Summary of Security Items from March 9 through March 15, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, so the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to items appearing in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
3CDaemon 2.0 revision 10 | Multiple vulnerabilities exist: a buffer overflow vulnerability exists when a remote malicious user submits a specially crafted FTP username, which could lead to the execution of arbitrary code; a buffer overflow vulnerability exists in several FTP commands, including cd, send, ls, put, delete, rename, rmdir, literal, stat, and cwd, which could let a remote malicious user execute arbitrary code; a remote Denial of Service vulnerability exists when a malicious user submits an FTP user command with format string characters; a format string vulnerability exists in the cd, delete, rename, rmdir, literal, stat, and cwd [and others] commands, which could let a remote malicious user execute arbitrary code; a remote Denial of Service vulnerability exists when a malicious user connects to the TFTP service and requests an MS-DOS device name; a vulnerability exists when the directory to an MS-DOS device name or a filename is changed, which could let a remote malicious user obtain sensitive information. No workaround or patch available at time of publishing. Another exploit script has been published. | 3Com 3CDaemon Multiple Remote Vulnerabilities | Low/Medium/ High (Low if a DoS; Medium if sensitive information can be obtained; and High if arbitrary code can be executed) | [I.T.S] Security Research Team Advisory, January 4, 2005 Security Focus, 12155, February 19, 2005 Security Focus, 12155, March 15, 2005 |
aeNovo | A vulnerability has been reported in the default configuration because the 'dbase/aeNovo1.mdb' database file can be accessed directly, which could let a remote malicious user obtain sensitive information, including the administrative password.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | aeNovo Information Disclosure | Medium | Secunia Advisory, SA14580, March 14, 2005 |
Telnet Server for Windows NT/2000/XP/2003 4.0, 5.0 | A buffer overflow vulnerability has been reported due to a failure to copy network derived data securely into sensitive process buffers, which could let a remote malicious user execute arbitrary code with SYSTEM privileges. Update available at: http://www.goodtechsys.com A Proof of Concept exploit script has been published. | GoodTech Systems Telnet Server for Windows NT/2000/XP/2003 Remote Buffer Overflow | High | BugTraq, 393295March 15, 2005 |
IMail 5.0, 5.0.5-5.0.8, 6.0-6.0.6, 6.1-6.4, 7.0.1-7.0.7, 7.1, 7.12, 8.0.3, 8.0.5, 8.1, 8.13, Ipswitch Collaboration Suite | A buffer overflow vulnerability has been reported in the EXAMINE command in the IMAP daemon due to improper processing of user-supplied parameters, which could let a remote malicious user execute arbitrary code with administrator privileges.
Hotfix available at: Currently we are not aware of any exploits for this vulnerability. | Ipswitch IMail Server IMAP EXAMINE Command Remote Buffer Overflow | High | iDEFENSE Security Advisory, March 10, 2005 |
Exchange Server 2003, SP1 | A remote Denial of Service vulnerability has been reported due to a stack overflow when deleting or moving a folder that contains multiple nested subfolders.
Hotfix available at: http://support.microsoft.com/ There is no exploit code required. | Microsoft Exchange Server Nested Subfolders Remote Denial of Service | Low | Secunia Advisory: SA14543, March 9, 2005 |
Internet Explorer 6.0 SP2 | A remote Denial of Service vulnerability has been reported due to a buffer overflow in 'mshtml.dll' CSS handling.
No workaround or patch available at time of publishing. An exploit script has been published. | Microsoft Internet Explorer MSHTML.DLL CSS Handling Remote Denial of Service | Low | Securiteam, March 9, 2005 |
Windows 2000 SP3 & SP4, Windows XP 64-Bit Edition SP1 | A buffer overflow vulnerability exists when handling Server Message Block (SMB) traffic, which could let a remote malicious user execute arbitrary code. Patches available at: Microsoft Windows NT 4.0 has also been found vulnerable to the issue; however, this platform is no longer publicly supported by Microsoft. A patch is available for customers that have an active end-of-life support agreement including extended Windows NT 4.0 support. Information regarding the end-of-life support agreement can be found at the following location: Currently we are not aware of any exploits for this vulnerability. | Microsoft Windows SMB Buffer Overflow | High | Microsoft Security Bulletin, MS05-011, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A US-CERT Cyber Security Alert SA05-039A US-CERT Vulnerability Note VU#652537 Security Focus, 12484, March 9, 2005 |
Windows 2000 SP3 & SP4, Windows XP SP1 & SP2, Windows XP 64-Bit Edition SP1 (Itanium), Windows XP 64-Bit Edition Version 2003 | Multiple vulnerabilities exist: a vulnerability exists due to insufficient validation of drag and drop events from the Internet zone to local resources, which could let a remote malicious user execute arbitrary code; a vulnerability exists due to the way certain encoded URLs are parsed, which could let a remote malicious user execute arbitrary HTML and script code; a vulnerability exists in the validation of URLs in CDF (Channel Definition Format) files, which could let a remote malicious user execute arbitrary HTML and script code; a vulnerability exists due to an input validation error in the 'createControlRange()' javascript function, which could let a remote malicious user execute arbitrary code; a vulnerability exists due to insufficient cross-zone restrictions; a vulnerability exists due to the way web sites are handled inside the 'Temporary Internet Files' folder; and a vulnerability exists in the 'codebase' attribute of the 'object' tag due to a parsing error. Patches available at: An exploit script has been published. | Microsoft Internet Explorer Vulnerabilities | High | Microsoft Security Bulletin, MS05-014, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A US-CERT Cyber Security Alert SA05-039A US-CERT Vulnerability Notes VU#580299, VU#823971VU#843771 Security Focus, 12475, March 14, 2005 |
PlatinumFTPserver 1.0.18 | A remote Denial of Service vulnerability has been reported when a malicious user attempts to authenticate with a malformed user name. No workaround or patch available at time of publishing. An exploit script has been published. | PlatinumFTPServer Malformed User Name Connection Remote Denial of Service | Low | Security Focus 12790, March 12, 2005 |
Active WebCam 4.3, 5.5 | Multiple vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported when a malicious user submits a request for a file that exists on a floppy drive; a remote Denial of Service vulnerability has been reported when the 'Filelist.html' file is requested; an installation path disclosure vulnerability has been reported when a request is submitted for a non-existent file, which could let a remote malicious user obtain sensitive information; and an information disclosure vulnerability has been reported because different error messages are returned to a request for a file depending on whether the file exists or not, which could let a remote malicious user obtain sensitive information. No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | PY Software Active Webcam Webserver Remote Denials of Service & Information Disclosure CAN-2005-0730 | Low/ Medium (Medium if sensitive information can be obtained) | Secunia Advisory, SA14553, March 10, 2005 |
Sentinel License Manager 7.2.0.2 | A buffer overflow vulnerability exists in the 'Lservnt' service on UDP port 5093 due to a boundary error, which could let a remote malicious user execute arbitrary code with SYSTEM privileges. Upgrade to version 8.0 An exploit script has been published. | SafeNet Sentinel License Manager Remote Buffer Overflow | High | CIRT.DK Advisory, March 7, 200 Security Focus, 12742, March 13, 2005 |
AntiVirus Corporate Edition 9.0 | A vulnerability has been reported when malicious files are placed on the server through an SMB share, which could bypass the detection mechanism.
