Summary of Security Items from March 16 through March 22, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, so the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to items appearing in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
ACS Blog 0.8 - 1.1b | An input validation vulnerability has been reported that could let a remote malicious user conduct Cross-Site Scripting attacks. This is due to input validation errors in the 'search.asp' script in the 'search' parameter.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | asppress ACS Blog Cross-Site Scripting Vulnerability | High | Security Tracker Alert, 1013470, March 18, 2005 |
Citrix MetaFrame Conferencing Manager 3.0 | A vulnerability has been reported that could let a remote malicious user obtain keyboard and mouse control of a conference. Hotfix MCM300W012 available: http://support.citrix.com/kb/ Currently we are not aware of any exploits for this vulnerability. | Citrix MetaFrame Conferencing Manager Access Control Vulnerability | Low | Citrix Document ID CTX105574, February 24, 2005 |
Ocean FTP Server 1.0 | A vulnerability has been reported due to a connection handling error which could let remote users cause a Denial of Service. Update to version 1.01: A Proof of Concept exploit script has been published. | Code Ocean Ocean FTP Server Multiple Connections Denial of Service | Low | Secunia SA14662, March 22, 2005 |
4X4 Off-road Adventure III; | A vulnerability has been reported that could let a remote malicious user cause the game service to crash or to stop accepting packets. A remote user can send an empty UDP packet or a special join packet to cause these errors.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | FUN labs Games Denial of Service Vulnerability | Low | Security Tracker Alert, 1013492, March 21, 2005 |
FileZilla Server prior to 0.9.6 | Multiple vulnerabilities have been reported that could let a remote malicious user cause a Denial of Service. This is due to an error when attempting to access a file containing a reserved MS-DOS device name and an error in the transfer logic when using zlib compression. Update to version 0.9.6: There is no exploit code required. | GNU FileZilla Server Denial of Service Vulnerabilities | Low | Security Focus, 12865, March 22, 2005 |
MailEnable Standard 1.8 | A vulnerability has been reported that could let remote malicious users cause a Denial of Service or execute arbitrary code. This is due to a format string error when handling command arguments in the SMTP communication. No workaround or patch available at time of publishing. An exploit script has been published. | MailEnable Standard SMTP Format String Vulnerability | High | Secunia SA14627, March 18, 2005 |
Cain Abel 2.65 | Multiple vulnerabilities have been reported, one of which, could let a remote malicious user execute arbitrary code. This is due to boundary errors which could lead to buffer overflows in IKE-PSK sniffer filter and the HTTP sniffer filter.
A fixed version (2.66) is available at: http://www.oxid.it/cain.html Currently we are not aware of any exploits for these vulnerabilities. | Massimiliano Montoro Cain Abel Buffer Overflow Causes Remote Code Execution | High | Secunia SA14630, March 18, 2005 |
Office InfoPath 2003 SP1 | A vulnerability has been reported that could let a remote malicious user obtain system information and authentication data from form template files. This is because private information may be included in the form template file when the administrator creates a form and adds a connection to the database table or to a web service. While there is no solution at this time, the vendor has issued a Knowledge Base article to describe security and privacy considerations for creating forms: Currently we are not aware of any exploits for this vulnerability. | Microsoft Office InfoPath 2003 Information Disclosure Vulnerability | Medium | Microsoft Knowledge Base 867443, February 22, 2005 |
Windows XP Home SP1 Windows XP Media Center Edition SP1 Windows XP Professional SP1 Windows XP Tablet PC Edition SP1 | A vulnerability has been reported that could permit a local malicious user to cause a Denial of Service. This is caused when a raw IP over IP socket is created and data is transferred over the newly created socket. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Microsoft Windows Local Denial Of Service Vulnerability | Low | Security Focus, 12870, March 22, 2005 |
ASP.NET 1.x | A vulnerability exists which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to a canonicalization error within the .NET authentication schema. Apply ASP.NET ValidatePath module:
href="http://www.microsoft.com/downloads/details.aspx?FamilyId=DA77B852-DFA0-4631-AAF9-8BCC6C743026">http://www.microsoft.com/downloads/ Patches available at: V1.1: Bulletin updated to include Knowledge Base V1.2: Bulletin "Caveats" section has been updated to document known issues that customers may experience when installing the available security updates. A Proof of Concept exploit has been published. | Microsoft ASP.NET Canonicalization CVE Name: | Medium | Microsoft, October 7, 2004 Microsoft Security Bulletin, MS05-004, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A Microsoft Security Bulletin, MS05-004 V1.1, February 15, 2005 Microsoft Security Bulletin, MS05-004 V1.2, March 16, 2005 |
Microsoft Windows 2000 Advanced Server Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Professional Microsoft Windows 2000 Server | A vulnerability has been reported that could let remote malicious users cause a Denial of Service. This is due to an error when processing EMF (Microsoft Enhanced Metafile) files in the No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Microsoft Windows EMF File Denial of Service Vulnerability | Low | Secunia SA14631, March 18, 2005 |
Windows NT Server 4.0 SP6a, Windows NT Server 4.0 Terminal Server Windows 2000 Server SP3 & SP4, Windows 2003, Windows 2003 for Itanium-based Systems Windows Advanced Server SP4
| A buffer overflow vulnerability exists in the License Logging service due to a boundary error, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code. Patches available at: V1.1: Bulletin updated to reflect a revised “Security Update Information” section for Windows Server 2003 Windows 2000 Advanced Server vulnerable if Service Pack 4 not installed separately. Currently we are not aware of any exploits for this vulnerability. | Microsoft Windows License Logging Service Buffer Overflow | Low/High (High if arbitrary code can be executed) | Microsoft Security Bulletin, MS05-010, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A US-CERT Cyber Security Alert SA05-039A Microsoft Security Bulletin, MS05-010 V1.1, February 23, 2005 Immunity, Inc. Advisory, March 16, 2005 |
NotifyLink Enterprise Server | Multiple vulnerabilities have been reported that could let a remote malicious user obtain sensitive information, bypass certain security restrictions, and conduct SQL injection attacks. These vulnerabilities are caused because administrative users can view other users' private credentials or disable functions for users via the web interface but functions are still accessible via the URL. Also, certain input is not properly validated before being used in an SQL query and AES keys can be obtained by submitting a special POST request. Update to version 3.0 or later and configure NotifyLink to use "Manual Key Generation". There is no exploit code required. | Notify Technology NotifyLink Enterprise Server Multiple Vulnerabilities | High | Secunia SA14617, March 18, 2005 |
OllyDbg 1.10 and prior | A vulnerability has been reported in OllyDbg that could let a remote malicious user cause a Denial of Service. This is due to a flaw when loading a special DLL filename as a process. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Oleh Yuschuk OllyDbg Error in Loading Causes Denial of Service Vulnerability | Low | Security Focus,12850, March 19, 2005 |
iPool 1.6.81 and prior | A vulnerability has been reported that could let a local malicious user obtain passwords. This is because the software stores user passwords in clear text in the 'Program Files\ThePoolClub\iPool\MyDetails.txt' file. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | ThePoolClub iPool Information Disclosure Vulnerability | Medium | Security Tracker Alert, 1013458 Date: March 16 2005 |
iSnooker 1.6.81 and prior | A vulnerability has been reported that could let a local malicious user obtain passwords. This is because the software stores user passwords in clear text in the 'Program Files\TheSnookerClub\iSnooker\ MyDetails.txt' file. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | ThePoolClub iSnooker Information Disclosure Vulnerability | Medium | Security Tracker Alert, 1013459, March 16, 2005 |
My Firewall Plus 5.0 (build 1117) | A vulnerability has been reported that could let local malicious users change the content of arbitrary files. This is because the Log Viewer's export functionality saves log files without first dropping its privileges. Update to version 5.0 (build 1119) or apply patch: http://www.webroot.com/ Currently we are not aware of any exploits for this vulnerability. | Webroot Software My Firewall Plus Arbitrary File Corruption Vulnerability | Medium | Secunia SA13577, March 18, 2005 |
Servers Alive 4.1, 5.0 | A vulnerability has been reported in the Help function that could let a local malicious user can gain system privileges and execute arbitrary files. This is because a local user can open a help file in Notepad with system privileges. The user can then open 'cmd.exe.' No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Woodstone Servers Alive Help Function Escalated Privilege Vulnerability | High | Security Focus, 12822, March 16, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Apache 2.0.35-2.0.52 | A vulnerability exists when the 'SSLCipherSuite' directive is used in a directory or location context to require a restricted set of cipher suites, which could let a remote malicious user bypass security policies and obtain sensitive information. OpenPKG:
href="ftp://ftp.openpkg.org/release/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-21.xml"> Slackware:
href="ftp://ftp.slackware.com/pub/slackware/"> Conectiva: Mandrake: Fedora: RedHat: SuSE: In the process of releasing packages. RedHat: Avaya: VMware: HP: There is no exploit code required. | Medium | OpenPKG Security Advisory, OpenPKG-SA-2004.044, October 15, 2004 Gentoo Linux Security Advisory, GLSA 200410-21, October 22, 2004 Slackware Security Advisory, SSA:2004-299-01, October 26, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:122, November 2, 2004 Conectiva Linux Security Announcement, CLA-2004:885, November 4, 2004 Fedora Update Notification, RedHat Security Advisory, RHSA-2004:562-11, November 12, 2004 SUSE Security Summary Report, SUSE-SR:2004:001, November 24, 2004 RedHat Security Advisory, RHSA-2004:600-12, December 13, 2004 Avaya Security Advisory, ASA-2005-010, January 14, 2005 WMware Advisory, January 14, 2005 HP Security Advisory, HPSBUX01123 , March 22, 2005 | |
Mac OS X 10.3-10.3.8, Mac OS X Server 10.3-10.3.8 | Multiple vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported due to a memory access error on the AFP server; a vulnerability has been reported in the permission settings in the directories used by the installer's receipt cache and system-level ColorSync profiles because they are configured with world-writable permissions, which could let a malicious user obtain elevated privileges; a vulnerability has been reported in the Bluetooth Setup Assistant application which could let a remote malicious user bypass security restrictions; a vulnerability has been reported due to insufficient validation of file permissions when accessing Drop Boxes, which could let a remote malicious user obtain sensitive information; and a buffer overflow vulnerability has been reported when handling 'CF_CHARSET_PATH' environment variables in the Core Foundation library, which could let a malicious user execute arbitrary code. Updates available at: An exploit script has been published. | Apple Mac OS X Multiple Vulnerabilities CAN-2005-0340 | Low/ Medium/ High (Low if a DoS; Medium if sensitive information can be obtained; and High if arbitrary code can be executed) | Apple Security Update, APPLE-SA-2005-03-21, March 21, 2005 |
Cyrus IMAP Server 2.2.9 and prior versions | A vulnerability exists in the mysasl_canon_user() function that could allow a remote user to execute arbitrary code on the target system. An off-by-one error exists in the mysasl_canon_user() function that may result in an unterminated user name string. A remote user may be able to trigger the buffer overflow to execute arbitrary code on the target system with the privileges of the target IMAP process. The vendor has issued a fixed version (2.2.10), available at: ftp://ftp.andrew.cmu.edu/pub/ Apple: Currently we are not aware of any exploits for this vulnerability. | Carnegie Mellon Cyrus IMAP Server Off-by-one Overflow | High | SecurityTracker Alert ID: 1012474, December 10, 2004 Apple Security Update, APPLE-SA-2005-03-21, March 21, 2005 |
Cyrus IMAP Server 2.x
| Multiple vulnerabilities exist: a buffer overflow vulnerability exists in mailbox handling due to an off-by-one boundary error, which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability exists in the imapd annotate extension due to an off-by-one boundary error, which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability exists in 'fetchnews,' which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability exist because remote administrative users can exploit the backend; and a buffer overflow vulnerability exists in imapd due to a boundary error, which could let a remote malicious user execute arbitrary code.
