2004:888, November 8, 2004 US-CERT Vulnerability Notes VU#687568 & VU#948752, December 1, 2004 Gentoo Linux Security Advisory, GLSA 200412-02, December 6, 2004 KDE Security Advisory, December 9, 2004 Apple Security Update SA-2004-12-02 Gentoo Security Advisory, GLSA 200412-17 / kfax, December 19, 2004 |
LinPopUp 1.2.0 | A buffer overflow vulnerability exists that could allow a remote malicious user to execute arbitrary code on the target system. A remote user can send a specially crafted message to LinPopUp to trigger a buffer overflow in strexpand() in 'string.c' and execute arbitrary code. The code will run with the privileges of the LinPopUp process. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Little Igloo LinPopUp strexpand() Buffer Overflow | High | SecurityTracker Alert ID, 1012542, December 16, 2004 |
mpg123 0.59r | A vulnerability exists that could allow a remote malicious user to cause arbitrary code to be executed by the target user. A remote user can create a specially crafted MP3 playlist that, when processed by the target user with mpg123, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the find_next_file() function in 'playlist.c.'
No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Michael Hipp mpg123 find_next_file() Buffer Overflow | High | Secunia Advisory ID, 13511, December 17, 2004 |
Ringtone Tools 2.22 | A vulnerability was reported in Ringtone Tools. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted eMelody file that, when processed by the target user with Ringtone Tools, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the parse_emelody() function in 'parse_emelody.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Michael Kohn Ringtone Tools parse_emelody() Buffer Overflow | High | SecurityTracker Alert ID, 1012573, December 16, 2004 |
Visual Basic to C/GTK (vb2c) 0.02 | A vulnerability was reported in Visual Basic to C/GTK (vb2c). A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted FRM file that, when processed by the target user with vb2c, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the gettoken() function in 'vb2c.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Michael Kohn Visual Basic to C/GTK (vb2c) gettoken() Buffer Overflow | High | SecurityTracker Alert ID, 1012575, December 16, 2004 |
ncpfs 2.2.1 - 2.2.4 | A buffer overflow exists that could lead to local execution of arbitrary code with elevated privileges. The vulnerability is in the handling of the '-T' option in the ncplogin and ncpmap utilities, which are both installed as SUID root by default. Gentoo: Update to 'net-fs/ncpfs-2.2.5' or later Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors ncpfs: ncplogin and ncpmap Buffer Overflow CVE Name: | High | Gentoo Linux Security Advisory, GLSA 200412-09 / ncpfs, December 15, 2004 |
Debian Linux 3.0, sparc, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, alpha; | A vulnerability exists in the Emacs flim library due to the insecure creation of temporary files, which could let a malicious user obtain elevated privileges. Debian: RedHat: Fedora Legacy: Fedora Core 2: We are not aware of any exploits for this vulnerability. | Multiple Vendors Emacs film Library Insecure Temporary File Creation
CVE Name: | Medium | Debian Security Advisory, DSA 500-1, May 2, 2004 Fedora Legacy Update Advisory, FLSA:1581, September 30, 2004 Secunia Advisory ID: 13487, December 16, 2004 |
file 4.11 and prior (Trustix) | A vulnerability exists in the ELF header parsing code in 'file'. A malicious user may be able to create a specially crafted ELF file that, when processed using 'file', may be able to modify the stack and potentially execute arbitrary code. Update to version 4.12: Gentoo: SUSE: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors 'File' Processing ELF Headers Stack Overflow | High | Trustix Secure Linux Advisory #2004-0063, November 26, 2004 Gentoo Linux Security Advisory, GLSA 200412-07/ file, December 13, 2004 SUSE Security Summary Report, SUSE-SR:2004:004, December 16, 2004 |
glibc 2.2 | A buffer overflow vulnerability exists in the resolver libraries of glibc 2.2. SUSE: Red Hat: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors glibc Buffer Overflow CVE Name:
| Low | SUSE Security Summary Report, SUSE-SR:2004:002, November 30, 2004 Red Hat RHSA-2004:586-15, December 20, 2004 |
Linux kernel 2.4 .0-test1-test12, 2.4-2.4.27 | A vulnerability exists in the 'AF_UNIX' address family due to a serialization error, which could let a malicious user obtain elevated privileges or possibly execute arbitrary code. Upgrades available at: SUSE: Ubuntu: Red Hat: Currently we are not aware of any exploits for this vulnerability.
| Multiple Vendors Linux Kernel AF_UNIX Arbitrary Kernel Memory Modification CVE Name: | Medium/ High (High if arbitrary code can be executed) | Bugtraq, November 19, 2004 SUSE Security Summary Report, SUSE-SR:2004:003, December 7, 2004 SecurityFocus, December 14, 2004 |
Linux Kernel 2.4 - 2.4.28, 2.6 - 2.6.9 | A vulnerability was reported in the Linux kernel in the auxiliary message (scm) layer. A local malicious user can cause Denial of Service conditions. A local user can send a specially crafted auxiliary message to a socket to trigger a deadlock condition in the __scm_send() function. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Multiple Vendors Linux Kernel Auxiliary Message Layer State Error CVE Name: | Low | iSEC Security Research Advisory 0019, December 14, 2004 |
Unix Linux kernel 2.4, 2.4 .0-test1 | A vulnerability exists in the Linux kernel when writing to an ext3 file system due to a design error that causes some kernel information to be leaked, which could let a malicious user obtain sensitive information. Upgrade available at: Conectiva: Debian: Mandrake: RedHat (updated kernel package): http://rhn.redhat.com/errata/ Trustix: Engarde:
| Multiple Vendors Linux Kernel EXT3 File System Information Leakage CVE Name: | Medium | Mandrakelinux Security Update Advisory, MDKSA-2004:029, April 14, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0020, April 15, 2004 Debian Security Advisories, DSA 489-1 & 491-1, April 17, 2004 Conectiva Security Advisory, CLSA-2004:829, April 15, 2004 Red Hat Security Advisories, RHSA-2004:166-01 & 166-08, April 21, 2004 Guardian Digital Security Advisory, ESA-20040428-004, April 28, 2004 Red Hat Security Advisories, RHSA-2004:505-14 & 505-13, December 13, 2004 |
Linux Kernel 2.4.x | The Linux kernel is reported prone to a data disclosure vulnerability. It is reported that this issue may permit a malicious executable to disclose the contents of Floating Point registers that belong to another process. This vulnerability will only affect ia64 systems. Trustix: Mandrake: Gentoo: Red Hat: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Linux Kernel Floating Point Register Contents Leak CVE Name: | Medium | Trustix Secure Linux, TSLSA-2004-0041 Mandrake MDKSA-2004:066 Gentoo GLSA 200407-16 Red Hat Linux RHSA-2004:504-13, December 13, 2004 |
Linux Kernel 2.4 - 2.4.28, 2.6 - 2.6.9 | Several vulnerabilities exist in the Linux kernel in the processing of IGMP messages. A local user may be able to gain elevated privileges. A remote user can cause the target system to crash. These are due to flaws in the ip_mc_source() and igmp_marksources() functions. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Multiple Vendors Linux Kernel IGMP Integer Underflow CVE Name: | Low/ Medium (Medium if elevated privileges can be obtained) | iSEC Security Research Advisory 0018, December 14, 2004 |
Linux Kernel 2.6 - 2.6.9, 2.4 - 2.4.28 | Integer overflow vulnerabilities exist that could allow a local user to cause Denial of Service conditions. These overflows exist in ip_options_get() and vc_resize() and a memory leak in ip_options_get(). The vendor has issued a fix in 2.6.10rc3bk5 and possibly also in the 2.4 release candidate. A Proof of Concept exploit has been published. | Multiple Vendors Linux Kernel ip_options_get() and vc_resize() Integer Overflows | Low | Georgi Guninski Security Advisory #72, December 15, 2004 |
Linux kernel 2.6.x, 2.4.x , SUSE Linux 8.1, 8.2, 9.0, 9.1, Linux 9.2, SUSE Linux Desktop 1.x, SUSE Linux Enterprise Server 8, 9; Turbolinux Turbolinux Server 10.0 | Two vulnerabilities exist: a Denial of Service vulnerability exists via a specially crafted 'a.out' binary; and a vulnerability exists due to a race condition in the memory management, which could let a malicious user obtain sensitive information. SUSE: TurboLinux: Ubuntu: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors Linux Kernel Local DoS & Memory Content Disclosure CVE Name: | Low/ Medium (Medium if sensitive information can be obtained) | Secunia Advisory, SUSE Security Summary Report, SUSE-SA:2004:042, December 1, 2004 SecurityFocus, December 16, 2004 |
Linux Kernel 2.6 - 2.6.10 rc2 | The DRM module in the Linux kernel is susceptible to a local Denial of Service vulnerability. This vulnerability likely results in the corruption of video memory, crashing the X server. Malicious users may be able to modify the video output. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Linux Kernel Local DRM Denial of Service CVE Name: | Low | Ubuntu Security Notice USN-38-1 December 14, 2004 |
Unix Linux kernel 2.4, 2.4 .0-test1 | Multiple vulnerabilities exist: a vulnerability exists due to information leaks within the JFS file system code, which could let a malicious user obtain sensitive information; and a Denial of Service vulnerability exists in the Linux Sound Blaster driver. Upgrade available at: Mandrake: SuSE: Trustix: TurboLinux: Red Hat: Currently we are not aware of any exploits for these vulnerabilities.