No workaround or patch available at time of publishing. There is no exploit code required. | Symantec AntiVirus SMB Scan Detection Bypass | Medium | Security Focus, 12808, March 15, 2005 |
XPand Rally 1.0, 1.1 | A format string vulnerability has been reported due to a failure of the application to securely call a formatted printing function, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. An exploit script has been published. | Techland XPand Rally Remote Format String | High | Securiteam, March 10, 2005 |
Messenger 4.0, 5.0.1232, 5.0 .1065, 5.0 .1046, 5.0, 5.5.1249, 5.5, 5.6.0.1358, 5.6.0.1356, 5.6.0.1355, 5.6.0.1351, | A buffer overflow vulnerability has been reported when a remote malicious user submits a custom message to a target buddy, which could lead to the execution of arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Yahoo! Messenger Custom Message Buffer Overflow | High | Security Focus, 12750, March 8, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
bld 0.3 | A buffer overflow vulnerability has been reported due to the way the 'select()' system call is implemented, which could let a remote malicious user cause a Denial of Service or potentially execute arbitrary code. Upgrade available at: An exploit has been published but has not been released to the public. | Black List Daemon select() Remote Buffer Overflow | Low/ (High if arbitrary code can be executed) | Bugtraq, January 24, 2005 Security Focus, 12347, March 11, 2005 |
LuxMan 0.41 -17, 0.41 | A buffer overflow vulnerability has been reported, which could let a malicious user execute arbitrary commands as ROOT. Debian: Currently we are not aware of any exploits for this vulnerability. | Frank McIngvale LuxMan Buffer Overflow | High | Debian Security Advisory, DSA 693-1, March 14, 2005 |
Freeciv 2.0 beta8 | A remote Denial of Service vulnerability has been reported due to the way incomplete or modified requests are handled. No workaround or patch available at time of publishing. An exploit script has been published. | Freeciv Remote Denial of Service | Low | Security Focus, 12814, March 15, 2005 |
XPDF prior to 3.00pl3 | A buffer overflow vulnerability exists in ' 'xpdf/Decrypt.cc' due to a boundary error in the 'Decrypt::makeFileKey2' function, which could let a remote malicious user execute arbitrary code. Update available at: Patch available at: Debian: http://security.debian.org/pool/ Fedora: Gentoo: KDE: Ubuntu: Conectiva: Mandrake: SUSE: FedoraLegacy: Gentoo: SGI: Trustix: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | Glyph and Cog Xpdf 'makeFileKey2()' Buffer Overflow | High | iDEFENSE Security Advisory, January 18, 2005 Conectiva Linux Security Announcement, CLA-2005:921, January 25, 2005 Mandrakelinux Security Update Advisories, MDKSA-2005:016-021, January 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 SGI Security Advisory, 20050202-01-U, February 9, 2005 Gentoo Linux Security Advisory, GLSA 200502-10, February 9, 2005 Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0003, February 11, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 SUSE Security Announcement, SUSE-SA:2005:015, March 14, 2005
|
cpio 1.0, 1.1, 1.2 | A vulnerability has been reported in 'cpio/main.c' due to a failure to create files securely, which could let a malicious user obtain sensitive information. Upgrades available at: SGI: TurboLinux: There is no exploit required. | CPIO Archiver Insecure File Creation | Medium | Security Tracker Alert, 1013041, January 30, 2005 SGI Security Advisory, 20050204-01-U, March 7, 2005 Turbolinux Security Advisory, TLSA-2005-30, March 10, 2005 |
Xpdf prior to 3.00pl2 | A buffer overflow vulnerability exists that could allow a remote user to execute arbitrary code on the target user's system. A remote user can create a specially crafted PDF file that, when viewed by the target user, will trigger an overflow and execute arbitrary code with the privileges of the target user. A fixed version (3.00pl2) is available at: A patch is available: KDE: Gentoo: Fedora: Ubuntu: Mandrakesoft (update for koffice): Mandrakesoft (update for kdegraphics): Mandrakesoft (update for gpdf): Mandrakesoft (update for xpdf): Mandrakesoft (update for tetex): Debian: Fedora (update for tetex): Fedora: Gentoo: TurboLinux: SGI: Conectiva: SuSE: FedoraLegacy: FedoraLegacy: SUSE: Currently we are not aware of any exploits for this vulnerability. | GNU Xpdf Buffer Overflow in doImage() | High | iDEFENSE Security Advisory 12.21.04 KDE Security Advisory, December 23, 2004 Mandrakesoft, MDKSA-2004:161,162,163,165, 166, December 29, 2004 Fedora Update Notification, Gentoo Linux Security Advisory, GLSA 200501-13, January 10, 2005 Conectiva Linux Security Announcement, CLA-2005:921, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 Avaya Security Advisory, ASA-2005-027, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 SUSE Security Announcement, SUSE-SA:2005:015, March 14, 2005
|
Grip 3.1.2, 3.2 .0 | A buffer overflow vulnerability has been reported in the CDDB protocol due to a boundary error, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code.
Fedora: Currently we are not aware of any exploits for this vulnerability. | Grip CDDB Query Buffer Overflow | Low/ (High if arbitrary code can be executed) | Fedora Update Notifications, FEDORA-2005-202 & 203, March 9, 2005 |
Tru64 4.0 G PK4, 4.0 F PK8, 5.1 B-2 PK4, 5.1 B-1 PK3, 5.1 A PK6 | A Denial of Service vulnerability has been reported in the systems message queue. Patches available at: Currently we are not aware of any exploits for this vulnerability. | HP Tru64 Message Queue Denial of Service | Low | HP Security Bulletin, HPSBTU01109, March 9, 2005 |
Sylpheed 0.8.11, 0.9.4-0.9.12, 0.9.99, 1.0 .0-1.0.2 | A buffer overflow vulnerability exists in certain headers that contain non-ASCII characters, which could let a remote malicious user execute arbitrary code. Upgrades available at: Fedora: Currently we are not aware of any exploits for this vulnerability. | Sylpheed Mail Client Remote Buffer Overflow | High | Security Tracker Alert, 1013376, March 4, 2005 Fedora Update Notification, |
DHCPD 2.0.pl5 | A format string vulnerability has been reported because user-supplied data is logged in an unsafe fashion, which could let a remote malicious user execute arbitrary code. Upgrades available at: We are not aware of any exploits for this vulnerability. | ISC DHCPD Package Remote Format String | High | Debian Security Advisory, DSA 584-1, November 4, 2004 |
libexif 0.6.9, 0.6.11 | A vulnerability exists in the 'EXIF' library due to insufficient validation of 'EXIF' tag structure, which could let a remote malicious user execute arbitrary code.
Ubuntu: Fedora: Gentoo: Currently we are not aware of any exploits for this vulnerability. | LibEXIF Library EXIF Tag Structure Validation | High | Ubuntu Security Notice USN-91-1, March 7, 2005 Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200503-17, March 12, 2005 |
rxvt-unicode prior to 5.3
| A buffer overflow vulnerability has been reported in 'command.c,' which could let a remote malicious user execute arbitrary code. Update available at: Currently we are not aware of any exploits for this vulnerability. | Marc Lehmann rxvt-unicode 'command.c' Remote Buffer Overflow | High | Secunia Advisory: SA14562, March 15, 2005 |
Ringtone Tools 2.22 | A vulnerability was reported in Ringtone Tools. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted eMelody file that, when processed by the target user with Ringtone Tools, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. The buffer overflow resides in the parse_emelody() function in 'parse_emelody.c.' Gentoo: A Proof of Concept exploit script has been published. | Michael Kohn Ringtone Tools parse_emelody() Buffer Overflow | High | Security Tracker Alert ID, 1012573, December 16, 2004 Gentoo Linux Security Advisory, GLSA 200503-18, March 15, 2005 |
Gentoo Linux 0.5, 0.7, 1.1 a, 1.2, 1.4, rc1-rc3; libdbi-perl libdbi-perl 1.21, 1.42 | A vulnerability exists libdbi-perl due to the insecure creation of temporary files, which could let a remote malicious user overwrite arbitrary files.