Update available at: Gentoo: SUSE: Ubuntu: Mandrake: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | Cyrus IMAP Server Multiple Remote Buffer Overflows | High | Secunia Advisory, Gentoo Linux Security Advisory, GLSA 200502-29, February 23, 2005 SUSE Security Announcement, SUSE-SA:2005:009, February 24, 2005 Ubuntu Security Notice USN-87-1, February 28, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:051, March 4, 2005 Conectiva Linux Security Announcement, CLA-2005:937, March 17, 2005 |
Cyrus SASL 1.5.24, 1.5.27, 1.5.28, 2.1.9-2.1.18 | Several vulnerabilities exist: a buffer overflow vulnerability exists in 'digestmda5.c,' which could let a remote malicious user execute arbitrary code; and an input validation vulnerability exists in the 'SASL_PATH' environment variable, which could let a malicious user execute arbitrary code. Fedora: Gentoo: Mandrake: RedHat: Trustix: Debian: Conectiva: OpenPGK: FedoraLegacy: SUSE: Apple: Currently we are not aware of any exploits for these vulnerabilities. | Cyrus SASL Buffer Overflow & Input Validation | High | Security Tracker Alert ID: 1011568, October 7, 2004 Debian Security Advisories DSA 563-2, 563-3, & 568-1, October 12, 14, & 16, 2004 Conectiva Linux Security Announcement, CLA-2004:889, November 11, 2004 OpenPKG Security Advisory, OpenPKG Security Advisory, January 28, 2005 Fedora Legacy Update Advisory, FLSA:2137, February 17, 2005 SUSE Security Summary Report, SUSE-SR:2005:006, February 25, 2005 SUSE Security Announcement, SUSE-SA:2005:013, March 3, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:054, March 16, 2005 Apple Security Update, APPLE-SA-2005-03-21, March 21, 2005
|
XPDF prior to 3.00pl3 | A buffer overflow vulnerability exists in ' 'xpdf/Decrypt.cc' due to a boundary error in the 'Decrypt::makeFileKey2' function, which could let a remote malicious user execute arbitrary code. Update available at: Patch available at: Debian: http://security.debian.org/pool/ Fedora: Gentoo: KDE: Ubuntu: Conectiva: Mandrake: SUSE: FedoraLegacy: Gentoo: SGI: Trustix: FedoraLegacy: RedHat: Currently we are not aware of any exploits for this vulnerability. | Glyph and Cog Xpdf 'makeFileKey2()' Buffer Overflow | High | iDEFENSE Security Advisory, January 18, 2005 Conectiva Linux Security Announcement, CLA-2005:921, January 25, 2005 Mandrakelinux Security Update Advisories, MDKSA-2005:016-021, January 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 SGI Security Advisory, 20050202-01-U, February 9, 2005 Gentoo Linux Security Advisory, GLSA 200502-10, February 9, 2005 Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0003, February 11, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 SUSE Security Announcement, SUSE-SA:2005:015, March 14, 2005 RedHat Security Advisory, RHSA-2005:026-15, March 16, 2005 SuSE Security Summary Report, SUSE-SR:2005:008, March 18, 2005
|
Lysator LSH 1.5-1.5.5, 2.0 | A remote Denial of Service vulnerability has been reported due to an unspecified error. Upgrades available at: Patch available at: Currently we are not aware of any exploits for this vulnerability. | Lysator LSH Remote Denial of Service | Low | Secunia Advisory, SA14609, March 17, 2005 |
Xpdf prior to 3.00pl2 | A buffer overflow vulnerability exists that could allow a remote user to execute arbitrary code on the target user's system. A remote user can create a specially crafted PDF file that, when viewed by the target user, will trigger an overflow and execute arbitrary code with the privileges of the target user. A fixed version (3.00pl2) is available at: A patch is available: KDE: Gentoo: Fedora: Ubuntu: Mandrakesoft (update for koffice): Mandrakesoft (update for kdegraphics): Mandrakesoft (update for gpdf): Mandrakesoft (update for xpdf): Mandrakesoft (update for tetex): Debian: Fedora (update for tetex): Fedora: Gentoo: TurboLinux: SGI: Conectiva: SuSE: FedoraLegacy: FedoraLegacy: SUSE: RedHat: Currently we are not aware of any exploits for this vulnerability. | GNU Xpdf Buffer Overflow in doImage() | High | iDEFENSE Security Advisory 12.21.04 KDE Security Advisory, December 23, 2004 Mandrakesoft, MDKSA-2004:161,162,163,165, 166, December 29, 2004 Fedora Update Notification, Gentoo Linux Security Advisory, GLSA 200501-13, January 10, 2005 Conectiva Linux Security Announcement, CLA-2005:921, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 Avaya Security Advisory, ASA-2005-027, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 SUSE Security Announcement, SUSE-SA:2005:015, March 14, 2005 RedHat Security Advisory, RHSA-2005:026-15, March 16, 2005 SuSE Security Summary Report, SUSE-SR:2005:008, March 18, 2005
|
Grip 3.1.2, 3.2 .0 | A buffer overflow vulnerability has been reported in the CDDB protocol due to a boundary error, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code.
Fedora: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Grip CDDB Query Buffer Overflow | Low/ (High if arbitrary code can be executed) | Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200503-21, March 17, 2005 |
Sylpheed 0.8.11, 0.9.4-0.9.12, 0.9.99, 1.0 .0-1.0.2 | A buffer overflow vulnerability exists in certain headers that contain non-ASCII characters, which could let a remote malicious user execute arbitrary code. Upgrades available at: Fedora: RedHat: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Sylpheed Mail Client Remote Buffer Overflow | High | Security Tracker Alert, 1013376, March 4, 2005 Fedora Update Notification, RedHat Security Advisory, RHSA-2005:303-05, March 18, 2005 Gentoo Linux Security Advisory, GLSA 200503-26, March 20, 2005 |
ImageMagick 5.3.3, 5.4.3, 5.4.4.5, 5.4.7, 5.4.8 .2-1.1.0, 5.4.8, | A buffer overflow vulnerability exists in the 'EXIF' parsing routine due to a boundary error, which could let a remote malicious user execute arbitrary code. Upgrades available at: Ubuntu: Gentoo: Debian: SUSE: Mandrakesoft: (Red Hat has re-issued it's update.) TurboLinux: Fedora: Currently we are not aware of any exploits for this vulnerability. | ImageMagick Remote EXIF Parsing Buffer Overflow | High | Security Tracker Alert ID, 1011946, October 26, 2004 Gentoo Linux Security Advisory, GLSA 200411-11:01, November 6, 2004 Debian Security Advisory DSA 593-1, November 16, 2004 SUSE Security Announcement, SUSE-SA:2004:041, November 17, 2004 SUSE Security Summary Report, USE-SR:2004:001, November 24, 2004 Mandrakesoft Security Advisory, MDKSA-2004:143, December 6, 2004 Red Hat Security Advisory, RHSA-2004:636-03, December 8, 2004 Turbolinux Security Advisory, TLSA-2005-7, January 26, 2005 Fedora Update Notification, |
Squid Proxy Plug-In 0.1, 0.2 | A buffer overflow vulnerability has been reported due to a failure to copy user-supplied data securely, which could let a remote malicious user cause a Denial of Service and potentially execute arbitrary code. Upgrades available at: Currently we are not aware of any exploits for this vulnerability. | Initial Redirect Remote Buffer Overflow | Low/ High (High if arbitrary code can be executed) | Security Focus, 12827, March 17, 2005 |
XV 3.10 a | A format string vulnerability exists in a formatted printing function due to insufficient sanitization of user-supplied input, which could let a remote malicious user cause a Denial of Service or execute arbitrary code.