| Multiple Vendors Linux Kernel Multiple Vulnerabilities CVE Names: | Low/ Medium (Medium if sensitive information can be obtained) | Mandrakelinux Security Update Advisory, MDKSA-2004:029, April 14, 2004 SUSE Security Announcement, SuSE-SA:2004:009, April 14, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0020, April 15, 2004 Turbolinux, TLSA-2004-05-21, May 21, 2004 Red Hat Advisory ID: RHSA-2004:504-13, December 13, 2004 |
Linux Kernel 2.6 - 2.6.10 rc2 | The Linux kernel /proc filesystem is susceptible to an information disclosure vulnerability. This issue is due to a race-condition allowing unauthorized access to potentially sensitive process information. This vulnerability may allow malicious local users to gain access to potentially sensitive environment variables in other users processes.
Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Linux Kernel PROC Filesystem Local Information Disclosure CVE Name: | Medium | Ubuntu Security Notice USN-38-1 December 14, 2004 |
Linux kernel 2.6.8 rc1-rc3 | A Denial of Service vulnerability exists in the 'ReiserFS' file system functionality due to a failure to properly handle files under certain conditions. Upgrades available at: Ubuntu: There is no exploit code required. | Low | SecurityFocus, October 26, 2004 Ubuntu Linux Security Advisory USN-38-1, December 14, 2004 | |
Linux Kernel 2.6 - 2.6.10 rc2 | The Linux kernel is prone to a local Denial of Service vulnerability. This vulnerability is reported to exist when 'CONFIG_SECURITY_NETWORK=y' and 'CONFIG_SECURITY_SELINUX=y' options are set in the Linux kernel. A local attacker may exploit this vulnerability to trigger a kernel panic and effectively deny service to legitimate users. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Low | Ubuntu Security Notice USN-38-1 December 14, 2004 | |
Linux Kernel 2.6.x | Some potential vulnerabilities exist with an unknown impact in the Linux Kernel. The vulnerabilities are caused due to boundary errors within the Patches are available at: http://linux.bkbits.net:8080/linux-2.6/ Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors Linux Kernel 'sys32_ni_syscall' and 'sys32_vm86_warning' Buffer Overflows CVE Name: | Low/High (High if arbitrary code can be executed) | Secunia Advisory ID, SA13410, December 9, 2004 SecurityFocus, December 14, 2004 |
Linux Kernel versions except 2.6.9 | A race condition vulnerability exists in the Linux Kernel terminal subsystem. This issue is related to terminal locking and is exposed when a remote malicious user connects to the computer through a PPP dialup port. When the remote user issues the switch from console to PPP, there is a small window of opportunity to send data that will trigger the vulnerability. This may cause a Denial of Service. This issue has been addressed in version 2.6.9 of the Linux Kernel. Patches are also available for 2.4.x releases: http://www.kernel.org/pub/linux/kernel/ Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Linux Kernel Terminal Locking Race Condition CVE Name: | Low | SecurityFocus, December 14, 2004 |
Linux Kernel versions except 2.6.9 | The Linux Kernel is prone to a local vulnerability in the terminal subsystem. Reportedly, this issue can be triggered by issuing a TIOCSETD ioctl to a terminal interface at the moment a read or write operation is being performed by another thread. This could result in a Denial of Service or allow kernel memory to be read. This issue has been addressed in version 2.6.9 of the Linux Kernel. Patches are also available for 2.4.x releases: http://www.kernel.org/pub/linux/kernel/ Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Low | SecurityFocus, December 14, 2004 | |
Linux Kernel USB Driver prior to 2.4.27 | A vulnerability exists in certain USB drivers because uninitialized structures are used and then 'copy_to_user(...)' kernel calls are made from these structures, which could let a malicious user obtain obtain uninitialized kernel memory contents. Update available at:
href=" http://kernel.org/"> Gentoo:
href="http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml"> Trustix: Red Hat: We are not aware of any exploits for this vulnerability. |
class=style53>Medium | US-CERT Vulnerability Note VU#981134, October 25, 2004 Trustix, TSLSA-2004-0041: kernel, August 9, 2004 Red Hat Security Advisories, RHSA-2004:505-14 & 505-13, December 13, 2004 | |
nfs-utils 1.0.6 | A vulnerability exists due to an error in the NFS statd server in 'statd.c' where the 'SIGPIPE' signal is not correctly ignored. This can be exploited to crash a vulnerable service via a malicious peer terminating a TCP connection prematurely. Upgrade to 1.0.7-pre1: Mandrakesoft: Debian: Red Hat: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors nfs-utils 'SIGPIPE' TCP Connection Termination Denial of Service CVE Name: | Low | Secunia Advisory ID, SA13384, December 7, 2004 Debian Security Advisory Red Hat Security Advisory, RHSA-2004:583-09, December 20, 2004 |
Samba 2.2.9, 3.0.8 and prior | An integer overflow vulnerability in all versions of Samba's smbd 0.8 could allow an remote malicious user to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges. Patches available at: Red Hat: Gentoo: Trustix: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Samba smbd Security Descriptor CVE Name: | High | iDEFENSE Security Advisory 12.16.04 Red Hat Advisory, RHSA-2004:670-10, December 16, 2004 Gentoo Security Advisory, GLSA 200412-13 / Samba, December 17, 2004 US-CERT, Vulnerability Note VU#226184, December 17, 2004 Trustix Secure Linux Advisory #2004-0066, December 17, 2004 |
Samba 3.0 - 3.0.7; RedHat Advanced Workstation for the Itanium Processor 2.1, IA64, Desktop 3.0, Enterprise Linux WS 3, WS 2.1 IA64, 2.1, ES 3, 2.1 IA64, 2.1, AS 3, 2.1 IA64, 2.1; Ubuntu Linux 4.1 ppc, ia64, ia32 | A buffer overflow vulnerability exists in the 'QFILEPATHINFO' request handler when constructing 'TRANSACT2_QFILEPATHINFO' responses, which could let a remote malicious user execute arbitrary code.