Debian: Gentoo: RedHat: Ubuntu: Mandrake: SUSE: Gentoo: There is no exploit code required. | Libdbi-perl Insecure Temporary File Creation | Medium | Debian Security Advisory, DSA 658-1, January 25, 2005 Ubuntu Security Notice, USN-70-1, January 25, 2005 Gentoo Linux Security Advisory, GLSA 200501-38, January 26, 2005 RedHat Security Advisory, RHSA-2005:069-08, February 1, 2005 MandrakeSoft Security Advisory, MDKSA-2005:030, February 8, 2005 SUSE Security Summary Report, SUSE-SR:2005:004, February 11, 2005 Gentoo Linux Security Advisory [UPDATE], GLSA 200501-38:03, March 15, 2005 |
Larry Wall Perl 5.0 05_003, 5.0 05, 5.0 04_05, 5.0 04_04, 5.0 04, 5.0 03, 5.6, 5.6.1, 5.8, 5.8.1, 5.8.3, 5.8.4 -5, 5.8.4 -4, 5.8.4 -3, 5.8.4 -2.3, 5.8.4 -2, 5.8.4 -1, 5.8.4, 5.8.5, 5.8.6 | A vulnerability has been reported in the 'rmtree()' function in the 'File::Path.pm' module when handling directory permissions while cleaning up directories, which could let a malicious user obtain elevated privileges.
Ubuntu: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Perl 'rmtree()' Function Elevated Privileges | Medium | Ubuntu Security Notice, USN-94-1 March 09, 2005 Gentoo Linux Security Advisory [UPDATE], GLSA 200501-38:03, March 15, 2005 |
Perl | A race condition vulnerability was reported in the 'File::Path::rmtree()' function. A remote user may be able to obtain potentially sensitive information. A remote user may be able to obtain potentially sensitive information or modify files. The vendor has released Perl version 5.8.4-5 to address this vulnerability. Customers are advised to contact the vendor for information regarding update availability. Debian: Ubuntu: OpenPKG: Gentoo: Mandrake: SUSE: Gentoo: Currently we are not aware of any exploits for this vulnerability.
| Multiple Vendors Perl File::Path::rmtree() Permission | Medium | Ubuntu Security Notice, USN-44-1, December 21, 2004 Debian Security Advisory, DSA 620-1, December 30, 2004 OpenPKG Security Advisory, OpenPKG-SA-2005.001, January 11, 2005 Gentoo Linux Security Advisory, GLSA 200501-38, January 26, 2005 MandrakeSoft Security Advisory, MDKSA-2005:031, February 8, 2005 SUSE Security Summary Report, SUSE-SR:2005:004, February 11, 2005 Gentoo Linux Security Advisory [UPDATE], GLSA 200501-38:03, March 15, 2005 |
IPsec-Tools IPsec-Tools 0.5; KAME Racoon prior to 20050307 | A remote Denial of Service vulnerability has been reported when parsing ISAKMP headers. Upgrades available at: Fedora: Currently we are not aware of any exploits for this vulnerability. | KAME Racoon Malformed ISAKMP Packet Headers Remote Denial of Service | Low | Fedora Update Notifications, FEDORA-2005-216 & 217, March 14, 2005 |
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6-test1- -test11, 2.6, 2.6.1-2.6.11 ; RedHat Desktop 4.0, Enterprise Linux WS 4, ES 4, AS 4 | Multiple vulnerabilities exist: a vulnerability exists in the 'shmctl' function, which could let a malicious user obtain sensitive information; a Denial of Service vulnerability exists in 'nls_ascii.c' due to the use of incorrect table sizes; a race condition vulnerability exists in the 'setsid()' function; and a vulnerability exists in the OUTS instruction on the AMD64 and Intel EM64T architecture, which could let a malicious user obtain elevated privileges. RedHat: Ubuntu: FedoraLegacy: Conectiva: Ubuntu: Currently we are not aware of any exploits for these vulnerabilities. | Linux Kernel Multiple Vulnerabilities | Low/ (Low if a DoS) | Ubuntu Security Notice, USN-82-1, February 15, 2005 RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005 Fedora Legacy Update Advisory, FLSA:2336, February 24, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 Ubuntu Security Notice, USN-95-1 March 15, 2005 |
Linux kernel 2.6 .10, 2.6-2.6.11 | Multiple vulnerabilities exist: a vulnerability exists in the 'radeon' driver due to a race condition, which could let a malicious user obtain elevated privileges; a buffer overflow vulnerability exists in the 'i2c-viapro' driver, which could let a malicious user execute arbitrary code; a buffer overflow vulnerability exists in the 'locks_read_proc()' function, which could let a malicious user execute arbitrary code; a vulnerability exists in 'drivers/char/n_tty.c' due to a signedness error, which could let a malicious user obtain sensitive information; and potential errors exist in the 'atm_get_addr()' function and the 'reiserfs_copy_from_user_to_file_region()' function. Patches available at: SuSE: Conectiva: Ubuntu: Exploit scripts have been published. | Linux Kernel Multiple Local Buffer Overflows & Information Disclosure | Medium/ High (High if arbitrary code can be executed) | Secunia Advisory, SA14270, February 15, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 Ubuntu Security Notice, USN-95-1 March 15, 2005
|
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6 -test1-test11, 2.6, 2.6.1 rc1&rc2, 2.6.1-2.6.8 | A remote Denial of Service vulnerability has been reported in the Point-to-Point Protocol) PPP Driver. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel PPP Driver Remote Denial of Service | Low | Ubuntu Security Notice, USN-95-1 March 15, 2005 |
Linux kernel 2.6-2.6.11 | A vulnerability has been reported in 'SYS_EPoll_Wait' due to a failure to properly handle user-supplied size values, which could let a malicious user obtain elevated privileges. Ubuntu: A Proof of Concept exploit script has been published. | Linux Kernel SYS_EPoll_Wait Elevated Privileges | Medium | Security Focus, 12763, March 8, 2005 Ubuntu Security Notice, USN-95-1 March 15, 2005 |
Sophos Sweep for Linux 3.91; | A vulnerability has been reported when processing a ZIP archive that contains malicious files with specially crafted file names, which could potentially allow malformed ZIP archives to bypass detection.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Bypass | Medium | Security Focus, 12793, March 12, 2005 |
X.org X11R6 6.7.0, 6.8, 6.8.1; | An integer overflow vulnerability exists in 'scan.c' due to insufficient sanity checks on on the 'bitmap_unit' value, which could let a remote malicious user execute arbitrary code. Patch available at: Gentoo: Ubuntu: Gentoo: Currently we are not aware of any exploits for this vulnerability. | High | Security Focus, 12714, March 2, 2005 Gentoo Linux Security Advisory, GLSA 200503-08, March 4, 2005 Ubuntu Security Notice, USN-92-1 March 07, 2005 Gentoo Linux Security Advisory, GLSA 200503-15, March 12, 2005 | |
NewsScript | A vulnerability has been reported when a malicious user submits a specially crafted HTTP GET request, which could lead to unauthorized access.
No workaround or patch available at time of publishing. There is no exploit code required, however, a Proof of Concept exploit script has been published. | NewsScript Access Validation | Medium | Security Focus, 12761, March 8, 2005 |
OpenBSD 2.0-2.9, 3.0-3.6 | A remote Denial of Service vulnerability has been reported in the TCP timestamp processing functionality due to a failure to handle exceptional network data. Patches available at: An exploit script has been published. | OpenBSD TCP | Low | Security Tracker Alert, 1012861, January 12, 2005 Security Focus, 12250, March 10, 2005 |
OpenSLP 1.0.0-1.0.11, 1.1.5, 1.2 .0 | Multiple buffer overflow vulnerabilities have been reported when processing malformed SLP (Service Location Protocol) packets, which could let a remote malicious user execute arbitrary code.