Gentoo: SUSE: Currently we are not aware of any exploits for this vulnerability. | XV File Name Handling Remote Format String | Low/ High (High if arbitrary code can be executed) | Gentoo Linux Security Advisory, GLSA 200503-09, March 4, 2005 SUSE Security Summary Report, SUSE-SR:2005:008, March 18, 2005 |
KDE 1.1-1.1.2, 1.2, 2.1-2.1.2, 2.2-2.2.2, 3.0- 3.0.5, 3.1-3.1.5, 3.2-3.2.3, 3.3-3.3.2 | A Denial of Service vulnerability has been reported in the Desktop Communication Protocol (DCOP) daemon due to an error in the authentication process Upgrade available at: Gentoo: Mandrake: Currently we are not aware of any exploits for this vulnerability. | KDE DCOPServer Local Denial of Service | Low | KDE Security Advisory, March 16, 2005 |
kdelibs 3.3.2 | A vulnerability exists in the 'dcopidling' library due to insufficient validation of a files existence, which could let a malicious user corrupt arbitrary files. Patch available at: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Gentoo: Currently we are not aware of any exploits for this vulnerability. | KDE 'DCOPIDLING' Library | Medium | Security Focus, February 11, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:045, February 18, 2005 Gentoo Linux Security Advisory, GLSA 200503-14, March 7, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:058, March 16, 2005
|
rxvt-unicode prior to 5.3
| A buffer overflow vulnerability has been reported in 'command.c,' which could let a remote malicious user execute arbitrary code. Update available at: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Marc Lehmann rxvt-unicode 'command.c' Remote Buffer Overflow | High | Secunia Advisory: SA14562, March 15, 2005 Gentoo Linux Security Advisory, GLSA 200503-23, March 20, 2005 |
Kerberos 5 krb5-1.3.5 & prior; Avaya S8700/S8500/S8300 (CM2.0 and later), MN100, Intuity LX 1.1- 5.x, Modular Messaging MSS | A buffer overflow exists in the libkadm5srv administration library. A remote malicious user may be able to execute arbitrary code on an affected Key Distribution Center (KDC) host. There is a heap overflow in the password history handling code. A patch is available at: Gentoo: Debian: Conectiva: Ubuntu: Avaya: Sun: TurboLinux: Currently we are not aware of any exploits for this vulnerability. | Kerberos | High | SecurityTracker Alert ID, 1012640, December 20, 2004 Gentoo GLSA 200501-05, January 5, 2005 Ubuntu Security Notice, USN-58-1, January 10, 2005 Conectiva Linux Security Announcement, CLA-2005:917, January 13, 2005 Avaya Security Advisory, ASA-2005-036, February 7, 2005 Sun(sm) Alert Notification, 57712, February 25, 2005 Turbolinux Security Advisory, TLSA-2005-34, March 17, 2005
|
Firefox 1.0 | A vulnerability exists because a predictable name issued for the plugin temporary directory, which could let a malicious user cause a Denial of Service or modify system/user information.
Update available at: Fedora: Gentoo: SuSE: An exploit has been published. | Mozilla Firefox Predictable Plugin Temporary Directory | Low/Medium (Medium if user/system information can be modified) | Mozilla Foundation Security Advisory, 2005-28, February 25, 2005 SUSE Security Announcement, SUSE-SA:2005:016, March 16, 2005 |
FreeBSD 4.10-PRERELEASE, 1.1.5 .1, 2.0, 2.0.5, 2.1 x, 2.1, 2.1.5-2.1.7 .1, 2.2 x, 2.2, 2.2.2- 2.2.6, 2.2.8, 3.0 -RELENG, 3.0, 3.1 x, 3.1, 3.2 x, 3.2, 3.3 x, 3.3, 3.4 x, 3.4, 3.5 x, 3.5 -STABLEpre122300, 3.5 -STABLEpre050201, 3.5 -STABLE, 3.5, 3.5.1 -STABLEpre2001-07-20, 3.5.1 -STABLE, 3.5.1 -RELEASE, 3.5.1, 4..x, | A vulnerability has been reported in the 'copyout()' function due to insufficient sanitization of the destination argument, which could let a remote malicious user corrupt kernel memory. OpenBSD: Currently we are not aware of any exploits for this vulnerability.
| Multiple BSD Vendor Copyout Kernel Memory Corrupt | Medium | Security Focus, 12825, March 16, 2005 |
Bernd Johanness Wueb kppp 1.1.3; | A vulnerability exists due to a file descriptor leak, which could let a malicious user obtain sensitive information. Patch available at: RedHat: Debian: Conectiva: There is no exploit code required. | KPPP Privileged File Descriptor Information Disclosure | Medium | iDEFENSE Security Advisory, February 28, 2005 RedHat Security Advisory, RHSA-2005:175-06, March 3, 2005 Debian Security Advisory, DSA 692-1, March 8, 2005 Conectiva Linux Security Announcement, CLSA-2005:934, March 16, 2005 |
Carnegie Mellon University Cyrus IMAP Server 2.1.7, 2.1.9, 2.1.10, 2.1.16, 2.2 .0 ALPHA, 2.2.1 BETA, 2.2.2 BETA, 2.2.3-2.2.8; Trustix Secure Enterprise Linux 2.0, Secure Linux 2.0-2.2; | Multiple vulnerabilities exist: a buffer overflow vulnerability exists in the 'PROXY' and 'LOGIN' commands if the 'IMAPMAGICPLUS' option is enabled, which could let a remote malicious user execute arbitrary code; an input validation vulnerability exists in the argument parser for the 'PARTIAL' command, which could let a remote malicious user execute arbitrary code; an input validation vulnerability exists in the argument handler for the 'FETCH' command, which could let a remote malicious user execute arbitrary code; and a vulnerability exists in the handler for the 'APPEND' command, which could let a remote malicious user execute arbitrary code. Carnegie Mellon University: Debian: Gentoo: Mandrake: Trustix: Ubuntu: Conectiva: Fedora: OpenPKG: SUSE: Apple: Currently we are not aware of any exploits for these vulnerabilities. | Cyrus IMAPD Multiple Remote Vulnerabilities | High | Securiteam, November 23, 2004 Debian Security Advisory, DSA 597-1, November 25, 2004 Gentoo Linux Security Advisory, GLSA 200411-34, November 25, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:139, November 26, 2004 Trustix Secure Linux Advisory, TSL-2004-0063. November 29, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.051, November 29, 2004 Conectiva Linux Security Announcement, CLA-2004:904, December 1, 2004 Fedora Update Notifications, SUSE Security Announcement, SUSE-SA:2004:043, December 3, 2004 Apple Security Update, APPLE-SA-2005-03-21, March 21, 2005 |
Carnegie Mellon University Cyrus IMAP Server 2.2.9 & prior | A buffer overflow vulnerability exists in the 'imap magic plus' support code, which could let a remote malicious user execute arbitrary code. Update available at: Gentoo: Mandrake: Fedora: Conectiva: Apple: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Cyrus IMAP 'imap magic plus' Buffer Overflow | High | Gentoo Linux Security Advisory, GLSA 200411-34, November 25, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:139, November 26, 2004 Secunia SA13349, December 2, 2004 Secunia Advisory ID: SA13346, December 2, 2004 Secunia Advisory ID: 13366, December 6, 2004 Apple Security Update, APPLE-SA-2005-03-21, March 21, 2005 |
GNU Mailman 1.0, 1.1, 2.0 beta1-beta3, 2.0- 2.0 .3, 2.0.5-2.0 .8, 2.0.1-2.0.14, 2.1 b1, 2.1- 2.1.5; Ubuntu Linux 4.1, ia64, ia32
| Multiple vulnerabilities exist: a Cross-Site Scripting vulnerability exists when returning error pages due to insufficient sanitization by 'scripts/driver,' which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability exists due to a weakness in the automatic password generation algorithm, which could let a remote malicious user brute force automatically generated passwords.
Ubuntu: Gentoo: Mandrake: SUSE: Debian: RedHat: Currently we are not aware of any exploits for these vulnerabilities. | GNU Mailman Multiple Remote Vulnerabilities | Medium/ High (High if arbitrary code can be executed) | SecurityTracker, January 12, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:015, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 Debian Security Advisories, DSA 674-1 & 674-2, February 10 & 11, 2005 SUSE Security Announcement, SUSE-SA:2005:007, February 14, 2005 Debian Security Advisory, DSA 674-3, February 21, 2005 RedHat Security Advisory, RHSA-2005:235-05, March 21, 2005 |
Larry Wall Perl 5.0 05_003, 5.0 05, 5.0 04_05, 5.0 04_04, 5.0 04, 5.0 03, 5.6, 5.6.1, 5.8, 5.8.1, 5.8.3, 5.8.4 -5, 5.8.4 -4, 5.8.4 -3, 5.8.4 -2.3, 5.8.4 -2, 5.8.4 -1, 5.8.4, 5.8.5, 5.8.6 | A vulnerability has been reported in the 'rmtree()' function in the 'File::Path.pm' module when handling directory permissions while cleaning up directories, which could let a malicious user obtain elevated privileges.