Update available at: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SuSE: Trustix: Ubuntu: Conectiva: Fedora: TurboLinux: Red Hat: OpenPKG: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Samba 'QFILEPATHINFO' Buffer Overflow CVE Name: | High | e-matters GmbH Security Advisory, November 14, 2004 SuSE Security Announcement, SUSE-SA:2004:040, November 15, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0058, November 16, 2004 Ubuntu Security Notice, USN-29-1, November 18, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:136, November 19, 2004 US-CERT Vulnerability Note VU#457622, November 19, 2004 Conectiva Linux Security Announcement, CLA-2004:899, November 25, 2004 Fedora Update Notifications, Turbolinux Security Advisory, TLSA-2004-32, December 8, 2004 Red Hat Security Advisory RHSA-2004:632-17, November 16, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.054 December 17, 2004 |
Gentoo Linux;
| A remote Denial of Service vulnerability exists in 'ms_fnmatch()' function due to insufficient input validation. Patch available at: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SuSE: Ubuntu: RedHat: Trustix: Conectiva: Fedora: SGI: TurboLinux: OpenPKG: There is no exploit code required. | Multiple Vendors Samba Remote Wild Card Denial of Service CVE Name: | Low | SecurityFocus, November 15, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0058, November 16, 2004 RedHat Security Advisory, RHSA-2004:632-17, November 16, 2004 Conectiva Linux Security Announcement, CLA-2004:899, November 25, 2004 Fedora Update Notifications, Turbolinux Security Advisory, TLSA-2004-32, December 8, 2004 SGI Security Advisory, 20041201-01-P, December 13, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.054 December 17, 2004 |
Linux Kernel 2.4-2.4.27, 2.6-2.6.8 SUSE Linux 8.1, 8.2, 9.0, 9.1, Linux 9.2, SUSE Linux Desktop 1.x, SUSE Linux Enterprise Server 8, 9
| Multiple vulnerabilities exist due to various errors in the 'load_elf_binary' function of the 'binfmt_elf.c' file, which could let a malicious user obtain elevated privileges and potentially execute arbitrary code.
Patch available at: Trustix: Fedora: SUSE: Red Hat: RedHat: Proofs of Concept exploit scripts have been published. | Multiple Vendors Linux Kernel BINFMT_ELF Loader Multiple Vulnerabilities CVE Names: | Medium/ High (High if arbitrary code can be executed) | Bugtraq, November 11, 2004 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SA:2004:042, December 1, 2004 Red Hat Advisory: RHSA-2004:549-10, December 2, 2004 RedHat Security Advisories, RHSA-2004:504-13 & 505-14, December 13, 2004
|
Linux Kernel 2.4-2.4.27, 2.6-2.6.9; Trustix Secure Enterprise Linux 2.0, Secure Linux 1.5, 2.0-2.2; | Multiple remote Denial of Service vulnerabilities exist in the SMB filesystem (SMBFS) implementation due to various errors when handling server responses. This could also possibly lead to the execution of arbitrary code.
Upgrades available at: Trustix: Ubuntu: Fedora: SUSE: Red Hat: RedHat: Ubuntu: Currently we are not aware of any exploits for these vulnerabilities | Multiple Vendors smbfs Filesystem Memory Errors Remote Denial of Service CVE Names: | Low/High (High if arbitrary code can be executed) | e-matters GmbH Security Advisory, November 11, 2004 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SA:2004:042, December 1, 2004 Red Hat Advisory: RHSA-2004:549-10, December 2, 2004 Ubuntu Security Notice, USN-39-1, December 16, 2004 RedHat Security Advisories, RHSA-2004:504-13 & 505-14, December 13, 2004 |
Namazu 2.0.13 and prior | A vulnerability exists which can be exploited by malicious people to conduct Cross-Site Scripting attacks. Input passed to 'namazu.cgi' isn't properly sanitized before being returned to the user if the query begins from a tab ('%09'). This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site. Update to version 2.0.14: Fedora: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/ Currently we are not aware of any exploits for this vulnerability. | Namazu Cross-Site Scripting Vulnerability | High | Namazu Security Advisory, December 15, 2004 |
NetBSD prior to 2.0 | A vulnerability exists in the compat functions. A local malicious user can cause Denial of Service conditions or potentially gain elevated privileges. Some of the functions in /usr/src/sys/compat/* do not properly validate user-supplied data before executing a kernel syscall. Several functions do not properly validate signal numbers. A local malicious user can cause large signal numbers to be passed to certain syscall functions to cause the kernel to crash. Several buffer overflows exist. At least one of the buffer overflows allows a local user to gain root privileges. Version 2.0 includes the fix. Instructions on upgrading kernel binaries are provided in the vendor's advisory, available at: Currently we are not aware of any exploits for these vulnerabilities. | NetBSD compat Validation Flaws | Low/ Medium/ High (Low of a DoS; Medium if elevated privileges can be obtained; and High if root privileges can be obtained) | SecurityTracker Alert ID, 1012611, December 17, 2004 |
o3read 0.0.3 | A vulnerability was reported in o3read. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted SXW file that, when processed by the target user with o3read, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the parse_html() function in 'o3read.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | o3read parse_html() Buffer Overflow | High | SecurityTracker Alert ID, 1012591, December 16, 2004 |
Slash CVS versions prior to R_2_5_0_41 | A vulnerability with an unknown impact has been reported in slash. The vulnerability is caused due to an unspecified error in the CVS versions. Solution: Upgrade to Slash CVS version R_2_5_0_41 and release version 2.2.6: Currently we are not aware of any exploits for this vulnerability. | Open Source Technology Slash Unspecified Vulnerability | Not Specified | Security Advisory for CVS Slash, December 15, 2004 |
OpenBSD 3.4, 3.5, 3.6 | A vulnerability exists in isakmpd(8) which could allow a local malicious user to trigger a kernel panic. If the target system is running isakmpd(8), a local user can set ipsec(4) credentials on a socket to corrupt kernel memory and cause the system to panic. The flaw resides in the pfkeyv2_acquire() function in 'sys/net/pfkeyv2.c.'