Upgrades available at: SuSE: Currently we are not aware of any exploits for these vulnerabilities. | OpenSLP Multiple Buffer Overflows | High | SuSE Security Announcement, SUSE-SA:2005:015, March 14, 2005 |
paFileDB 3.1 | Multiple Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of user-supplied input before including in dynamically generated Web content, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required, however, a Proof of Concept exploit has been published. | PaFileDB Multiple Cross-Site Scripting | High | SecurityReason-2005-SRA#01, March 8, 2005 |
PaFileDB 3.1 | An input validation vulnerability has been reported due to insufficient validation of the 'start' parameter in the '/includes/viewall.php' and '/includes/category.php' scripts, which could let a remote malicious user execute arbitrary SQL commands, HTML and script code.
No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | PaFileDB 'viewall.php' and 'category.php' Input Validation | High | SecurityReason-2005-SRA#03, March 12, 2005 |
PaFileDB prior to 3.1 | A vulnerability has been reported in numerous scripts which could let a remote malicious user obtain the installation path.
No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | PaFileDB Installation Path Disclosure | Medium | SecurityReason-2005-SRA#02, March 12, 2005 |
Gaim 1.0-1.0.2, 1.1.1, 1.1.2 | Multiple remote Denial of Service vulnerabilities have been reported when a remote malicious ICQ or AIM user submits certain malformed SNAC packets; and a vulnerability exists when parsing malformed HTML data.
Upgrades available at: Fedora: Ubuntu: Gentoo: Mandrake: RedHat: Conectiva: There is no exploit code required. | Gaim Multiple Remote Denials of Service | Low | Gaim Advisory, February 17, 2005 Fedora Update Notifications, Ubuntu Security Notice, USN-85-1 February 25, 2005 Gentoo Linux Security Advisory, GLSA 200503-03, March 1, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:049, March 4, 2005 RedHat Security Advisory, RHSA-2005:215-11, March 10, 2005 Conectiva Linux Security Announcement, CLA-2005:933, March 14, 2005 |
Squid Web Proxy Cache 2.5 .STABLE5-STABLE8 | A remote Denial of Service vulnerability has been reported when performing a Fully Qualify Domain Name (FQDN) lookup and and unexpected response is received. Patches available at: Gentoo: Ubuntu: Fedora: SUSE: Debian: Mandrake: RedHat: TurboLinux: Currently we are not aware of any exploits for this vulnerability. | Squid Proxy FQDN Remote Denial of Service | Low | Secunia Advisory, Gentoo Linux Security Advisory GLSA, 200502-25, February 18, 2005 Ubuntu Security Notice, USN-84-1, February 21, 2005 Fedora Update Notifications, SUSE Security Announcement, SUSE-SA:2005:008, February 21, 2005 Debian Security Advisory, DSA 688-1, February 23, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:047, February 24, 2005 RedHat Security Advisory, RHSA-2005:173-09, March 3, 2005 Turbolinux Security Advisory, TLSA-2005-31, March 10, 2005 |
SquirrelMail 1.2.6 | A vulnerability exists in 'src/webmail.php' due to insufficient sanitization, which could let a remote malicious user execute arbitrary code. Debian: Debian: Currently we are not aware of any exploits for this vulnerability. | SquirrelMail Remote Code Execution | High | Debian Security Advisory, DSA 662-1, February 1, 2005 US-CERT Vulnerability Note VU#203214 Debian Security Advisory, DSA 662-2, March 14, 2005 |
S/MIME Plugin 0.4, 0.5 | A vulnerability exists in the S/MIME plug-in due to insufficient sanitization of the 'exec()' function, which could let a remote malicious user execute arbitrary code.
Upgrades available at: SUSE: There is no exploit code required. | SquirrelMail S/MIME Plug-in Remote Command Execution | High | iDEFENSE Security Advisory, February 7, 2005 US-CERT Vulnerability Note VU#502328 SUSE Security Announcement, SUSE-SA:2005:015, March 14, 2005 |
PaX linux 2.6.5, 2.4.20-2.4.28, 2.2.x | A vulnerability exists due to an undisclosed error, which could let a malicious user obtain elevated privileges and execute arbitrary code.
Patches available at: An exploit script has been published. | PaX Undisclosed Arbitrary Code Execution | High | Security Focus, 12729, March 4, 2005 Security Focus, 12729, March 13, 2005 |
Windows API Emulator 20050310, 20050305, 20050211 | A vulnerability has been reported due to the insecure creation of temporary files, which could let a malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required. | Wine Insecure File Creation | Medium | Security Focus, 12791, March 12, 2005 |
id=multiple name=multiple>Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
All Enthusiast PhotoPost PHP Pro version 5.0 RC3 up to but not including 5.0.1 | Multiple vulnerabilities have been reported that could let remote malicious users conduct script insertion and SQL injection attacks, bypass certain security restrictions, and manipulate potentially sensitive information. These vulnerabilities are due to improper input validation in the "uid" parameter, "editbio" biography field and errors in the"adm-photo.php" script. The contents of uploaded images is also not properly verified. Upgrade to version 5.0.1. A Proof of Concept exploit has been published. | All Enthusiast PhotoPost PHP Pro Multiple Vulnerabilities | High | Security Focus, 12779, March 10, 2005 |
i-Class | An access control vulnerability has been reported that could let a remote malicious user view sensitive information. A remote user can view a 7-digit ID value in the source code of their admission application and use that ID value to view unauthorized information. A fix is available at: A Proof of Concept exploit has been published. | ApplyYourself | Medium | Security Tracker Alert ID: 1013400, March 9, 2005 |
HolaCMS 1.4.9 | An input validation vulnerability was reported in the Vote Module that could let a remote malicious user modify files on the target system. The 'vote_filename' parameter is not properly validated. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Bernd Ritter HolaCMS Lets Remote Users Modify Files | High | Security Focus, 12799, March 14, 2005 |
SimpGB 1.x | A vulnerability has been reported that could let remote malicious users conduct SQL injection attacks. This is due to input validation errors in the "quote" parameter in "guestbook.php" Update to version 1.35.2: Currently we are not aware of any exploits for this vulnerability. | Bösch SimpGB "quote" SQL Injection Vulnerability | High | Security Focus, 12801, March 14, 2005 |
ACNS Software Version 4.2 and prior | Multiple vulnerabilities exist that could let remote users cause a Denial of Service. These are due to errors within the processing of TCP connections, IP packets, and network packets. he vulnerabilities affect devices configured as a transparent, forward, or reverse proxy server. A default password may also be available in the administrative account. Updates available:
href="http://www.cisco.com/warp/public/707/cisco-sa-20050224-acnsdos.shtml"> Currently we are not aware of any exploits for these vulnerabilities. | Cisco ACNS Denial of Service Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0601">CAN-2005-0601 | Low | Cisco Security Advisory: 64069 |
License 1.53 - 1.61.8 | Multiple buffer overflow vulnerabilities exist that could let a remote malicious user execute arbitrary code with root level privileges. A remote user can also create files in arbitrary locations on the target system. This is because of input validation errors PUTOLF requests, GETCONFIG, and GCR requests. A fixed version (1.61.9) is available at: Another exploit script has been published. | Computer Associates License
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0581">CAN-2005-0581 | High | iDEFENSE, 03.02.05 Security Focus, 12705, March 10, 2005 |
Ethereal 0.10-0.10.8 | A buffer overflow vulnerability exists due to a failure to copy network derived data securely into sensitive process buffers, which could let a remote malicious user execute arbitrary code. Upgrades available at: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-16.xml"> Exploit scripts have been published. | Ethereal Buffer Overflow href=" http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0699">CAN-2005-0699 | High | Security Focus, 12759, March 8, 2005 Security Focus, 12759, March 14, 2005 Gentoo Linux Security Advisory, GLSA 200503-16, March 12, 2005 |