Ubuntu: Gentoo: Debian: Currently we are not aware of any exploits for this vulnerability. | Perl 'rmtree()' Function Elevated Privileges | Medium | Ubuntu Security Notice, USN-94-1 March 09, 2005 Gentoo Linux Security Advisory [UPDATE], GLSA 200501-38:03, March 15, 2005 Debian Security Advisory, DSA 696-1 , March 22, 2005 |
Linux kernel 2.4 .0-test1-test12, 2.4-2.4.29, 2.6, 2.6-test1-test11, 2.6.1-2.6.11 | Multiple vulnerabilities have been reported in the ISO9660 handling routines, which could let a malicious user execute arbitrary code. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for these vulnerabilities. | Linux Kernel Multiple ISO9660 Filesystem Handling Vulnerabilities | High | Security Focus, 12837, March 18, 2005 |
nfs-utils 1.0.6 | A vulnerability exists due to an error in the NFS statd server in 'statd.c' where the 'SIGPIPE' signal is not correctly ignored. This can be exploited to crash a vulnerable service via a malicious peer terminating a TCP connection prematurely. Upgrade to 1.0.7-pre1: Mandrakesoft: Debian: Red Hat: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" TurboLinux: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors nfs-utils 'SIGPIPE' TCP Connection Termination Denial of Service | Low | Secunia Advisory ID, SA13384, December 7, 2004 Debian Security Advisory Red Hat Security Advisory, RHSA-2004:583-09, December 20, 2004 Mandrakelinux Security Update Advisory, MDKSA-2005:005, January 12, 2005 Turbolinux Security Advisory, TLSA-2005-33, March 17, 2005 |
Daniel Stenberg curl 6.0-6.4, 6.5-6.5.2, 7.1, 7.1.1, 7.2, 7.2.1, 7.3, 7.4, 7.4.1, 7.10.1, 7.10.3-7.10.7, 7.12.1 | A buffer overflow vulnerability exists in the Kerberos authentication code in the 'Curl_krb_kauth()' and 'krb4_auth()' functions and in the NT Lan Manager (NTLM) authentication in the 'Curl_input_ntlm()' function, which could let a remote malicious user execute arbitrary code. SUSE: Ubuntu: Mandrake: Updates available at: Gentoo: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors cURL / libcURL Kerberos Authentication & 'Curl_input_ntlm()' Remote Buffer Overflows | High | iDEFENSE Security Advisory , February 21, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:048, March 4, 2005 Gentoo Linux Security Advisory, GLSA 200503-20, March 16, 2005 Conectiva Linux Security Announcement, CLA-2005:940, March 21, 2005 |
Debian Linux 3.0, sparc, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, alpha; | Several integer overflow vulnerabilities exist in 'pdftops/Catalog.cc' and 'pdftops/XRef.cc,' which could let a remote malicious user execute arbitrary code.
Debian: Fedora: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-20.xml"> KDE: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/"> Conectiva: Debian: SUSE: Update: Gentoo: Fedora: FedoraLegacy: RedHat: FedoraLegacy: RedHat: SGI: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors Xpdf PDFTOPS Multiple Integer Overflows
href="http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2004-0888">CAN-2004-0888 | High | Security Tracker Alert ID, 1011865, October 21, 2004 Conectiva Linux Security Announcement, CLA-2004:886, November 8, 2004 Debian Security Advisory, DSA 599-1, November 25, 2004 SUSE Security Summary Report, SUSE-SR:2004:002, November 30, 2004 Gentoo Linux Security Advisory, GLSA 200501-31, January 23, 2005 Fedora Update Notifications, Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Mandrakelinux Security Update Advisories, MDKSA-2005:041-044, February 18, 2005 RedHat Security Advisory, RHSA-2005:132-09, February, 18. 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:052, March 4, 2005 RedHat Security Advisory, RHSA-2005:213-04, March 4, 2005 SGI Security Advisory, 20050204-01-U, March 7, 2005 SUSE Security Summary Report, SUSE-SR:2005:008, March 18, 2005 |
Gentoo Linux; | A Directory Traversal vulnerability exists in 'private.py' due to an input validation error, which could let a remote malicious user obtain sensitive information. Debian: Fedora: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" RedHat: SUSE: Ubuntu: Apple: There is no exploit code required. | GNU Mailman Remote Directory Traversal | Medium | Debian Security Advisory, DSA 674-1, February 10, 2005 Ubuntu Security Notice USN-78-1, February 10, 2005 Fedora Update Notifications Gentoo Linux Security Advisory, GLSA 200502-11, February 10, 2005 RedHat Security Advisory, RHSA-2005:136-08, February 10, 2005 Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200502-11, February 10, 2005 Debian Security Advisories, DSA 674-1 & 674-2, February 10 & 11, 2005 SUSE Security Announcement, SUSE-SA:2005:007, February 14, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:037, February 14, 2005 Ubuntu Security Notice, USN-78-2 , February 17, 2005 Debian Security Advisory, DSA 674-3, February 21, 2005 Apple Security Update, APPLE-SA-2005-03-21, March 21, 2005 |
Gentoo Linux; | A buffer overflow vulnerability has been in reported in 'chart.c' due to a boundary error when handling the highscore lists, which could let a remote malicious user execute arbitrary code.
Upgrade available at: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Lgames LTris Local Global High Score File Buffer Overflow | High | Secunia Advisory, SA14635, March 21, 2005 Gentoo Linux Security Advisory, GLSA 200503-24, March 20, 2005 |
Linux Kernel 2.4.0 test1-test12, 2.4-2.4.28, 2.4.29 -rc2, 2.6, test1-test11, 2.6.1, rc1-rc2, 2.6.2-2.6.9, 2.6.10 rc2; Avaya S8710/S8700/ S8500/S8300, Converged Communication Server, Intuity LX, MN100, Modular Messaging, Network Routing | A vulnerability exists in the 'load_elf_library()' function in 'binfmt_elf.c' because memory segments are not properly processed, which could let a remote malicious user execute arbitrary code with root privileges. Fedora: Trustix: Ubuntu: Mandrake: Ubuntu: RedHat: FedoraLegacy: TurboLinux: Conectiva: Another exploit script has been published. | Linux Kernel uselib() Root Privileges | High | iSEC Security Research Advisory, January 7, 2005 Fedora Update Notifications, Trustix Secure Linux Security Advisory, TSLSA-2005-0001, January 13, 2005 Mandrake Security Advisory, MDKSA-2005:022, January 26, 2005 PacketStorm, January 27, 2005 Avaya Security Advisory, ASA-2005-034, February 8, 2005 Ubuntu Security Notice, USN-57-1, RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005 Fedora Legacy SUSE Security Announcement, Turbolinux Security Announcement , February 28, 2005 Conectiva Linux Security Announcement, |
Linux kernel 2.6 .10, | A Denial of Service vulnerability has been reported in the Netfilter code due to a memory leak.
Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel Netfilter Memory Leak Denial of Service | Low | Ubuntu Security Notice, USN-95-1 March 15, 2005 |
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6 -test1-test11, 2.6, 2.6.1 rc1&rc2, 2.6.1-2.6.8 | A remote Denial of Service vulnerability has been reported in the Point-to-Point Protocol (PPP) Driver. Ubuntu: Trustix: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel PPP Driver Remote Denial of Service | Low | Ubuntu Security Notice, USN-95-1 March 15, 2005 Trustix Secure Linux Security Advisory, TSL-2005-0009, March 21, 2005 |
Linux kernel 2.6-2.6.11 | A vulnerability has been reported in 'SYS_EPoll_Wait' due to a failure to properly handle user-supplied size values, which could let a malicious user obtain elevated privileges. Ubuntu: An exploit script has been published. | Linux Kernel SYS_EPoll_Wait Elevated Privileges | Medium | Security Focus, 12763, March 8, 2005 Ubuntu Security Notice, USN-95-1 March 15, 2005 Security Focus, 12763, March 22, 2005 |
SuSE Linux 8.0, i386, 8.1, 8.2, 9.0 x86_64, 9.0-9.2; Wietse Venema Postfix 2.1.3 | A vulnerability exists because arbitrary mail with an IPv6 address can be sent to any MX host, which could let a remote malicious user bypass security.
Ubuntu: SuSE: RedHat: There is no exploit code required. | Postfix IPv6 Security Bypass | Medium | SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Ubuntu Security Notice, USN-74-2, February 4, 2005 RedHat Security Advisory, RHSA-2005:152-04, March 16, 2005 |
X.org X11R6 6.7.0, 6.8, 6.8.1; | An integer overflow vulnerability exists in 'scan.c' due to insufficient sanity checks on on the 'bitmap_unit' value, which could let a remote malicious user execute arbitrary code. Patch available at: Gentoo: http://security.ubuntu.com/ubuntu/ Gentoo: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | High | Security Focus, 12714, March 2, 2005 Gentoo Linux Security Advisory, GLSA 200503-08, March 4, 2005 Ubuntu Security Notice, USN-92-1 March 07, 2005 Gentoo Linux Security Advisory, GLSA 200503-15, March 12, 2005 Ubuntu Security Notice, USN-97-1 March 16, 2005 | |
xli 1.14-1.17 | A vulnerability exists due to a failure to manage internal buffers securely, which could let a remote malicious user execute arbitrary code. Gentoo: Debian: Currently we are not aware of any exploits for this vulnerability. | XLI Internal Buffer Management | High | Gentoo Linux Security Advisory, GLSA 200503-05, March 2, 2005 Debian Security Advisory, DSA 695-1, March 21, 2005 |
xli 1.14-1.17; xloadimage 3.0, 4.0, 4.1 | A vulnerability exists due to a failure to parse compressed images safely, which could let a remote malicious user execute arbitrary code.