The vendor has issued a fix in OpenBSD-current and the OpenBSD 3.6, 3.5, and 3.4 -stable branches. Patches are also available for OpenBSD 3.6, 3.5 and 3.4: Currently we are not aware of any exploits for this vulnerability. | OpenBSD isakmpd Error in pfkeyv2_acquire() | Low | OpenBSD 3.6 release errata & patch list, December 14, 2004 |
Vilistextum 2.6.6 | A vulnerability was reported in Vilistextum that could allow a remote malicious user to cause arbitrary code to be executed by the target user. A remote user can create a specially crafted HTML file that, when processed by the target user with Vilistextum, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the get_attr() function in 'html.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Patric Müller Vilistextum get_attr() Buffer Overflow | High | SecurityTracker Alert ID, 1012558, December 16, 2004 |
PHPGroupWare 0.9.16.03 | PHPGroupWare contains multiple input validation vulnerabilities; it is prone to multiple SQL injection and Cross-Site Scripting issues. These issues are all due to a failure of the application to properly sanitize user-supplied input. A malicious user could exploit these vulnerabilities to execute arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | PHPGroupWare Multiple Cross-Site Scripting and SQL Injection | High | GulfTech Security Research December 14th, 2004 |
phpMyAdmin 2.4.0 up to 2.6.1-rc1 | Two vulnerabilities exist which can be exploited by malicious people to compromise a vulnerable system and by malicious users to disclose sensitive information.1) An input validation error in the handling of MySQL data allows Gentoo: A Proof of Concept exploit has been published. | PHPGroupWare phpMyAdmin Two Vulnerabilities | Medium/ High (High if arbitrary code can be executed) | Exaprobe, Security Advisory, December 13, 2004 |
PostgreSQL 7.4.5 | A vulnerability exists due to the insecure creation of temporary files, which could possibly let a malicious user overwrite arbitrary files. Trustix:
href="ftp://ftp.trustix.org/pub/trustix/updates/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-16.xml"> Debian:
href="http://security.debian.org/pool/updates/main/p/postgresql/"> OpenPKG:
href="ftp://ftp.openpkg.org/release/"> Mandrakesoft: Red Hat: There is no exploit code required. | Medium | Trustix Secure Linux Bugfix Advisory, TSL-2004-0050, September 30, 2004 Gentoo Linux Security Advisory, GLSA 200410-16, October 18, 2004 Debian Security Advisory, DSA 577-1, October 29, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.046, October 29, 2004 Mandrakesoft Security Advisory, MDKSA-2004:149, December 13, 2004 Red Hat Advisory RHSA-2004:489-17, December 20, 2004 | |
Red Hat
Linux Kernel 2.4.x, ia64 | A vulnerability exists in the Linux kernel, which potentially can be exploited to gain knowledge of sensitive information. The vulnerability is caused due to an error within the context switch code. Updates available at: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734 RedHat: A Proof of Concept exploit has been published. | Red Hat Information leak on Linux/ia64
CVE Name: | Medium | Bugzilla Bug 124734, May 28, 2004 RedHat Security Advisory, RHSA-2004:504-13, December 13, 2004 |
Toast 6.0 Titanium | A local privilege escalation vulnerability reportedly affects Roxio Toast. This issue is due to a design error in the application that allows an attacker to execute code with kernel privileges. A local attacker may leverage this issue to execute arbitrary code on the affected computer with superuser privileges, facilitating privilege escalation. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Roxio Toast TDIXSupport Local Privilege Escalation | High | SecurityFocus Bugtraq ID, 11940, December 15, 2004 |
xzgv .8 | An integer overflow vulnerability exists in the processing of PRF files. A remote malicious user may be able to cause arbitrary code to be executed on the target user's computer. A remote user can create a specially crafted image file that, when processed by the target user, will trigger an overflow in the read_prf_file() function. The flaw resides in 'src/readprf.c', where image height and width parameters are not properly limited. A patch is available at: Debian: Currently we are not aware of any exploits for this vulnerability. | Russell Marks xzgv Integer Overflow CVE Name: | High | iDEFENSE Security Advisory, December 13, 2004 Debian Security Advisory |
zgv Image Viewer 5.5 | Several vulnerabilities exist due to various integer overflows when processing images, which could let a remote malicious user execute arbitrary code. Gentoo: Debian: The vendor has issued a patch, available at: http://www.svgalib.org/rus/ Currently we are not aware of any exploits for these vulnerabilities. | Russell Marks ZGV Image Viewer Multiple Remote Integer Overflow CVE Name: | High | Bugtraq, October 26, 2004 Gentoo Linux Security Advisory, GLSA 200411-12:01, November 7, 2004 Debian Security Advisory, DSA-608-1 zgv, December 14, 2004 SecurityTracker Alert ID: 1012546, December 16, 2004 |
Samba version 3.0 - 3.0.6 | Several vulnerabilities exist: a remote Denial of Service vulnerability exists in the 'process_logon_packet()' function due to insufficient validation of 'SAM_UAS_CHANGE' request packets; and a remote Denial of Service vulnerability exists when a malicious user submits a malformed packet to a target 'smbd' server. Updates available at:
href=" http://samba.org/samba/download/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200409-16.xml"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> OpenPKG:
href="ftp://ftp.openpkg.org/release/2.1/UPD/"> SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> RedHat: Conectiva: SGI: We are not aware of any exploits for these vulnerabilities. | Low | Securiteam, September 14, 2004 Gentoo Linux Security Advisory, GLSA 200409-16, September 13, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:092, September 13, 2004 Trustix Secure Linux Bugfix Advisory, TSL-2004-0046, September 14, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.040, September 15, 2004 SUSE Security Announcement, SUSE-SA:2004:034, September 17, 2004 RedHat Security Advisory, RHSA-2004:467-08, September 23, 2004 Conectiva Linux Security Announcement, CLA-2004:873, October 14, 200 SGI Security Advisory, 20041201-01-P, December 13, 2004 | |
abcMIDI 2004.12.04 | A vulnerability was reported in abcMIDI in the 'abc2midi' component. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted ABC file that, when processed by the target user with abc2midi, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflows reside in the event_text() and event_specific() functions in 'store.c.' No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Seymour Shlien abcMIDI dxfin() Buffer Overflow | High | Secunia Advisory ID: SA13512, December 17, 2004 |
SGI
IRIX 6.5.20 m, 6.5.20 f, 6.5.21 m, 6.5.21 f, 6.5.22-6.5.25 | Several vulnerabilities exist: a Denial of Service vulnerability exists when a ‘mapelf32exec()’ call is made on a malicious binary; and a Denial of Service vulnerability exists due to page invalidation issues that exist in init.
Patches available at: RedHat: Currently we are not aware of any exploits for these vulnerabilities. | SGI IRIX Denials of Service CVE Names: | Low | SGI Security Advisory, 20040601-01-P, June 14, 2004 RedHat Security Advisory, RHSA-2004:504-13, December 13, 2004 |
Samba on SGI IRIX 6.5.x | Multiple vulnerabilities exist which can be exploited to cause a Denial of Service or compromise a vulnerable system. Apply patch 5798 for Samba 3.0.7: Red Hat: Currently we are not aware of any exploits for these vulnerabilities. | SGI Multiple Samba Vulnerabilities CVE Names: | Low/High (High if arbitrary code can be executed) | Samba Security Vulnerability Red Hat Security Advisory, RHSA-2004:504-13, December 13, 2004 Red Hat Security Advisory,RHSA-2004:549-10, December 2, 2004 |
Postfix Greylisting Service 1.1.1, 1.1.3, 1.2 .0, 1.3 .0 | A vulnerability exists due to insufficient sanitization of an unspecified input, which could let a remote malicious manipulate data. Upgrade available at: There is no exploit required. | SQLgrey Postfix Greylisting Service SQL Injection | Medium | Secunia Advisory, SA13431, December 13, 2004 |
libbsb 0.0.6 | A buffer overflow vulnerability exists that could allow a remote malicious user to execute arbitrary code on the target system. A remote user can create a specially crafted BBS image file that, when processed with bsb2ppm by the target user, will trigger an overflow and execute arbitrary code. The code will run with the privileges of the target user. The overflow resides in bsb_open_header() in 'bsb_io.c.'