Ethereal 0.9-0.9.16, 0.10-0.10.9 | Multiple vulnerabilities have been reported: a buffer overflow vulnerability has been reported in the Etheric dissector, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; a remote Denial of Service vulnerability has been reported in the GPRS-LLC dissector if the 'ignore cipher bit' option is enabled; a buffer overflow vulnerability has been reported in the 3GPP2 A11 dissector, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; and remote Denial of Service vulnerabilities have been reported in the JXTA and sFLow dissectors. Upgrades available at: Gentoo: A Denial of Service Proof of Concept exploit script has been published. | Ethereal Etheric/GPRS-LLC/IAPP/JXTA/s | Low/ (High if arbitrary code can be executed) | Ethereal Advisory, enpa-sa-00018, March 12, 2005 Gentoo Linux Security Advisory, GLSA 200503-16, March 12, 2005 |
Gaim prior to 1.1.4 | A vulnerability exists in the processing of HTML that could let a remote malicious user crash the Gaim client. This is due to a NULL pointer dereference. Update to version 1.1.4: Ubuntu: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-03.xml"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-215.html"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> Currently we are not aware of any exploits for this vulnerability. | GNU Gaim href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0208">CAN-2005-0208 | Low | Sourceforge.net Gaim Vulnerability Note, February 24, 2005 Gentoo, GLSA 200503-03, March 1, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:049, March 4, 2005 RedHat Security Advisory, RHSA-2005:215-11, March 10, 2005 Conectiva Linux Security Announcement, CLA-2005:933, March 14, 2005 |
WF-Sections 1.07 | A vulnerability has been reported that could let a remote malicious user inject SQL commands. This is due to input validation errors in the 'class/wfsfiles.php' script in the 'articleid' parameter. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | GNU WF-Sections Input Validation Vulnerability | High | Security Tracker Alert ID: 1013412, March 11, 2005 |
Xoops 2.0.9.2 | A vulnerability has been reported that could let a remote malicious user execute malicious scripts. This is due to an input validation error in the uploading of custom avatars in "uploader.php". Turn off support for custom avatar uploads in: Patches available: http://www.xoops.org/modules/news/ Currently we are not aware of any exploits for this vulnerability. | GNU Xoops | High | Xoops Security Bulletin, March 8, 2005 |
YaBB2 RC1 | An input validation vulnerability has been reported in 'usersrecentposts' that could let a remote malicious user conduct Cross-Site Scripting attacks. This is due to input validation errors in the 'usersrecentposts' action. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | GNU YaBB | High | Security Focus, Bugtraq ID 12756, March 15, 2005 |
VoteBox 2.0 | An include file vulnerability has been reported that could let a remote malicious user execute arbitrary commands on the target system. The 'votebox.php' script includes the 'votescontroller.php' script relative to the 'VoteBoxPath' variable and does not properly validate the user-supplied variable.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Hensel Hartmann VoteBox Arbitrary Code Execution Vulnerability | High | Systemsecure.org, Ref: SS#27022005, March 14, 2005 |
Cosminexus Server Component Container and Cosminexus Server Component Container for Java | A vulnerability has been reported that could let a remote malicious user cause a Denial of Service. Vendor solutions available: Currently we are not aware of any exploits for this vulnerability. | Hitachi Cosminexus Server Component Container Tomcat Denial of Service | Low | Hitachi Advisory HS05-006, March 14, 2005 |
WebSphere Commerce 5.5, 5.6, and 5.6.0.1 | A security issue has been reported that could disclose sensitive information. This is because the cache entry for a product or category display page can become linked to a prepopulated form, which may disclose private information. Apply fix pack 5.6.0.2 or later: Contact IBM product support to obtain APAR IY60949 for systems Currently we are not aware of any exploits for this vulnerability. | IBM WebSphere Commerce Private Information Disclosure | Medium | IBM Security Advisory Reference #: 1199839, March 4, 2005 |
UBB.threads 6.x | A vulnerability has been reported that could let remote malicious users conduct SQL injection attacks. This is due to an input validation error in the "Number" parameter in "editpost.php" Update to version 6.5.1.1. Currently we are not aware of any exploits for this vulnerability. | Infopop | High | Secunia SA14578, March 14, 2005 |
phpWebLog 0.5.3 | An include file vulnerability has been reported that could let a remote malicious user execute arbitrary commands on the target system. This is because of input validation errors in the 'include/init.inc.php' script in the 'G_PATH' parameter. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Jason Hines phpWebLog | High | Security Tracker Alert ID: 1013397 Date: Mar 8 2005 |
Thunderbird 1.0 | A spoofing vulnerability has been reported that could let a remote malicious user create HTML that could spoof the status bar. This is caused due to an error embedding a table within an A HREF tag. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Mozilla Thunderbird Status Bar Spoofing Vulnerability | Low | Secunia SA14567, March 14, 2005 |
Firefox 1.0.1 | A spoofing vulnerability has been reported that could let a remote malicious user create HTML that could spoof the status bar. This is caused due to an error embedding a table within an A HREF tag. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Mozilla Firefox Status Bar Spoofing Vulnerability | Low | Security Tracker Alert ID: 1013423, March 14, 2005 |
Mozilla 1.7.5 | A spoofing vulnerability has been reported that could let a remote malicious user create HTML that could spoof the status bar. This is caused due to an error embedding a table within an A HREF tag. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Mozilla Status Bar Spoofing Vulnerability | Low | Secunia SA14568, March 14, 2005 |
MySQL 4.0.23, and 4.1.10 | A vulnerability has been reported that could let local malicious users gain escalated privileges. This is because the "CREATE TEMPORARY TABLE" command can create insecure temporary files. The vulnerabilities have been fixed in version 4.0.24 (when available): A Proof of Concept exploit has been published. | MySQL Escalated Privilege Vulnerabilities
| Medium | Secunia SA14547, March 11, 2005 |
MySQL 4.0.23, and 4.1.10 | A vulnerability was reported in the CREATE FUNCTION command that could let an authenticated user gain mysql user privileges on the target system and permit the user to execute arbitrary code. A fixed version (4.0.24 and 4.1.10a) is available at: A Proof of Concept exploit has been published. | MySQL CREATE FUNCTION Remote Code Execution Vulnerability | High | Security Tracker Alert ID: 1013415, March 11, 2005 |
MySQL 4.0.23, and 4.1.10 | An input validation vulnerability was reported in udf_init() that could let an authenticated user with certain privileges execute arbitrary library functions on the target system. The udf_init() function in 'sql_udf.cc' does not properly validate directory names. A fixed version (4.0.24 and 4.1.10a) is available at: A Proof of Concept exploit has been published. | MySQL udf_init() | High | Security Tracker Alert ID: 1013414, March 11, 2005 |
MaxDB Web Agent prior to 7.5.00.24 | Several vulnerabilities have been reported that could let a remote user conduct Denial of Service attacks. This is due to input validation errors in multiple functions. A fixed version (7.5.00.24) is available at: http://dev.mysql.com/ No workaround or patch available at time of publishing.