Gentoo: Debian: Fedora: Currently we are not aware of any exploits for this vulnerability. | XLoadImage Compressed Image Remote Command Execution | High | Gentoo Linux Security Advisory, GLSA 200503-05, March 2, 2005 Fedora Update Notifications, Debian Security Advisory, DSA 695-1, March 21, 2005
|
Evolution 2.0.2, 2.0.3 | A remote Denial of Service vulnerability has been reported due to the way messages are processed that contained malformed unicode specifications. Mandrake: Currently we are not aware of any exploits for this vulnerability. | Novell Evolution Remote Denial of Service | Low | Mandrakelinux Security Update Advisory, MDKSA-2005:059, March 17, 2005 |
OpenSLP 1.0.0-1.0.11, 1.1.5, 1.2 .0 | Multiple buffer overflow vulnerabilities have been reported when processing malformed SLP (Service Location Protocol) packets, which could let a remote malicious user execute arbitrary code.
Upgrades available at: SuSE: Mandrake: Ubuntu: Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | OpenSLP Multiple Buffer Overflows | High | SuSE Security Announcement, SUSE-SA:2005:015, March 14, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:055, March 16, 2005 Ubuntu Security Notice, USN-98-1 March 17, 2005 Gentoo Linux Security Advisory, GLSA 200503-25, March 20, 2005 |
Opera 7.54 on Linux with KDE 3.2.3; Gentoo Linux | A vulnerability exists that could permit a remote user to cause the target user to execute arbitrary commands. KDE uses 'kfmclient exec' as the default application for processing saved files. A remote user can cause arbitrary shell commands to be executed on the target system. Opera: Gentoo: SUSE: A Proof of Concept exploit has been published. | Opera Default 'kfmclient exec' Configuration | High | Zone-H Advisory, ZH2004-19SA, December 12, 2004 Gentoo Linux Security Advisory, GLSA 200502-17, February 14, 2005 SUSE Security Summary Report, SUSE-SR:2005:008, March 18, 2005 |
phpMyAdmin 1.x, 2.x | A vulnerability has been reported in the privileges management module due to the way "_" characters are handled, which could let a remote malicious user bypass security restrictions.
Updates available at: Currently we are not aware of any exploits for this vulnerability. | phpMyAdmin "_" Security Restrictions Bypass | Medium | Secunia Advisory, SA14599, March 16, 2005 |
S/MIME Plugin 0.4, 0.5 | A vulnerability exists in the S/MIME plug-in due to insufficient sanitization of the 'exec()' function, which could let a remote malicious user execute arbitrary code.
Upgrades available at: SUSE: There is no exploit code required. | SquirrelMail S/MIME Plug-in Remote Command Execution | High | iDEFENSE Security Advisory, February 7, 2005 SUSE Security Announcement, SUSE Security Summary Report, SUSE-SR:2005:008, March 18, 2005 |
Solaris 7.0 _x86, 7.0, 8.0 _x86, 8.0, 9.0 _x86, 9.0 | A buffer overflow vulnerability has been reported in the 'newgrp(1)' command due to insecure copying of user-supplied data, which could let a malicious user execute arbitrary code with ROOT privileges.
Updates available at: Currently we are not aware of any exploits for this vulnerability. | Sun Solaris NewGRP Buffer Overflow | High | Sun(sm) Alert Notification, 57710, March 16, 2005 |
imap 2004b, 2004a, 2004, 2002b-2002e | A vulnerability exists due to a logic error in the Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) code, which could let a remote malicious user bypass authentication. Update available at: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" RedHat: SUSE: SGI: Currently we are not aware of any exploits for this vulnerability. | University Of Washington IMAP Server CRAM-MD5 Remote Authentication Bypass | Medium | Gentoo Linux Mandrakelinux RedHat Security Advisory, RHSA-2005:128-06, SUSE Security Announcements, SGI Security Advisory, 20050301-01-U, |
dyndnsupdate | Multiple buffer overflow vulnerabilities have been reported due to insufficient validation of user-supplied string length, which could let a remote malicious user execute arbitrary code.
Gentoo: Currently we are not aware of any exploits for this vulnerability. | Xzabite DYNDNSUpdate Multiple Remote Buffer Overflows | High | Gentoo Linux Security Advisory, GLSA 200503-27, March 21, 2005 |
id=other name=other>Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
Belkin 54G (F5D7130) | Multiple vulnerabilities have been reported: a vulnerability has been reported because UPNP datagrams that contain a URI are transmitted at regular intervals, which could let a remote malicious user obtain access to the URL without authentication; a vulnerability has been reported because SNMP support is enabled under the default configuration, which could let a remote malicious user obtain sensitive information; and a remote Denial of Service vulnerability has been reported in the SNMP service.
No workaround or patch available at time of publishing. There is no exploit code required. | Belkin 54G Wireless Router Multiple Vulnerabilities | Low/ Medium (Medium if sensitive information can be obtained) | Security Focus, 12846, March 18, 2005 |
betaparticle blog 2.0, 3.0 | Multiple vulnerabilities have been reported: a vulnerability has been reported because the database file is located inside the web root, which could let a remote malicious user obtain sensitive information; and a vulnerability has been reported in the 'upload.asp' and 'myFiles.asp' scripts because a remote malicious user can upload and delete files/images without authentication.
For the database file vulnerability: Deny direct access to the database file or move it outside the web root. Update available at: Proofs of Concept exploits have been published. | Betaparticle Blog Multiple Remote Vulnerabilities | Medium | Secunia Advisory, SA14668, March 22, 2005 |
Ciamos RC1, Beta 0.9, 0.9.2 RC1 | A vulnerability has been reported in 'highlight.php' due to insufficient sanitization of the 'file' parameter, which could let a remote malicious user obtain sensitive information.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Ciamos 'Highlight.PHP' Information Disclosure | Medium | IHS Advisory, March 19, 2005 |
Cisco devices running IOS enabled for BGP | A remote Denial of Service vulnerability exists if malformed BGP packets are submitted. The vendor has issued a solution at: Rev. 1.4: Modifications and additions to the Details section. Revision 1.5:Updated the IOS Software 12.2T available repaired release information in the IOS release table in the Software Versions and Fixes section. Currently we are not aware of any exploits for this vulnerability. | Cisco IOS BGP Packets Denial of Service | Low | Cisco Security Advisory 63845, January 29, 2005 Technical Cyber Security Alert, TA05-026A, January 26, 2005 Cisco Security Advisory 63845, Revision 1.4, February 9, 2005 Cisco Security Advisory 63845, Revision 1.5, March 21, 2005 |
CoolForum 0.5-0.5.2 beta, 0.7.2, 0.7.3, 0.8 | Multiple input validation vulnerabilities have been reported; a vulnerability has been reported in the 'avatar.php' script due to insufficient validation of the 'img' parameter, which could let a remote malicious user execute arbitrary code; a vulnerability has been reported in the 'admin/entete.php' script due to insufficient validation of the 'pseudo' parameter, which could let a remote malicious user inject arbitrary SQL commands; and a vulnerability has been reported in the 'register.php' page due to insufficient validation of the 'login' parameter, which could let a remote malicious user execute arbitrary SQL commands. Updates available at: Proofs of Concept exploits have been published. | CoolForum Multiple Input Validation | High | Security Tracker Alert, 1013474, March 18, 2005 |
CzarNews 1.13 b | A vulnerability has been reported due to insufficient validation of several scripts which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | CzarNews Arbitrary Code Execution | High | [In]Security Research Advisory, March 20, 2005 |
IDA Pro 4.7.0.830 | A format string vulnerability has been reported in the debugging functionality when handling loaded dynamic link libraries, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | DataRescue IDA Pro Remote Format String | High | Securiteam, March 17, 2005 |
DeleGate 7.7 .0, 7.7.1, 7.8 .0-7.8.2, 7.9.11, 8.3.3, 8.3.4, 8.4.0, 8.5 .0, 8.9-8.9.6, 8.10-8.10.2 | Multiple buffer overflow vulnerabilities have been reported due to unspecified errors which could let a remote malicious user cause a Denial of Service or execute arbitrary code. Updates available at: Currently we are not aware of any exploits for these vulnerabilities. | DeleGate Multiple Unspecified Buffer Overflows | Low/ High (High if arbitrary code can be executed) | Secunia Advisory, SA14649, March 22, 2005 |
Ethereal 0.10-0.10.8 | A buffer overflow vulnerability exists due to a failure to copy network derived data securely into sensitive process buffers, which could let a remote malicious user execute arbitrary code. Upgrades available at: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-16.xml"> Fedora: Mandrake: RedHat: Exploit scripts have been published. | Ethereal Buffer Overflow href=" http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0699">CAN-2005-0699 | High | Security Focus, 12759, March 8, 2005 Security Focus, 12759, March 14, 2005 Gentoo Linux Security Advisory, GLSA 200503-16, March 12, 2005 Fedora Update Notifications, Mandrakelinux Security Update Advisory, MDKSA-2005:053, March 16, 2005 RedHat Security Advisory, RHSA-2005:306-10, March 18, 2005 |
Ethereal 0.9-0.9.16, 0.10-0.10.9 | Multiple vulnerabilities have been reported: a buffer overflow vulnerability has been reported in the Etheric dissector, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; a remote Denial of Service vulnerability has been reported in the GPRS-LLC dissector if the 'ignore cipher bit' option is enabled; a buffer overflow vulnerability has been reported in the 3GPP2 A11 dissector, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; and remote Denial of Service vulnerabilities have been reported in the JXTA and sFLow dissectors. Upgrades available at: Gentoo: Fedora: Mandrake: RedHat: A Denial of Service Proof of Concept exploit script has been published. | Ethereal Etheric/GPRS-LLC/IAPP/JXTA/s | Low/ (High if arbitrary code can be executed) | Ethereal Advisory, enpa-sa-00018, March 12, 2005 Gentoo Linux Security Advisory, GLSA 200503-16, March 12, 2005 Fedora Update Notifications, Mandrakelinux Security Update Advisory, MDKSA-2005:053, March 16, 2005 RedHat Security Advisory, RHSA-2005:306-10, March 18, 2005 |
Icecast 2.0-2.0.2, 2.1 .0, 2.2 | Multiple vulnerabilities have been reported: a buffer overflow vulnerability has been reported in the XSL parser due to insufficient bounds checks on XSL tags, which could let a malicious user cause a Denial of Service or potentially execute arbitrary code; and a vulnerability has been reported due to a failure to parse XSL files when a request for such a file is appended with a dot '.' character, which could let a remote malicious user obtain sensitive information.