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Stuart Cunningham libbsb bsb2ppm bsb_open_header() Buffer Overflow | High | SecurityTracker Alert ID, 1012543, December 16, 2004 |
iPlanet Messaging Server/Sun ONE Messaging Server | A input validation vulnerability may allow a remote malicious unprivileged user the ability to direct a local user's browser (Internet Explorer) to execute javascript to gain unauthorized access by using a specially crafted e-mail message. This issue only occurs when the client browser is Internet Explorer (IE). Updates available: Currently we are not aware of any exploits for this vulnerability. | Sun Security Vulnerability in Webmail | High | Sun Alert ID, 57691, December 15, 2004 |
ChangePassword 0.8 | A vulnerability was reported in ChangePassword. A local malicious user can obtain root privileges on the target system. A local user can invoke 'changepassword.cgi' on UNIX-based systems to execute arbitrary commands with root privileges. The script is installed with set user id (setuid) root user privileges by default. The script does not validate user-supplied environment variables, so a local user can set the PATH to point to a specially crafted version of 'make' and then submit a POST request directly to the application via the environment (rather than via HTTP) to execute the make application with root privileges.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Vinicius M. de Souza ChangePassword Root Privileges | High | SecurityTracker Alert ID, 1012601, December 16, 2004 |
Libxml2 2.6.12-2.6.14 | Multiple buffer overflow vulnerabilities exist: a vulnerability exists in the 'xmlNanoFTPScanURL()' function in 'nanoftp.c' due to a boundary error, which could let a remote malicious user execute arbitrary code; a vulnerability exists in the 'xmlNanoFTPScanProxy()' function in 'nanoftp.c,' which could let a remote malicious user execute arbitrary code; and a vulnerability exists in the handling of DNS replies due to various boundary errors, which could let a remote malicious user execute arbitrary code. Upgrades available at: OpenPKG: Trustix: Fedora: Gentoo: Mandrake: OpenPKG: Trustix: Ubuntu: RedHat: Conectiva: RedHat (libxml): An exploit script has been published. | xmlsoft.org Libxml2 Multiple Remote Stack Buffer Overflows CVE Name: | High | SecurityTracker Alert I, 1011941, October 28, 2004 Fedora Update Notification, Gentoo Linux Security Advisory, GLSA 200411-05, November 2,2 004 Mandrakelinux Security Update Advisory, MDKSA-2004:127, November 4, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.050, November 1, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0055, November 1, 2004 Ubuntu Security Notice, USN-10-1, November 1, 2004 Red Hat Security Advisory, RHSA-2004:615-11, November 12, 2004 Conectiva Linux Security Announcement, CLA-2004:890, November 18, 2004 Red Hat Security Advisory, RHSA-2004:650-03, December 16, 2004 |
Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name | Risk | Source |
3CDaemon 2.0 revision 10 | A remote Denial of Service vulnerability exists in the TFTP service when any command is invoked that contains a superfluous filename parameter. No workaround or patch available at time of publishing. There is no exploit code required. | 3Com 3CDaemon TFTP Service Remote Denial of Service | Low | Bugtraq, December 15, 2004 |
Froogle 1.x | A vulnerability exists in the default installation in the 'setup.php' script, which could let a remote malicious user obtain administrative access; and a vulnerability exists because a remote malicious user can invoke the 'setup.php' script to obtain sensitive information. No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | 68 Designs Froogle Installation Security Issue | Medium/ High (High if arbitrary code can be executed) | Secunia Advisory, SA13504, December 17, 2004 |
Acrobat 6.0-6.0.2, Acrobat Reader 6.0-6.0.2 | A format string vulnerability exists in the in the ETD file parser when processing tag values, which could let a remote malicious user execute arbitrary code. Upgrades available at: Proofs of Concept exploits have been published. | Adobe Acrobat/Acrobat Reader ETD File Parser Format String CVE Name: | High | iDEFENSE Security Advisory, December 14, 2004 |
PHProjekt 2.0, 2.0.1, 2.1 a, 2.1-2.4, 3.0-3.2, 4.2 | A vulnerability exists in 'setup.php' because arbitrary PHP scripts can be uploaded, including operating system commands, which could let a remote malicious user modify the configuration and execute arbitrary scripts. Patch available at: Gentoo: SUSE: Currently we are not aware of any exploits for this vulnerability. | Albrecht Guenther PHProjekt 'setup.php' File Upload | High | Secunia Advisory, Gentoo Linux Security Advisory, GLSA 200412-06, December 10, 2004 SUSE Security Summary Report, SUSE-SR:2004:004, December 16, 2004 |
iWebNegar | An input validation vulnerability exists due to insufficient validation of user-supplied input, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Arash Moslehi IWebNegar Input Validation | High | SecurityFocus, December 15, 2004 |
FM2008 Managed Ethernet Switch v01.06 | A vulnerability exists because the switch has an undocumented default superuser account with a default password, which could let a remote malicious user obtain administrative access.
No workaround or patch available at time of publishing. There is no exploit code required. | Asante FM2008 Managed Ethernet Switch Default Backdoor | High | Secunia Advisory,: SA13494, December 16, 2004 |
JSBoard 2.0.7, 2.0.8, JSBoard-win32 1.3.11 | A vulnerability exists because the 'include/parse.php' script does not restrict the use of multiple file extensions on uploaded files, which could let a remote malicious user execute arbitrary code.
Upgrades available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Byungchan Kim JSBoard 'parse.php' Arbitrary Code Execution | High | STG Security Advisory, SSA-20041215-17, December 15, 2004 |
Anomaly Detector 3.0 8, Guard 3.0 8.12, 3.0 8 | A vulnerability exists because the software contains a default password for an administrative account that is set, without any user's intervention, during installation, which could let a remote malicious user obtain administrative access with superuser privileges.
Workaround and upgrade procedures are described in the vendor's advisory, available at: http://www.cisco.com/warp/public/707/ There is no exploit code required. | Cisco Guard & Traffic Anomaly Detector Default Backdoor | High | Cisco Security Advisory, 63569, December 15, 2004 |
Unity Server 2.0-2.4, 2.46, 3.0-3.3, 4.0 | A vulnerability exists because several default username/password combinations are present in all available releases of Cisco Unity when integrated with Microsoft Exchange, which could let a remote malicious user obtain unauthorized administrative access. Workaround information available at: There is no exploit code required. | Cisco Unity With Exchange Default User Accounts and Passwords | High | Cisco Security Advisory, 63568, December 15, 2004 |
Ikonboard 3.0 .1, 3.1.1, 3.1.2 a | A vulnerability exists in the 'ikonboard.cgi' script due to insufficient validation of user-supplied input in the 'st' and 'keywords' parameters, which could let a remote malicious user obtain sensitive information.
No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | Ikonboard 'st' & 'keywords' Input Validation | Medium | SecurityTracker Alert ID, 1012598, December 16, 2004 |
eSupport 2.1.2, 2.1.8, 2.2, 2.2.5, 2.3 | Multiple input validation vulnerabilities exist: a Cross-Site Scripting vulnerability exists in 'index.php' due to insufficient sanitization of the 'searchm' parameter, which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability exists in 'index.php' due to insufficient sanitization of the '_i,' 'ticketkey22,' and 'email22' parameters and the email field in the 'Forgot Key' feature, which could let a remote malicious user inject arbitrary SQL code. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published for the Cross-Site Scripting vulnerably. | Kayako ESupport Multiple Cross-Site Scripting and SQL Injection | High | GulfTech Security Research Team Security Advisory, December 19, 2004 |
JRun 3.0, 3.1, 4.0; Hitachi Cosminexus Enterprise Enterprise Edition 01-02 (*2), 01-01 (*1), Enterprise Standard Edition 01-02 (*2), 01-01 (*1), Server Web Edition 01-02 (*2), 01-01 (*1) | Multiple vulnerabilities exist: a vulnerability exists due to an implementation error in the generation and handling of JSESSIONIDs, which could let a remote malicious user hijack an authenticated user's session; a Cross-Site Scripting vulnerability exists in the JRUN Management Console, which could let a remote malicious user execute arbitrary HTML and script code; a vulnerability exists due to an URL parsing error, which could let a remote malicious user obtain sensitive information; and a remote Denial of Service vulnerability exists in the verbose logging module.