| MaxDB | High | iDEFENSE Security Advisory 03.14.05 |
PHP-Fusion 5.x | A vulnerability has been reported that could let remote malicious users conduct script insertion attacks. This is due to input validation errors in HTML encoded input (e.g. &#[ASCII]) passed in BBcode. Updates available in the CVS repository. An exploit script has been published. | Nick Jones | High | Secunia SA14492, March 8, 2005 |
Novell iChain 2.x | A vulnerability has been reported that could let a remote malicious user gain knowledge of certain system information. This is due to an error in the FTP server that allows "PWD" commands to be executed prior to user authentication. Restrict access to the iChain server. Currently we are not aware of any exploits for this vulnerability. | Novell iChain | Medium | Novell, Technical Information Document ID: 10096886, March 8, 2005 |
Novell iChain 2.x | A vulnerability has been reported that could let a remote malicious user bypass the user authentication. This is because of an error in the web GUI that permits the user to hijack an administrator's session. Restrict access to the iChain server via the web GUI (port 51100/tcp). Currently we are not aware of any exploits for this vulnerability. | Novell iChain Administrator | Medium | Novell, Technical Information Document ID: 10096885, March 8, 2005 |
Participate Enterprise | Multiple vulnerabilities have been reported that could let a remote malicious user view directories and rename or delete directory objects. The vendor has issued a fix. A Proof of Concept exploit has been published. | OutStart | Medium | Outstart Security Notification, March 8, 2005 |
Phorum 5.0.14 | Several input validation vulnerabilities were reported in Phorum in 'file.php,' 'follow.php,' and the user's control panel that could let a remote malicious user conduct Cross-Site Scripting attacks. Update to version 5.0.15: Currently we are not aware of any exploits for these vulnerabilities. | Phorum Input Validation Vulnerabilities | High | Secunia SA14554, March 11, 2005 Security Tracker Alert ID: 1013422, March 14 2005 |
phpAdsNew 2.0.4 -pr1 | A Cross-Site Scripting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPAdsNew AdFrame.PHP Cross-Site Scripting | High | Security Focus, 12803, March 14, 2005 |
phpAdsNew 2.x and phpPgAds 2.x | A vulnerability has been reported that could let remote malicious users conduct Cross-Site Scripting attacks or view sensitive information. This is because of input validation errors in the "refresh" parameter in "adframe.php". Update to phpPgAds 2.0.4-pr2: Update to phpAdsNew 2.0.4-pr2: Currently we are not aware of any exploits for this vulnerability. | phpPgAds / phpAdsNew "refresh" Cross-Site Scripting Vulnerability | High | Secunia SA14592, March 15, 2005 |
paBox 2.0 | A vulnerability has been reported in 'pabox.php' due to insufficient sanitization of the 'posticon' parameter, which could let a remote malicious user execute arbitrary HTML and script code.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PABox 'Posticon' Arbitrary HTML Execution | High | Secunia Advisory, SA14590, March 15, 2005 |
phpBB 2.0.13 and prior | A vulnerability exists in 'oracle.php' that could let a remote user determine the installation path. A remote user can access 'phpBB/db/oracle.php'. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | phpBB Group
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0659">CAN-2005-0659 | Low | [N]eo [S]ecurity [T]eam [NST] - Advisory #09 - 03/03/05 |
mcNews 1.3 | An include file vulnerability has been reported that could let a remote malicious user execute arbitrary commands on the target system. This is because of input validation errors in the 'mcNews/admin/header.php' script. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | phpforums.net | High | Security Tracker Alert ID: 1013396 Date: Mar 8 2005 |
BLOG:CMS 3.6.2 | A vulnerability exists that could let remote malicious users conduct SQL injection attacks. Update to version 3.6.2 or later: http://blogcms.com/?item=download Currently we are not aware of any exploits for this vulnerability. | Radek Hulan BLOG:CMS | High | Secunia SA14538, March 9, 2005 |
RealPlayer prior to 6.0.12.1059 | A vulnerability in the processing of SMIL files could let a remote malicious user execute arbitrary code. A special Synchronized Multimedia Integration Language (smil) file could trigger to trigger a buffer overflow in the player's SMIL parser. The vulnerability is in 'datatype/smil/renderer/smil1/smlparse.cpp' when processing the screen size attribute. Updates available at: Proof of Concept exploit script has been published. | RealNetworks RealPlayer href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0455">CAN-2005-0455 | High | iDEFENSE Security Advisory 03.01.05 SUSE-SA:2005:014, March 9, 2005 |
RealPlayer prior to 6.0.12.1059 | A vulnerability in the processing of WAV files could let a remote malicious user execute arbitrary code. A special WAV file could trigger a buffer overflow and execute arbitrary code. Updates available at: Currently we are not aware of any exploits for this vulnerability. | RealNetworks RealPlayer href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0611">CAN-2005-0611 | High | RealPlayer Release Notes March 1, 2005 SUSE-SA:2005:014, March 9, 2005 |
The Includer | A vulnerability exists that could let a remote malicious user execute arbitrary commands on the target system. This is due to input validation errors in the 'includer.cgi' script. No workaround or patch available at time of publishing. An exploit script has been published. | Smarter Scripts href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0689">CAN-2005-0689 | High | Security Focus, Bugtraq ID 12738, March 7, 2005 Security Focus, Bugtraq ID 12, 2005 |
SocialMPN 1.2.1-1.2.5 | A vulnerability has been reported in the article mode for 'modules.php' due to insufficient validation of user-supplied input, which could let a remote malicious user execute arbitrary code. Upgrades available at: An exploit script has been published. | SocialMPN 'modules.php' | High | Security Focus, 12774, March 10, 2005 |
Spinworks Application Server 3.0 | A remote Denial of Service vulnerability has been reported due to a failure to properly handle malformed requests. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Spinworks | Low | Secunia Advisory, SA14579, March 14, 2005 |
SquirrelMail 1.x | A Cross-Site Scripting vulnerability exists in the 'decodeHeader()' function in 'mime.php' when processing encoded text in headers due to insufficient input validation, which could let a remote malicious user execute arbitrary HTML and script code. Patch available at: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200411-25.xml"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/9"> Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> Apple:
href="http://www.apple.com/support/downloads/"> SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Debian:
href="http://www.debian.org/security/2005/dsa-662"> Red Hat:
href="http://rhn.redhat.com/errata/RHSA-2005-135.html"> Debian:
href="http://security.debian.org/pool/updates/main/s/squirrelmail/"> An exploit script is not required. | SquirrelMail
href="http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2004-1036">CAN-2004-1036 | High | Secunia Advisory, Gentoo Linux Security Advisory, GLSA 200411-25, November 17, 2004 Fedora Update Notifications, Conectiva Linux Security Announcement, CLA-2004:905, December 2, 2004 Apple Security Update, APPLE-SA-2005-01-25, January 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 Debian DSA-662-1, February 1, 2005 Red Hat RHSA-2005:135-04, February 10, 2005 Debian Security Advisory, DSA 662-2, March 14, 2005 |