No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | Icecast XSL Parser Multiple Vulnerabilities | Low/ Medium/ High (Low of a DoS; Medium if sensitive information can be obtained; and High if arbitrary code can be executed) | Security Tracker Alert, 1013475, March 19, 2005 |
eSupport 2.3 | A Cross-Site Scripting vulnerability has been reported in the 'index.php' script due to insufficient sanitization of multiple parameters, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | Kayako ESupport 'Index.PHP' Cross-Site Scripting | High | GulfTech Security Research Advisory, March 22, 2005 |
McNews 1.0, 1.1 a, 1.1-1.3 | A vulnerability has been reported in the 'install.php' script due to insufficient sanitization, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | McNews 'Install.PHP' Arbitrary Code Execution | High | Security Focus, 12835, March 17, 2005 |
Active Mail Protection, Active Threat Protection, Active Virus Defense, Active Virus Defense SMB Edition, Active VirusScan, | A buffer overflow vulnerability has been reported in the LHA parser, due to insufficient bounds checking of LHA type two header file name fields, which could let a remote malicious user execute arbitrary code with SYSTEM privileges. The vendor recommends applying the latest .DAT files and updating to Currently we are not aware of any exploits for this vulnerability. | McAfee Antivirus Library LHA Remote Buffer Overflow | High | Internet Security Systems Protection Advisory |
Mozilla 1.7.x and prior Mozilla Firefox 1.x and prior Mozilla Thunderbird 1.x and prior | Multiple vulnerabilities exist in Firefox, Mozilla and Thunderbird. These can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to conduct spoofing attacks, disclose and manipulate sensitive information, and potentially compromise a user's system. Firefox: Update to version 1.0.1: Mozilla: Thunderbird: Fedora update for Firefox: Red Hat: Gentoo: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | Mozilla / Firefox / Thunderbird Multiple Vulnerabilities CAN-2005-0255 | High | Mozilla Foundation Security Advisories 2005-14, 15, 17, 18, 19, 20, 21, 24, 28 Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 SUSE Security Announcement, SUSE-SA:2005:016, March 16, 2005 |
Mozilla Firefox 1.0; Gentoo Linux; Thunderbird 0.6, 0.7- 0.7.3, 0.8, 0.9, 1.0, 1.0.1; | There are multiple vulnerabilities in Mozilla Firefox. A remote user may be able to cause a target user to execute arbitrary operating system commands in certain situations or access access content from other windows, including the 'about:config' settings. This is due to a hybrid image vulnerability that allows batch statements to be dragged to the desktop and because tabbed javascript vulnerabilities let remote users access other windows. A fix is available via the CVS repository Fedora:
href="ftp://aix.software.ibm.com/aix/efixes/security/perl58x.tar.Z"> Red Hat: Gentoo: Thunderbird: A Proof of Concept exploit has been published. | Mozilla Firefox Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230 | High | Security Tracker Alert ID: 1013108, February 8, 2005 Fedora Update Notification, Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 Security Focus, 12468, March 22, 2005 |
Mozilla 1.7.3 Mozilla Firefox 1.0 for Windows | A vulnerability exists that could let remote malicious users trick users into downloading malicious files. This is because the the browser uses the different criteria to determine the the file type when saving the downloaded file. Updated versions are available. Mozilla Firefox 1.0.1: Mozilla 1.7.5: Red Hat: Gentoo: Fedora: SUSE: Currently we are not aware of any exploits for this vulnerability. | Mozilla / Firefox Download Spoofing Vulnerability | Medium | Secunia SA13258, March 1, 2005 Mozilla Foundation Security Advisory 2005-22 Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 SUSE Security Announcement, SUSE-SA:2005:016, March 16, 2005 |
Mozilla Firefox 1.0; Gentoo Linux;Thunderbird 0.6, 0.7-0.7.3, 0.8, 0.9, 1.0, 1.0.1, Netscape 7.2 | There are multiple vulnerabilities in Mozilla Firefox. A remote user may be able to cause a target user to execute arbitrary operating system commands in certain situations or access access content from other windows, including the 'about:config' settings. This is due to a hybrid image vulnerability that allows batch statements to be dragged to the desktop and because tabbed javascript vulnerabilities let remote users access other windows. A fix is available via the CVS repository Fedora:
href="ftp://aix.software.ibm.com/aix/efixes/security/perl58x.tar.Z"> Red Hat: Gentoo: SUSE: Thunderbird: A Proof of Concept exploit has been published. | Multiple Vendors Mozilla Firefox Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230 | High | Security Tracker Alert ID: 1013108, February 8, 2005 Fedora Update Notification, Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 SUSE Security Announcement, SUSE-SA:2005:016, March 16, 2005 Security Focus, 12468, March 22, 2005 |
OpenPGP | A vulnerability exists that could permit a remote malicious user to conduct an adaptive-chosen-ciphertext attack against OpenPGP's cipher feedback mode. The flaw is due to an ad-hoc integrity check feature in OpenPGP. A solution will be available in the next release of the product. SUSE: Mandrake: A Proof of Concept exploit has been published. | Medium | SUSE Security Summary Report, SUSE-SR:2005:007, March 4, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:057, March 16, 2005 | |
MySQL 4.0.23, and 4.1.10 | A vulnerability was reported in the CREATE FUNCTION command that could let an authenticated user gain mysql user privileges on the target system and permit the user to execute arbitrary code. A fixed version (4.0.24 and 4.1.10a) is available at: Gentoo: Ubuntu: Mandrake: Trustix: A Proof of Concept exploit has been published. | MySQL CREATE FUNCTION Remote Code Execution Vulnerability | High | Security Tracker Alert ID: 1013415, March 11, 2005 Gentoo Linux Security Advisory, GLSA 200503-19, March 16, 2005 Ubuntu Security Notice, USN-96-1 March 16, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:060, March 21, 2005 Trustix Secure Linux Security Advisory, TSL-2005-0009, March 21, 2005 |
MySQL 4.0.23, and 4.1.10 | A vulnerability has been reported that could let local malicious users gain escalated privileges. This is because the "CREATE TEMPORARY TABLE" command can create insecure temporary files. The vulnerabilities have been fixed in version 4.0.24 (when available): Gentoo: Ubuntu: Mandrake: Trustix: A Proof of Concept exploit has been published. | MySQL Escalated Privilege Vulnerabilities
| Medium | Secunia SA14547, March 11, 2005 Gentoo Linux Security Advisory, GLSA 200503-19, March 16, 2005 Ubuntu Security Notice, USN-96-1 March 16, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:060, March 21, 2005 Trustix Secure Linux Security Advisory, TSL-2005-0009, March 21, 2005 |
MySQL 4.0.23, and 4.1.10 | An input validation vulnerability was reported in udf_init() that could let an authenticated user with certain privileges execute arbitrary library functions on the target system. The udf_init() function in 'sql_udf.cc' does not properly validate directory names. A fixed version (4.0.24 and 4.1.10a) is available at: Gentoo: Ubuntu: Mandrake: Trustix: A Proof of Concept exploit has been published. | MySQL udf_init() | High | Security Tracker Alert ID: 1013414, March 11, 2005 Gentoo Linux Security Advisory, GLSA 200503-19, March 16, 2005 Ubuntu Security Notice, USN-96-1 March 16, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:060, March 21, 2005 Trustix Secure Linux Security Advisory, TSL-2005-0009, March 21, 2005 |
SurgeMail 1.8 g3, 1.8 e, 1.8 d, 1.8 b3, 1.8 a, 1.9 b2, 1.9, 2.0 g2, 2.0 e, 2.0 c, 2.0 a2, 2.1 c7, 2.1 a, 2.2 g3, 2.2 g2, 2.2 c9, 2.2 c10, 2.2 a6, 3.0 a | Two vulnerabilities have been reported in the webmail functionality and 'user.cgi' due to unspecified errors. The impact was not specified.
Updates available at: Currently we are not aware of any exploits for these vulnerabilities. | NetWin SurgeMail Multiple Remote Unspecified Vulnerabilities | Not Specified | Secunia Advisory, SA14658, March 22, 2005 |
Netware 6.5 SP2 & SP3 | A vulnerability has been reported in the 'xvesa' code due to insufficient authentication routines, which could let a remote malicious user bypass certain security restrictions and obtain gain access to the server Console. Patches available at: http://support.novell.com/servlet/ filedownload/sec/ftf/xvsft1.exe There is no exploit code required. | Novell Netware Xsession Security Bypass | Medium | Technical Information Document, TID2971038, March 16, 2005 |
Phorum 5.0.14, 3.1-3.1.2, 3.2-3.2.8, 3.3.1 - 3.3.2, 3.4-3.4.8, 5.0.3 BETA, 5.0.7 BETA, 5.0.9-5.0.13 | A response splitting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user mount various kinds of attacks including Cross-Site Scripting, Web Cache Poisoning, Browser cache poisoning, Hijack pages, etc.