Patches available at: Hitachi: We are not aware of any exploits for these vulnerabilities. | Macromedia JRun Multiple Remote Vulnerabilities CVE Name: | Low/ Medium/ High (Low if a DoS; Medium if sensitive information can be obtained; and High if arbitrary code can be executed) | Macromedia Security Bulletin, MPSB04-08, September 23, 2004 US-CERT Vulnerability Notes VU#977440, VU#584958, & VU#668206, October 12, 2004, VU#990200, October 14, 2004 Hitachi Software Vulnerability Information, HS04-008, December 16, 2004 |
Mantis 0.9, 0.9.1, 0.10-0.10.2, 0.11, 0.11.1, 0.12, 0.13, 0.13.1, 0.14-14.8, 0.15-0.15.12, 0.16 .0, 0.16-0.16.1, 0.17.0, 0.17-0.17.5, 0.18 a1, 0.18 0rc1, 0.18 0a2-0a4, 0.18, 0.18.2 | An unspecified SQL injection vulnerability exists due to a failure to properly sanitize user-supplied input, which could let a remote malicious user compromise the application, obtain sensitive information, modify data, or exploit vulnerabilities in the underlying database implementation.
Upgrades available at: Currently we are not aware of any exploits for this vulnerability. | Mantis Unspecified SQL Injection | Medium | SecurityFocus, December 16, 2004 |
Opentools Attachment Mod 2.3.4-2.3.10
| Multiple vulnerabilities exist: a Directory Traversal vulnerability exists which could let a remote malicious user obtain sensitive information; and a vulnerability exists due to insufficient handling of 'mod_mime' on several unspecified extensions, which could let a remote malicious user upload arbitrary script files. Upgrades available at: Currently we are not aware of any exploits for these vulnerabilities. | Opentools Attachment Mod Multiple Remote Vulnerabilities | Medium | CastleCops(SM) Security Advisory, December 14, 2004 |
asp2php 0.76.23 | Two buffer overflow vulnerabilities exist: a buffer overflow vulnerability exists due to boundary errors in the 'preparse()' function, which could let a remote malicious user execute arbitrary code; and a buffer overflow vulnerability exists in the in the 'gettoken()' function, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. Exploit scripts have been published. | Michael Kohn ASP2PHP Remote Buffer Overflows | High | Secunia Advisory, SA13526, December 17, 2004 |
mnoGoSearch 3.1.19, 3.1.20, 3.2.10, 3.2.13-3.2.26 | Multiple Cross-Site Scripting vulnerabilities exist due to insufficient sanitization of input passed to the search results page and the extended/simple search form links, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: There is no exploit code required. | mnoGoSearch Multiple Cross-Site Scripting CVE Name: | High | Secunia Advisory, SA13432, December 13, 2004 |
MoniWiki 1.0.8, 1.0.9 .1, 1.0.9 | A vulnerability exists in 'UploadFile.php' because the use of multiple file extensions on uploaded files is not restricted, which could let a remote malicious user execute arbitrary code.
Update available at: There is no exploit code required. | MoniWiki 'UploadFile.php' Arbitrary Code Execution | High | STG Security Advisory, SSA-20041215-15, December 15,2004 |
Contract Jack 1.1, No One Lives Forever 1.0 .004, 2 1.3, Tron 2.0 1.0, 2.0 1.42 | A remote Denial of Service vulnerability exists due to a failure to handle exceptional conditions. No workaround or patch available at time of publishing. An exploit script has been published.
| Monolith Lithtech Game Engine Remote Denial of Service | Low | Bugtraq, December 13, 2004 |
name=mozillaonunload>Mozilla.org Mozilla Firefox 0.9.2 and Mozilla 1.7.1 on Windows | A spoofing vulnerability exists that could allow malicious sites to abuse SSL certificates of other sites. An attacker could make the browser load a valid certificate from a trusted website by using a specially crafted 'onunload' event. The problem is that Mozilla loads the certificate from a trusted website and shows the 'secure padlock' while actually displaying the content of the malicious website. The URL shown in the address bar correctly reads that of the malicious website. An additional cause has been noted due to Mozilla not restricting websites from including arbitrary, remote XUL (XML User Interface Language) files. Workaround: Do not follow links from untrusted websites and verify the correct URL in the address bar with the one in the SSL certificate. SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> Fedora Legacy: A Proof of Concept exploit has been published. | Medium | Cipher.org, July 25, 2004 SUSE Security Announcement, SUSE-SA:2004:036, October 6, 2004 Conectiva Linux Security Announcement, CLA-2004:877, October 22, 2004 Fedora Legacy Update Advisory, FLSA:2089, October 27, 2004 US-CERT Vulnerability Note, VU#262350, December 17, 2004 | |
CVSTrac 1.1-1.1.4; OpenPKG Current, 2.1, 2.2 | A Cross-Site Scripting vulnerability exists due to a insufficient sanitization of user-supplied URI data prior to including it in dynamically generated web page content, which could let a remote malicious user execute arbitrary HTML and script code. CVSTrac: OpenPKG: ftp://ftp.openpkg.org/release/ There is no exploit code required. | CVSTrac Unspecified Cross-Site Scripting CVE Name: | High | OpenPKG Security Advisory, OpenPKG-SA-2004.056, December 17, 2004 |
Debian Linux 3.0 spar, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, alpha; Ethereal Group Ethereal 0.9-0.9.16, 0.10-0.10.7
| Multiple vulnerabilities exist: a remote Denial of Service vulnerability exists in the DICOM dissector; a remote Denial of Service vulnerability exists in the handling of RTP timestamps; a remote Denial of Service vulnerability exists in the HTTP dissector; and a remote Denial of Service vulnerability exists in the SMB dissector when a malicious user submits specially crafted SMB packets. Potentially these vulnerabilities may also allow the execution of arbitrary code. Upgrades available at: Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | Ethereal Multiple Denial of Service & Potential Code Execution Vulnerabilities CVE Names: | Low/High (High if arbitrary code can be executed) | Ethereal Security Advisory, enpa-sa-00016, December 15, 2004 |
PHP 4.3.6-4.3.9, 5.0 candidate 1-canidate 3, 5.0 .0-5.0.2 | Multiple vulnerabilities exist: a buffer overflow vulnerability exists in the 'pack()' function, which could let a remote malicious user execute arbitrary code; an integer overflow vulnerability exists in the 'unpack()' function, which could let a remote malicious user obtain sensitive information; a vulnerability exists in 'safe_mode' when executing commands, which could let a remote malicious user bypass the security restrictions; a vulnerability exists in 'safe_mode' combined with certain implementations of 'realpath(),' which could let a remote malicious user bypass security restrictions; a vulnerability exists in 'realpath()' because filenames are truncated; a vulnerability exists in the 'unserialize()' function, which could let a remote malicious user obtain sensitive information or execute arbitrary code; a vulnerability exists in the 'shmop_write()' function, which may result in an attempt to write to an out-of-bounds memory location; a vulnerability exists in the 'addslashes()' function because '\0' ir not escaped correctly; a vulnerability exists in the 'exif_read_data()' function when a long sectionname is used, which could let a remote malicious user obtain sensitive information; and a vulnerability exists in 'magic_quotes_gpc,' which could let a remote malicious user obtain sensitive information.
Upgrades available at: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" There is no exploit code required; however, a Proof of Concept exploit script has been published. | PHP Multiple Remote Vulnerabilities CVE Names: | Medium/ High (High if arbitrary code can be executed) | Bugtraq, December 16, 2004 |
phpBB 2.0.7 a, 2.0.7 | A vulnerability exists due to failure to properly sanitize user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code.