Sun Java System Application Server 7.0 UR5 Standard Edition, Platform Edition, 7.0 UR4, 7.0 2004Q2 R1Standard, 7.0 2004Q2 R1Enterprise, 7.0 Standard Edition, 7.0 Platform Edition, 7.0 2004Q2 | A Cross-Site Scripting vulnerability has been reported, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: There is no exploit code required. | Sun Java System Application Server Unspecified | High | Sun(sm) Alert Notification, 57742, March 1, 2005 |
iAN-02EX VoIP ATA | A security issue exists that could let a local malicious user bypass certain security restrictions. This is because the ATA (Analog Terminal Adaptor) can be reset by dialing "*#26845#". No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | UTStarcom | Medium | Secunia SA14544, March 9, 2005 |
Mailing list manager 1.3d | A vulnerability has been reported that could let a remote malicious user include arbitrary files from external and local resources. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | WEBInsta Mailing | High | Secunia |
Document Centre 535/545/555 (27.18.017 or prior), 460/470/480/490 (19.01.037 - 19.05.521 and 19.5.902 - 19.5.912), 420/426/432/440 (with ESS 2.1.2 - 3.21), 425/432/440 (with ESS 3.0.5.4 - 3.2.30), 430 (with ESS 3.3.23 - 3.3.30), 240/255/265 (18.01 - 18.6.81) | A vulnerability has been reported that can let local malicious users bypass certain security restrictions. This is due to an unspecified error in the web server on the ESS/ Network Controller Update: Currently we are not aware of any exploits for this vulnerability. | Xerox Document Centre Web Server Unauthorized Access Vulnerability | Medium | XEROX SECURITY BULLETIN XRX05-003, March 7, 2005 |
Document Centre 535/545/555 (27.18.017 or prior). 460/470/480/490 (versions 19.01.037 - 19.05.521 and 19.5.902 - 19.5.912), 420/426/432/440 (with ESS 2.1.2 - 2.3.21), 425/432/440 (with ESS 3.0.5.4 - 3.2.30), 430 (with ESS 3.3.24 - 3.3.30) | A vulnerability has been reported that could let malicious users cause a Denial of Service. This is due to an unspecified memory corruption error in the MicroServer Web Server when processing URLs. Update: Currently we are not aware of any exploits for this vulnerability. | Xerox MicroServer Web Server URL Handling Denial of Service | Low | XEROX SECURITY BULLETIN XRX05-004, March 7, 2005 |
[back to top] size=-2>
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script | Script name | Workaround or Patch Available | Script Description |
March 15, 2005 | 3com_3cdaemon_ftp_overflow.pm | No | Script that exploits the 3Com 3CDaemon Multiple Remote Vulnerabilities. |
March 15, 2005 | covertsession-0.4.c | N/A | A command line tool that allows you to create a TCP session that IDS sensors cannot parse correctly. |
March 15, 2005 | exp2.php.txt | Yes | Proof of Concept exploit for the MySQL CREATE FUNCTION Remote Code Execution Vulnerability. |
March 15, 2005 | exp3.pl.txt | Yes | Proof of Concept exploit for the libc MYSQL User Privilege vulnerability. |
March 15, 2005 | freeciv.pl | No | Perl script that exploits the Freeciv Remote Denial of Service vulnerability. |
March 15, 2005 | goodTechTelnetBufferOverflowPoC.c | No | Proof of Concept exploit for the GoodTech Systems Telnet Server for Windows NT/2000/XP/2003 Remote Buffer Overflow vulnerability. |
March 15, 2005 | kernel26lowmem.txt | No | Sample exploitation for the Linux Kernel SYS_EPoll_Wait Elevated Privilege vulnerability. |
March 15, 2005 | ms04038.c | Yes | Exploit for Internet Explorer (mshtml.dll) that makes use of a buffer overflow when parsing Cascading Style Sheets (CSS) files. |
March 15, 2005 | plsql_portscanner-0.1.tar.gz | N/A | A TCP CONNECT port scanner in P/L SQL code. |
March 15, 2005 | real-seh.cpp | Yes | Proof of Concept exploit for the RealNetworks RealPlayer SMIL Error Permits Remote Code Execution vulnerability. |
March 15, 2005 | silePNEWSxpl_v2.0b4.c | Yes | Exploit for the paNews version 2.0b4 SQL injection vulnerability. |
March 14, 2005 | ethereal-0.10.10.tar.gz | N/A | A GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. |
March 14, 2005 | ethereal3GA11OverflowExploit.c ethereal-g3-a11.c eth0day.c | Yes | Exploits for the Ethereal Etheric/GPRS-LLC/IAPP/JXTA/sFlow Dissector Vulnerabilities. |
March 14, 2005 | IEDragAndDropExploit.zip | Yes | Exploit for the Microsoft Internet Explorer Vulnerabilities. |
March 13, 2005 | 101_SentLM.cpp | Yes | Exploit for the SafeNet Sentinel License Manager Remote Buffer Overflow vulnerability. |
March 13, 2005 | paxomatic.c | Yes | Exploit for the PaX Undisclosed Arbitrary Code Execution vulnerability. |
March 12, 2005 | aztec-sploit.c | No | Proof of Concept exploit for the Aztek Forum Unauthorized Access Vulnerability. |
March 12, 2005 | etherealIAPPOverflow-poc.cIAPPOverflow-poc.c | Yes | Denial of Service Proof of Concept exploit for the Ethereal Etheric/GPRS-LLC/IAPP/JXTA/sFlow Dissector Vulnerabilities. |
March 12, 2005 | includer.py | No | Exploit for the Smarter Scripts The Includer Remote Code Execution Vulnerability. |
March 12, 2005 | pftpdos1.pl | No | Perl script that exploits the PlatinumFTPServer Malformed User Name Connection Remote Denial of Service vulnerability. |
March 12, 2005 | phpBB2012session.txt | Yes | Exploit for the phpBB 2.0.12 session handling administrative compromise vulnerability. |
March 12, 2005 | phpFM.py.txt | No | Exploit for the Stadtaus.Com PHP Form Mail Script Remote File Include vulnerability. |
March 12, 2005 | phpfusionXSS.txt | Yes | Detailed exploitation for the Nick Jones PHP-Fusion Script Insertion Vulnerability. |
March 12, 2005 | windos.c | No | Exploit for the Windows Server 2003 and XP SP2 Remote Denial of Service vulnerability. |
March 11, 2005 | exp2.php exp3.pl | Yes | Exploits for the MySQL AB MySQL Multiple Remote Vulnerabilities. |
March 11, 2005 | happy-crc.zip | No | Proof of Concept exploit for the Multiple Vendor Antiviral Products Malformed ZIP Attachment Scan Evasion Vulnerability. |
March 10, 2005 | CALicenseBOExplClass101.cpp 101_cali.c | Yes | Exploit for the Computer Associates License Remote Code Execution Vulnerability. |
March 10, 2005 | r57obsd-dos.c obsdDoS.c | Yes | Exploits for the OpenBSD TCP Timestamp Remote Denial of Service vulnerability. |
March 9, 2005 | socialmpn_exploit.pl socialMPN.txt | Yes | Perl script that exploits the SocialMPN 'modules.php' Arbitrary Code Execution vulnerability. |
March 9, 2005 | xprallyfs.zip | No | Exploit for the Techland XPand Rally Remote Format String Vulnerability. |
March 8, 2005 | ie_css_bof.c | No | Exploit for the Microsoft Internet Explorer MSHTML.DLL CSS Handling Remote Buffer Overflow vulnerability. |
[back to
top]
name=trends>Trends
- According to a study from The Honeynet Project, botnets launched 226 distributed denial of service (DDoS) attacks on 99 different targets in a three-month period from November 2004 to January 2005. The report, Know your Enemy: Tracking Botnets, estimates a population of approximately one million infected hosts is under the control of computer crackers. For more information, see "Rise of the botnets" located at: http://www.theregister.co.uk/2005/03/15/honeypot_botnet_study/
- The Internet Storm Center (ISC) tracked a large-scale hack over the weekend that infected site-hosting servers, which in turn transformed all the hosted sites into distributors of malicious code.