Upgrades available at: A Proof of Concept exploit has been published. | Phorum HTTP Response Splitting | Medium | Positive Technologies Advisory, SA-20050322, March 22, 2005 |
PHP 4.3.6-4.3.9, 5.0 candidate 1-canidate 3, 5.0 .0-5.0.2 | Multiple vulnerabilities exist: a buffer overflow vulnerability exists in the 'pack()' function, which could let a remote malicious user execute arbitrary code; an integer overflow vulnerability exists in the 'unpack()' function, which could let a remote malicious user obtain sensitive information; a vulnerability exists in 'safe_mode' when executing commands, which could let a remote malicious user bypass the security restrictions; a vulnerability exists in 'safe_mode' combined with certain implementations of 'realpath(),' which could let a remote malicious user bypass security restrictions; a vulnerability exists in 'realpath()' because filenames are truncated; a vulnerability exists in the 'unserialize()' function, which could let a remote malicious user obtain sensitive information or execute arbitrary code; a vulnerability exists in the 'shmop_write()' function, which may result in an attempt to write to an out-of-bounds memory location; a vulnerability exists in the 'addslashes()' function because '\0' if not escaped correctly; a vulnerability exists in the 'exif_read_data()' function when a long sectionname is used, which could let a remote malicious user obtain sensitive information; and a vulnerability exists in 'magic_quotes_gpc,' which could let a remote malicious user obtain sensitive information. Upgrades available at: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" Conectiva: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-031.html"> SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/p/php4/"> Apple:
href="http://www.apple.com/support/downloads/"> FedoraLegacy: Ubuntu: There is no exploit code required; however, a Proof of Concept exploit script has been published. | PHP Multiple Remote Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2004-1018">CAN-2004-1018 | Medium/ High (High if arbitrary code can be executed) | Bugtraq, December 16, 2004 Conectiva Linux Security Announcement, CLA-2005:915, January 13, 2005 Red Hat, Advisory: RHSA-2005:031-08, January 19, 2005 SUSE Security Announcement, SUSE-SA:2005:002, January 17, 2005 Ubuntu Security Notice, USN-66-1, January 20, 2005 Apple Security Update, APPLE-SA-2005-01-25, January 26, 2005 Fedora Legacy Update Advisory, FLSA:2344, March 7, 2005 Ubuntu Security Notice, USN-99-1 March 18, 2005
|
phpAdsNew 2.0.4 -pr1 | A Cross-Site Scripting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. Upgrade available at: There is no exploit code required; however, a | PHPAdsNew AdFrame.PHP | High | Security Focus, 12803, March 14, 2005 Security Focus, 12803, March 16, 2005 |
PHP-Fusion 4.00, 4.0 1, 5.0 1 Service Pack, 5.0 | A vulnerability has been reported in the 'setuser.php' script due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary code.
Patch available at: An exploit script has been published. | PHP-Fusion Setuser.PHP HTML Injection | High | Security Focus, 12853, March 18, 2005 |
phpmyfamily 1.4 | Multiple SQL injection vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary SQL commands.
No workaround or patch available at time of publishing. There is no exploit code required; however, a | PHPMyFamily Multiple SQL Injection | High | ADZ Security Team Advisory, March 20, 2005 |
PHPOpenChat 2.3.4, 3.0.1 | Multiple vulnerabilities have been reported: a vulnerability has been reported in 'contrib/yabbse/poc.php' due to insufficient verification of the 'sourcedir' parameter, which could let a remote malicious user execute arbitrary code; a vulnerability has been reported in '/phpopenchat/contrib/phpbb/alternative2/ No workaround or patch available at time of publishing. There is no exploit code required; however, | PHPOpenChat Multiple Remote Code Execution | High | Albania Security Clan Advisory, March 15, 2005 |
Web Forum 0.1-0.3, 0.21, 0.22, 0.32 | Multiple remote input validation vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code and a vulnerability has been reported which could let a remote malicious user spoof usernames.
Upgrades available at: There is no exploit code required. | PHP-Post Multiple Remote Input Validation | High | Security Focus, 12845, March 18, 2005 |
PunBB 1.2.3 | A vulnerability has been reported due to insufficient validation of the 'email' and 'Jabber' fields, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PunBB Input Validation | High | Security Tracker Alert, 1013446, March 16, 2005 |
RealPlayer prior to 6.0.12.1059 | A vulnerability in the processing of WAV files could let a remote malicious user execute arbitrary code. A special WAV file could trigger a buffer overflow and execute arbitrary code. Updates available at: RedHat: Currently we are not aware of any exploits for this vulnerability. | RealNetworks RealPlayer href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0611">CAN-2005-0611 | High | RealPlayer Release Notes March 1, 2005 SUSE-SA:2005:014, March 9, 2005 RedHat |
RunCMS 1.1 (formerly E-Xoops E-Xoops 1.0 5r3) | Several vulnerabilities have been reported: a vulnerability has been reported in 'highlight.php' due to insecure storage of sensitive information, which could let a malicious user obtain sensitive information; and a vulnerability has been reported in the 'convertorderbytrans()' function in 'viewcat.php', which could let a remote malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required; however, a | RunCMS Information Disclosures | Medium | IHS Iran Hackers Sabotage Public advisory, March 18, 2005 |
DSL Modem SMDK8947v1.2 | Multiple vulnerabilities have been reported: a vulnerability has been reported due to a failure to block access to sensitive files, which could let a remote malicious user obtain sensitive information; and a vulnerability has been reported due to a default backdoor account, which could let a remote malicious user obtain administrative privileges.
No workaround or patch available at time of publishing. There is no exploit code required. | Samsung DSL Modem Multiple Remote Vulnerabilities | Medium/ High (High if administrative access can be obtained) | Security Focus, 12864, March 21, 2005 |
Subdreamer Light 1.0.1-1.0.3, 1.1.3-1.1.5 | A vulnerability has been reported vulnerability in 'index.php' when No workaround or patch available at time of publishing. There is no exploit code required; however, a | Subdreamer SQL Injection | High | GHC Advisory, March 18, 2005 |
Sun Java 2 Runtime Environment 1.3 0_01-1.3 0_05, 1.3 .0, 1.3.1 _08, 1.3.1 _04, 1.3.1 _01a, 1.3.1 _01, 1.3.1, 1.4.1, 1.4.2 _01-1.4.2 _06, 1.4.2, Java Web Start 1.2 | A vulnerability has been reported due to insufficient validation of user-supplied input before considered as trusted, which could let a remote malicious user obtain obtain elevated privileges.
Upgrades available at: Currently we are not aware of any exploits for this vulnerability. | Sun Java Web Start System Remote Unauthorized Access | Medium | Sun(sm) Alert Notification, 57740, March 16, 2005 |
Symantec Enterprise Firewall 7.0 Solaris, 7.0 NT/2000, 8.0 Solaris. 8.0 NT/2000, Gateway Security 5300, 5300 1.0, 5400 2.0, 2.0.1, VelociRaptor 1100, 1100 1.5, 1200, r 1200 1.5, 1300, 1300 1.5 | A vulnerability has been reported in the DNS proxy (DNSd) due to an unspecified error. which could let a remote malicious user poison the DNS cache.