Upgrades available at: There is no exploit code required. | PHPBB IMG Tag HTML Injection | High | SecurityFocus, December 17, 2004 |
phpBB 2.0.0-2.0.9 | Multiple vulnerabilities exist: a vulnerability exists in 'viewtopic.php' due to insufficient sanitization of the 'highlight' parameter, which could let a malicious user obtain sensitive information or execute arbitrary code; a vulnerability exists due to insufficient sanitization of input passed to the username handling, which could let a remote malicious user execute arbitrary HTML or script code; and a vulnerability exists due to insufficient sanitization of input passed to the username handling before being used in an SQL query, which could let a malicious user execute arbitrary code. According to reports, this vulnerability is being actively exploited by the Santy.A worm. The worm appears to propogate by searching for the keyword 'viewtopic.php' in order to find vulnerable sites. Upgrades available at: There is no exploit code required; however, a Proof of Concept exploit script has been published. Vulnerability has appeared in the Press and other public media. | PHPBB Login Form Multiple Input Validation | High | SECUNIA ADVISORY ID: US-CERT Technical Cyber Security Alert, TA04-356A, December 21, 2004 US-CERT Vulnerability Note, VU#497400, December 21, 2004 |
PHPFormMail prior to 1.07.0
| A Cross-Site Scripting vulnerability exists in the 'output_html()' function in 'formmail.php' and another unspecified parameter due to insufficient input validation, which could let a remote malicious user execute arbitrary HTML and script code. Update available at: Currently we are not aware of any exploits for this vulnerability. | PHPFormMail Cross-Site Scripting | High | Secunia Advisory, SA13576, December 20, 2004 |
PhpGedView 2.52.3, 2.60, 2.61, 2.61.1, 2.65 beta5 | A Cross-Site Scripting vulnerability exists in 'source.php,' Imageview.PHP,' 'Login.PHP,' 'Gedrecord.PHP,' 'Gdbi_interface.PHP,' 'Relationship.PHP,' 'Calendar.PHP,' 'Timeline.PHP,' and 'Placelist.PHHP' due to insufficient sanitization of user-supplied URI input, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: There is not exploit required; however, Proofs of Concept exploits have been published. | PhpGedView Source.PHP Cross-Site Scripting CVE Name: | High | SecurityFocus, December 13, 2004 |
Aficio 450 PCL Printer, 455 PCL Printer | A remote Denial of Service vulnerability exists due to an error in the handling of ICMP packets. No workaround or patch available at time of publishing. An exploit script has been published. | Ricoh Aficio 450/455 PCL Printer Remote ICMP Denial of Service | Low | Secunia Advisory, SA13475, December 17, 2004 |
singapore 0.9 a beta, 0.9 beta, 0.9.1 beta-0.9.10 beta, 0.9.10 | Multiple vulnerabilities exist: a vulnerability exists in 'thumb.php' due to insufficient validation of the 'showThumb()' function, which could let a remote malicious user download arbitrary files; a vulnerability exists in 'admin.class.php' in the 'addImage()' function, which could let a remote malicious user upload files containing PHP code; a Directory Traversal vulnerability exists in 'admin.class.php' which could let a remote malicious user delete arbitrary directories; and multiple unspecified Cross-Site Scripting vulnerabilities exist which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: There is no exploit code required. | Singapore Image Gallery Multiple Remote Vulnerabilities | Medium/ High (High if arbitrary code can be executed) | SIG^2 Vulnerability Research Advisory, December 16, 2004 |
GNUBoard 3.30-3.39 | A vulnerability exists in 'index.php' due to insufficient verification of the 'doc' parameter before being used to include files, which could let a remote malicious user execute arbitrary code.
Update available at: There is no exploit code required. | GNUBoard 'doc' Parameter Arbitrary File Inclusion | High | STG Security Advisory, SSA-20041214-14, December 15,2004 |
Brightmail Anti-Spam 6.0.1 | Two vulnerabilities exist: a remote Denial of Service vulnerability exists because the Sieve module fails to recognize malformed RFC 822 MIME attachment boundaries; and a remote Denial of Service vulnerability exists because Spamhunter fails to convert certain valid character encoding sets to UTF. Patch available at: Currently we are not aware of any exploits for these vulnerabilities. | Symantec Brightmail Remote Denials of Service | Low | SecurityTracker Alert ID, 1012612, December 17, 2004 |
IMG2ASCII 1.15, 1.16 | A vulnerability exists in the 'ascii.php' script because the use of multiple file extensions on uploaded files is not restricted, which could let a remote malicious user execute arbitrary code. Upgrades available at: There is no exploit script required. | Ueli Weiss IMG2ASCII Unauthorized File Upload | High | SecurityTracker Alert ID, 1012622, December 19, 2004 |
WordPress 1.2, 1.2.1 | Various Cross-Site Scripting vulnerabilities exists due to insufficient sanitization of user-supplied URI input, which could let a remote malicious user execute arbitrary HTML and script code. Upgrade available at: http://wordpress.org/latest.tar.gz There is not exploit code required; however, Proofs of Concept exploits have been published. | Wordpress Multiple Cross-Site Scripting | High | SecurityFocus, December 16, 2004 |
WorkBoard 1.2 | Multiple Cross-Site Scripting vulnerabilities exists due to insufficient sanitization of user-supplied URI input, which could let a remote malicious user execute arbitrary HTML and script code.
This application is not supported by the vendor. There is no exploit code required; however, Proofs of Concept exploits have been published. | WorkBoard Multiple Cross-Site Scripting | High | SecurityFocus, December 17, 2004 |
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script | Script name | Workaround or Patch Available | Script Description |
December 19, 2004 | ethereal-0.10.8.tar.gz | N/A | Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. |
December 18, 2004 | 68-1.grx.zip 68-2.grx.zip | No | Exploit for the Anoakie Turner GREED 'DownloadLoop()' Function vulnerability. |
December 18, 2004 | 71-1.cal.zip 71-2.cal.zip | Yes | A Proof of Concept exploit for the Andrew W. Rogers pcal Buffer Overflow vulnerabilities. |
December 17, 2004 | 29-1.asp.zip 29-2.asp.zip | No | Exploit for the ASP2PHP Remote Buffer Overflow vulnerabilities. |
December 17, 2004 | 31.emelody.zip | No | Exploit for the Michael Kohn Ringtone Tools parse_emelody() Buffer Overflow vulnerability. |
December 17, 2004 | 34.frm.zip | No | Exploit for the Michael Kohn Visual Basic to C/GTK (vb2c) gettoken() Buffer Overflow vulnerability. |
December 17, 2004 | 35.abc.zip | Yes | A Proof of Concept exploit for the Jean-François Moine abcm2ps put_words() Buffer Overflow vulnerability. |
December 17, 2004 | 36-1.abc.zip | No | A Proof of Concept exploit for the aChristoph Dalitz abctab2ps Buffer Overflows. |
December 17, 2004 | 36-2.abc.zip | No | A Proof of Concept exploit for the bctab2ps Trim_Title Function ABC File Remote Buffer Overflow vulnerability. |
December 17, 2004 | 38-1.abc.zip 38-2.abc.zip | No | Exploits for the ABC2MIDI Multiple Stack Buffer Overflow vulnerability. |
December 17, 2004 | 45.pgn.zip | No | A Proof of Concept exploit for the GNU pgn2web process_moves() Buffer Overflow vulnerability. |