For more information, see "Weekend Attack Infects Hosting Servers ' located at: http://www.securitypipeline.com/news/159402903 - Analytical findings published by iDefense, a Reston, Va.-based supplier of security intelligence to both corporations and government agencies, were made public for the first time. Using their private database of more than 100,000 malicious code attacks, iDefense tallied a record 27,260 attacks in 2004. Over 15,000 of those, or some 55 percent, were specifically designed to covertly steal information or take over computers for criminal purposes, including identify theft and fraud. Over 9,000 backdoors dropped by most mass-mailed worms were counted. For more information, see " Root of all evil is root of most attacks" located at: http://www.internetweek.com/showArticle.jhtml?articleID=159400994
- Security consultants have uncovered a device, BlueSniper, that can pick up transmissions on Bluetooth modules up to 1km away.The device consists of a directional 'yagi' antenna mounted on a foldable stock with a Bluetooth module and processor built into the magazine, although it can also be hooked up to a laptop. For more information, see "Hackers target Bluetooth devices 1km away" located at: http://www.vnunet.com/news/1161915
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trends |
face="Arial, Helvetica, sans-serif">Date |
1 | Netsky-P | Win32 Worm | Slight Increase | March 2004 |
2 | Bagle-BJ | Win32 Worm | Slight Decrease | January 2005 |
3 | Zafi-D | Win32 Worm | Stable | December 2004 |
4 | Netsky-Q | Win32 Worm | Stable | March 2004 |
5 | Zafi-B | Win32 Worm | Stable | June 2004 |
6 | Netsky-D | Win32 Worm | Stable | March 2004 |
7 | Netsky-Z | Win32 Worm | Stable | April 2004 |
8 | Netsky-B | Win32 Worm | Stable | February 2004 |
9 | Bagle-AU | Win32 Worm | Stable | October 2004 |
10 | Bagle.BB | Win32 Worm | Stable | September 2004 |
face="Arial, Helvetica, sans-serif"> face="Arial, Helvetica, sans-serif">Table Updated March 15, 2005
Viruses or Trojans Considered to be a High Level of Threat
- Bagle, Zafi and Netsky coders thought to be working together: The authors of the Bagle, Zafi and Netsky viruses have joined forces in an unholy alliance that aims to spread cyber-terror, security experts have claimed. The warning comes from virus analysts at Kaspersky Lab investigating the recent Bagle outbreak and suggest that the authors of Bagle, Zafi and Netsky are "working hand in hand with each other". For more information, see: http://www.vnunet.com/news/1161786
The following table provides, in alphabetical order, a list of new viruses, variations of previously encountered viruses, and Trojans that have been discovered during the period covered by this bulletin. This information has been compiled from the following anti-virus vendors: Sophos, Trend Micro, Symantec, McAfee, Network Associates, Central Command, F-Secure, Kaspersky Labs, MessageLabs, Panda Software, Computer Associates, and The WildList Organization International. Users should keep anti-virus software up to date and should contact their anti-virus vendors to obtain specific information on the Trojans and Trojan variants that anti-virus software detects.
NOTE: At times, viruses and Trojans may contain names or content that may be considered offensive.
Name |
face="Arial, Helvetica, sans-serif">Aliases |
face="Arial, Helvetica, sans-serif">Type |
Backdoor.Haiyangweng | Trojan | |
Backdoor.Ranky.T | Trojan | |
Backdoor.Solufina | Trojan | |
Backdoor.Staprew | Trojan | |
Backdoor.Zins.B | Trojan | |
BKDR_SDBOT.LG | Trojan | |
Openstream.T | Java/Openstream.T | Trojan |
PE_ZORI.A | Virus.Win32.Zori.a W32.Zori.A W32/Generic.Delphi | Win32 Worm |
PWSteal.Reanet.B | Trojan | |
Ruzes.A | Trj/Ruzes.A | Trojan |
Troj/Dowcen-Gen | Trojan | |
Trojan.Adwarehelper | Trojan | |
Trojan.Adwareloader | Trojan | |
Trojan.Flush.B | Trojan | |
Trojan.Kaemon | Trojan | |
Trojan.Lodmedud | Trojan | |
Trojan.StartPage.K | Trojan | |
Trojan.StartPage.L | Trojan | |
Trojan.StartPage.M | Trojan | |
Trojan.Tabela.B | Trojan | |
W32.Kelvir.E | Win32 Worm | |
W32.Kelvir.G | Win32 Worm | |
W32.Kelvir.H | Win32 Worm | |
W32.Mytob.E@mm | Win32 Worm | |
W32.Mytob.F@mm | Net-Worm.Win32.Mytob.d W32.Mytob.E@mm W32/Mytob.gen@MM Win32.Mytob.F Win32/Mytob.D@mm WORM_MYTOB.F | Win32 Worm |
W32.Mytob.G@mm | Net-Worm.Win32.Mytob.d | Win32 Worm |
W32.Selotima.A | Win32 Worm | |
W32.Serflog.C | Win32 Worm | |
W32.Toxbot | Win32 Worm | |
W32/Agobot-QT | Win32.Agobot.xs W32/Agobot.CVS | Win32 Worm |
W32/Agobot-QU | Backdoor.Win32.Agobot.gen | Win32 Worm |
W32/Agobot-QV | Backdoor.Win32.Agobot.gen W32/Gaobot.worm.gen.d | Win32 Worm |
W32/Agobot-QX | Win32 Worm | |
W32/Capside-C | WORM_CASPID.C Win32/Capside.C P2P-Worm.Win32.Capside.c | Win32 Worm |
W32/Domwis-H | BKDR_DOMWIS.C Backdoor.Win32.Wisdoor.av | Win32 Worm |
W32/Elitper-C | WORM_ELITPER.C | Win32 Worm |
W32/Esalone-A | Trojan.Win32.Delf.ir W32/Eightsalone.worm | Win32 Worm |
W32/Myfip.worm.q | W32.Myfip.T | Win32 Worm |
W32/Radbot-A | Win32 Worm | |
W32/Radebot.worm | Win32 Worm | |
W32/Rbot-XE | Win32 Worm | |
W32/Rbot-XI | W32/Sdbot.worm.gen.h WORM_RBOT.ASU | Win32 Worm |
W32/Rbot-XM | Backdoor.Win32.Rbot.gen | Win32 Worm |
W32/Rbot-XS | Backdoor.Win32.SdBot.lt | Win32 Worm |
W32/Sdbot.gen.r | Win32 Worm | |
W32/Sdbot.worm!48548 | Win32 Worm | |
W32/Sdbot-VW | W32/Sdbot.worm.gen Backdoor.Win32.SdBot.gen WORM_RBOT.AJS | Win32 Worm |
W32/Sumom-B | WORM_FATSO.B IM-Worm.Win32.Sumom.a | Win32 Worm |
Win32.Agobot.AQW | Win32 Worm | |
Win32.Bropia.T | Win32 Worm | |
Win32.Mytob.B | Win32 Worm | |
Win32.Mytob.C | Win32 Worm | |
Win32.Mytob.D | Win32 Worm | |
Win32.Podilk.A | Win32 Worm | |
WORM_CHOD.A | Backdoor.Win32.VB.aam Tobecho.A W32.Chod@mm W32/NoChod@MM W32/Tobecho.A.worm Win32.Nochod.A Worm:Win32/Chod.A | Win32 Worm |
WORM_CODBOT.L | MS03-026_Exploit!Trojan W32.Toxbot Worm:Win32/Codbot.L | Trojan |
WORM_ELITPER.C | Win32 Worm | |
WORM_ELITPER.D | W32.Elitper.D@mm W32/Elitper-D W32/Generic.m Win32.Elitper.B | Win32 Worm |
WORM_FORBOT.AB | Backdoor:Win32/Wootbot.AG W32/Forbot-ET W32/Sdbot.worm Win32.ForBot.MY | Win32 Worm |
WORM_KELVIR.D | W32/Bropia-G W32/Kelvir.worm Win32.Bropia.T | Win32 Worm |
WORM_KELVIR.E | W32/Kelvir.worm | Win32 Worm |
WORM_KELVIR.F | W32.Kelvir.F W32/Bropia-K W32/Bropia.worm Win32.Bropia.S | Win32 Worm |
WORM_MYDOOM.BF | W32/Mydoom W32/MyDoom-J Win32.Mydoom.BH | Win32 Worm |
WORM_MYFIP.M | W32/Myfip.worm | Win32 Worm |
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.