December 17, 2004 | 46.mesh.zip | No | A Proof of Concept exploit for the Helmut Cantzler Mesh Viewer dxfin() Buffer Overflow vulnerability. |
December 17, 2004 | 53.csv.zip | Yes | A Proof of Concept exploit for the BSD csv2xml get_csv_token() Buffer Overflow vulnerability. |
December 17, 2004 | 58.xml.zip | No | Script that exploits the o3read parse_html() Buffer Overflow vulnerability. |
December 17, 2004 | 61.html.zip | No | A Proof of Concept exploit script for the html2hdml remove_quote() Buffer Overflow vulnerability. |
December 17, 2004 | 74.abc.zip | No | A Proof of Concept exploit for the GNU jcabc2ps switch_voice() Buffer Overflow vulnerability. |
December 17, 2004 | 79.abc.zip | No | Exploit for the Chris Walshaw abc2mtex process_abc() Buffer Overflow vulnerability. |
December 17, 2004 | 80.abc.zip | No | Exploit for the Guido Gonzato abcpp handle_directive() Buffer Overflow vulnerability. |
December 17, 2004 | 81.rtf.zip | No | A Proof of Concept exploit for the GNU UnRTF Font Table Conversion Buffer Overflow vulnerability. |
December 17, 2004 | winRAR3_40BufferOverflowPOC.c | No | Exploit for the RARLAB WinRAR File Name Remote Client-Side Buffer Overflow vulnerability. |
December 16, 2004 | 1.xls.zip | No | Exploit for the David Giffin xlreader book_format_sql() Buffer Overflow vulnerability. |
December 16, 2004 | 10.list.zip | No | Exploit for the GNU jpegtoavi get_file_list_stdin() Buffer Overflow vulnerability. |
December 16, 2004 | 11.mail.zip | Yes | Script that exploits the Bolthole Filter save_embedded _address() Buffer Overflow vulnerability. |
December 16, 2004 | 12.html.zip | No | Script that exploits the Patric Müller Vilistextum get_attr() Buffer Overflow vulnerability. |
December 16, 2004 | 13.txt.zip | Yes | Exploit for the AtBas 2fax expandtabs() Buffer Overflow vulnerability. |
December 16, 2004 | 2.dxf | No | A Proof of Concept exploit for the GNU DXFscope dxfin() Buffer Overflow vulnerability. |
December 16, 2004 | 20.avi | Yes | Exploit for the GPL Xine open_aiff_file() Buffer Overflow vulnerability. |
December 16, 2004 | 22.S.zip | Yes | Exploit for the LGPL NASM error() Buffer Overflow vulnerability. |
December 16, 2004 | 3.msg.zip | No | A Proof of Concept exploit script for the Little Igloo LinPopUp strexpand() Buffer Overflow vulnerability. |
December 16, 2004 | 5.rtf.zip | No | A Proof of Concept exploit script for the GNU rtf2latex2e ReadFontTbl() Buffer Overflow vulnerability. |
December 16, 2004 | 7.3ds.zip | No | A Proof of Concept exploit script for the GNU Convex 3D readObjectChunk() Buffer Overflow vulnerability. |
December 16, 2004 | 9.http.zip | No | Proof of Concept exploit for the Gastón Kleiman Yanf get() Buffer Overflow vulnerability. |
December 16, 2004 | ability-2.34-ftp-stor.py un-aftp.c | No | Exploits for the Ability Server 'APPE FTP' Command Buffer Overflow vulnerability. |
December 16, 2004 | firstclass_search_exploit.c secunia.com-advisories-13415.c | Yes | Script that exploits the OpenText FirstClass HTTP Daemon Search Function Remote Denial of Service vulnerability. |
December 15, 2004 | 17-s.c | Yes | Exploit for the GNU MPlayer ASF Streams Processing Buffer Overflow vulnerability. |
December 15, 2004 | 21.hpgl.gz | Yes | Exploit for the GNU CUPS HPGL ParseCommand() Buffer Overflow vulnerability. |
December 15, 2004 | 49.list.zip | No | Exploit for the GNU ChBg simplify_path() Buffer Overflow vulnerability. |
December 15, 2004 | 8.list | No | Exploit for the Michael Hipp mpg123 find_next_file() Buffer Overflow vulnerability. |
December 15, 2004 | napshare_srv.c napshare_srv_2.c | No | Scripts that exploit the GNU NapShare auto_filter_extern() Buffer Overflow vulnerability. |
December 15, 2004 | phpbb2memorydump.zip | Yes | Exploit for the PHP Multiple Local And Remote Vulnerabilities. |
December 15, 2004 | rpcl_icmpdos.c | No | Script that exploits the Ricoh Aficio 450/455 PCL Printer Remote ICMP Denial of Service vulnerability. |
December 14, 2004 | scm_send_dos.c | Yes | Script that exploits the Multiple Vendors Linux Kernel Auxiliary Message Layer State Error vulnerability. |
December 13, 2004 | ceaglesock.zip | No | Exploit for the Codename Eagle UDP Packet Processing Remote Denial of Service vulnerability. |
December 13, 2004 | igmp.c | Yes | Exploit for the Multiple Vendors Linux Kernel IGMP Integer Underflow Vulnerabilities. |
December 13, 2004 | lithsock.zip | No | Exploit for the Monolith Lithtech Game Engine Remote Denial of Service vulnerability. |
name=trends>Trends
- The US-CERT continues to receive reports of increased phishing activity during this holiday season. Online shoppers are urged to take special caution while conducting on-line transactions via the Internet.
For additional information regarding phishing and social engineering, please visit the following links:
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trends |
face="Arial, Helvetica, sans-serif">Date |
1 | Netsky-P | Win32 Worm | Stable | March 2004 |
2 | Sober-I | Win32 Worm | Increase | November 2004 |
3 | Zafi-B | Win32 Worm | Stable | June 2004 |
4 | Netsky-D | Win32 Worm | Decrease | March 2004 |
5 | Netsky-Z | Win32 Worm | Stable | April 2004 |
6 | Netsky-Q | Win32 Worm | Stable | March 2004 |
7 | Bagle-AA | Win32 Worm | Stable | April 2004 |
8 | Bagle-AT | Win32 Worm | Stable | October 2004 |
9 | Bagle-AU | Win32 Worm | Stable | October 2004 |
10 | Netsky-B | Win32 Worm | Stable | February 2004 |
Table Updated December 21, 2004
Viruses or Trojans Considered to be a High Level of Threat
Viruses or Trojans Considered to be a High Level of Threat
- F-Secure has released their 'F-Secure Corporation's Data Security Summary for 2004.' New trends in 2004 were primarily the massive increase in phishing email scams, and the introduction of open-source botnets - networks of infected machines harnessed for malicious operations, and for-profit virus-writing. For more information, see: http://www.f-secure.com/2004/
- Sanity.A:
A Web worm that identifies potential victims by searching Google is spreading among online bulletin boards using a vulnerable version of the program phpBB. Almost 40,000 sites may have already been infected. Using Microsoft's Search engine to scan for the phrase 'NeverEverNoSanity'--part of the defacement text that the Santy worm uses to replace files on infected Web sites--returns nearly 39,000 hits. For more information, see: http://news.com.com/Net%2Bworm%2Busing%2BGoogle%2Bto%2Bspread/2100%2D7349_3%2D5499725.html.
The following table provides, in alphabetical order, a list of new viruses, variations of previously encountered viruses, and Trojans that have been discovered during the period covered by this bulletin. This information has been compiled from the following anti-virus vendors: Sophos, Trend Micro, Symantec, McAfee, Network Associates, Central Command, F-Secure, Kaspersky Labs, MessageLabs, Panda Software, Computer Associates, and The WildList Organization International. Users should keep anti-virus software up to date and should contact their anti-virus vendors to obtain specific information on the Trojans and Trojan variants that anti-virus software detects.
NOTE: At times, viruses and Trojans may contain names or content that may be considered offensive.
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.