Hotfixes available at: Currently we are not aware of any exploits for this vulnerability. | Symantec Gateway Security Remote DNS Cache Poisoning | Medium | Symantec Security Advisory, SYM05-005 March 15, 2005 |
TRG News 3.0 | A vulnerability has been reported due to insufficient validation of several scripts which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. There is no exploit code required; however, | TRG News Script Arbitrary Code Execution | High | [In]Security Research Advisory, March 20, 2005 |
ZPanel 2.0, 2.5 beta9 & beta 10, 2.5 beta | Multiple vulnerabilities have been reported: a vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'uname' parameter, which could let a remote malicious user execute arbitrary SQL code; and a vulnerability has been reported because installation scripts are not properly removed after installation, which could let a remote malicious user reinstall an affected installation. No workaround or patch available at time of publishing. There is no exploit code required; however, | ZPanel Multiple SQL Injection and File Include | High | Secunia Advisory, SA14602, March 16, 2005 |
href="#top">[back to top]Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script | Script name | Workaround or Patch Available | Script Description |
March 22, 2005 | dbmac-0.2.tar.gz | N/A | A database of MAC prefixes for spoofing your MAC address in Linux. Ideal for in war driving situations. |
March 22, 2005 | goodtech.c gtscrash.c.txt | No | Proof of Concept exploit for the GoodTech Systems Telnet Server for Windows NT/2000/XP/2003 Remote Buffer Overflow vulnerability. |
March 22, 2005 | krad.c | Yes | Script that exploits the Linux Kernel SYS_EPoll_Wait Elevated Privileges vulnerability. |
March 22, 2005 | mailenable.tar.gz | No | Denial of service exploit for the MailEnable Standard SMTP Format String Vulnerability. |
March 22, 2005 | phpMyFamily140.txt | No | Proof of Concept exploit for the PHPMyFamily Multiple SQL Injection vulnerability. |
March 22, 2005 | psnup.pl.txt | No | Proof of Concept exploit for PostScript utility vulnerability. |
March 22, 2005 | pwned.c | Yes | Script that exploits the Linux Kernel uselib() Root Privileges vulnerability. |
March 22, 2005 | rkhunter-1.2.3.tar.gz | N/A | Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. |
March 22, 2005 | szapper.c | N/A | StealthZapper is a less-detectable log wiper that attempts to leave wtmp and utmp "cleaner" looking by not simply leaving a blank hole where the offending data was deleted from. |
March 21, 2005 | funlabsboom.zip | No | Proof of Concept exploit for the FUN labs Games Denial of Service Vulnerability. |
March 21, 2005 | ocean_poc.pl | Yes | Perl script that exploits the Code Ocean Ocean FTP Server Remote Denial of Service vulnerability. |
March 21, 2005 | xosx-cf.c | Yes | Script that exploits the Apple Mac OS X Multiple Vulnerabilities. |
March 19, 2005 | phpbbexp.cpp phpBBsession.txt | No | Exploit for the phpbb vulnerability. |
March 19, 2005 | PHP-Fusion_Exploit.txt | Yes | Exploit for the PHP-Fusion 'Setuser.PHP' HTML Injection vulnerability. |
March 18, 2005 | PHPOC_XSS.txt | No | Proof of Concept exploit for the PHPOpenChat Multiple HTML Injection vulnerabilities. |
March 17, 2005 | activeCam.txt | No | Exploit for the PY Software Active Webcam Webserver Remote Denials of Service & Information Disclosure vulnerability. |
March 17, 2005 | eth2.c | Yes | Exploit for the Ethereal IAPP dissector remote buffer overflow vulnerability. |
March 17, 2005 | ethereal-3g-a11.c | Yes | Proof of Concept remote root exploit for the Ethereal CDMA2000 A11 protocol dissector stack overflow vulnerability. |
March 17, 2005 | IdaPOC.zip | No | Proof of Concept exploit for the IDA Pro Format String Vulnerability. |
March 17, 2005 | iPool.c | No | Script that exploits the ThePoolClub IPool Insecure Local Credential Storage vulnerability. |
March 17, 2005 | iSnooker.c | No | Script that exploits the ThePoolClub ISnooker Insecure Local Credential Storage vulnerability. |
March 17, 2005 | luxman_ex2.pl | Yes | Exploit for the Frank McIngvale LuxMan Buffer Overflow vulnerability. |
March 17, 2005 | platinumDoS.c | No | Perl script that exploits the PlatinumFTPServer Malformed User Name Connection Remote Denial of Service vulnerability. |
March 17, 2005 | silentdoor.tar.gz | N/A | A connectionless, PCAP-based backdoor for linux that uses packet sniffing to bypass netfilter. |
name=trends>Trends
- A hack was revealed by Netcraft, a UK security company, that attempts to hijack a website frame on a legitimate banking site. The new 'cross-frame' scripting approach injects content onto a real web page which makes it difficult to detect. For more information, see "New style of phishing attack discovered" located at: http://www.techworld.com/security/news/index.cfm?NewsID=3348.
- According to latest Symantec Internet Security Threat Report, the UK has more than a quarter (25.2 per cent) of all bots virus-infected, zombie PCs under the control of crackers and used for malicious purposes like identity theft and online fraud with the US (24.6 percent) and China (7.8 percent) in second and third place. For more information, see "Britain tops zombie PC charts" located at: http://www.securityfocus.com/news/10730 and Symantec Report: http://enterprisesecurity.symantec.com/content.cfm?articleid=1539 .
- Symantec's biannual Internet Security Threat Report said one of the fastest-growing threats is from "phishing" attacks, which lure people to Web sites that appear to be owned by banks or other firms and dupe them into giving passwords, credit card numbers or other key information. Viruses, spam and other computer security threats are growing at a rapid rate, much of it aimed at stealing personal or confidential information. For more information, see: " Hacker Threats, Spam Still Growing" located at: http://www.newsfactor.com/story.xhtml?story_title=Hacker_Threats__Spam_Still_Growing&story_id=31581 and Symantec Report: http://enterprisesecurity.symantec.com/content.cfm?articleid=1539 .
- According to summit attendees at the second annual "Wireless On Wall Street" conference, encrypted fully authenticated wireless network remains high on the list. Financial-services companies are under constant pressure from customers and employees to implement wireless technology because of the convenience it offers. For more information, see " Wireless Security Top Concern For Financial Companies" located at:
http://www.informationweek.com/story/showArticle.jhtml?articleID=159903610&tid=13692 - Worms and viruses are increasingly infecting wireless phones, PDAs and other devices. Even though mobile viruses, to date, haven't caused considerable damage to enterprises, there is reason for concern. A recent survey conducted by security specialist netSurity for RSA Security Inc. found that in the business district of London, the number of wireless LANs increased by 62% in 2004, with access points growing to 1,751 from 1,078. At the same time, security on the wireless networks got worse, leaving 36% of the companies open to potential attack, up from 25% in 2003. For more information see, "IT managers need to prepare for mobile viruses" located at: http://www.computerworld.com/mobiletopics/mobile/story/0,10801,100409,00.html
- Instant messaging (IM) security threats are growing by 50 percent each month and could potentially spread across the globe in seconds. According to research from anti-virus firm F-Secure, virus writers are targeting instant messaging application due to their ability to spread malicious code faster than email worms. For more information, see "IM viruses increase by 50% a month" located at: http://www.vnunet.com/news/1162017
- Federal and state law enforcement officials say sophisticated criminals have begun to use the unsecured Wi-Fi networks of unsuspecting consumers and businesses to help cover their tracks in cyberspace. Experts say most households with Wi-Fi connections never turn on any of the features, available in almost all Wi-Fi routers, that change the system's default settings, conceal the connection from others and encrypt the data sent over it. For more information, see "Growth of wireless Internet opens new path for thieves" located at: http://www.nytimes.com/2005/03/19/technology/19wifi.html.
- Kaspersky Labs said there is evidence that a battle is shaping up between rival cyber gangs over the newest turf, infectable PCs. A new Trojan -- dubbed Small.bi -- removes a number of .exe files associated with Trojan-like names before it installs itself.For more information, see "Hacker turf war will lead to large e-crime gangs" located at: http://www.techweb.com/wire/security/159902363.
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trends |
face="Arial, Helvetica, sans-serif">Date |
1 | Netsky-P | Win32 Worm | Stable | March 200 face="Arial, Helvetica, sans-serif">4 |
2 | Bagle-BJ | Win32 Worm | Stable | January 2005 |
3 | Zafi-D | Win32 Worm | Stable | December 2004 |
4 | Netsky-Q | Win32 Worm | Stable | March 2004 |
5 | Zafi-B | Win32 Worm | Stable | June 2004 |
6 | Netsky-D | Win32 Worm | Stable | March 2004 |
7 | Netsky-Z | Win32 Worm | Stable | April 2004 |
8 | Netsky-B | Win32 Worm | Stable | February 2004 |
9 | Bagle-AU | Win32 Worm | Stable | October 2004 |
10 | Bagle.BB | Win32 Worm | Stable | September 2004 |
face="Arial, Helvetica, sans-serif"> face="Arial, Helvetica, sans-serif"> face="Arial, Helvetica, sans-serif">Table Updated March 22, 2005
Viruses or Trojans Considered to be a High Level of Threat
- Nothing significant to report.
The following table provides, in alphabetical order, a list of new viruses, variations of previously encountered viruses, and Trojans that have been discovered during the period covered by this bulletin. This information has been compiled from the following anti-virus vendors: Sophos, Trend Micro, Symantec, McAfee, Network Associates, Central Command, F-Secure, Kaspersky Labs, MessageLabs, Panda Software, Computer Associates, and The WildList Organization International. Users should keep anti-virus software up to date and should contact their anti-virus vendors to obtain specific information on the Trojans and Trojan variants that anti-virus software detects.
NOTE: At times, viruses and Trojans may contain names or content that may be considered offensive.
face="Arial, Helvetica, sans-serif">
Name |
face="Arial, Helvetica, sans-serif">Aliases |
face="Arial, Helvetica, sans-serif">Type |
Backdoor.Tuimer | Trojan | |
Crowt.B | W32/Crowt.B.worm | Win32 Worm |
Del-470 | Del-471 TR/KillFiles.HQ Trj/Delfiles.R Troj/Cyberno-A Trojan.KillFiles.HQ Trojan.Win32.KillFiles.hq TROJ_KILLFILE.HQ W32/Killfiles.H Win32.KillFiles.AF | Trojan |
Downloader.Newest | Trojan | |
Drever.A | SymbOS/Drever SymbOS/Drever.A SYMBOS_DREVER.A | Symbian OS Worm |
Drever.B | SymbOS/Drever.B | Symbian OS Worm |
Drever.C | SymbOS/Drever.C | Symbian OS Worm |
Locknut.B | SymbOS/Locknut.B | Symbian OS Worm |
Mydoom.BH | W32/Mydoom.BH.worm | Win32 Worm |
Mytob.E | W32/Mytob.E.worm | Win32 Worm |
Proxy-Agent.e | Troj/Iyus-H Trojan Trojan-Proxy.Win32.Agent.di TROJ_MSGINA.B Win32.Reign.AO | Trojan |
PWSteal.Bancos.R | Trojan | |
PWSteal.Bancos.S | Trojan-Downloader.Win32.Dadobra.n | Trojan |
Skulls.F | SymbOS/Skulls.F | Symbian OS Worm |
StartPage-GT | Win32 Worm | |
Troj/BagDl-Gen | Trojan | |
Troj/Bancos-BU | TROJ_BANCOS.SE Trojan-Spy.Win32.Banker.lw | Trojan |
Troj/Banker-BZ | Trojan | |
Troj/Banker-HE | Trojan-Spy.Win32.Banker.he | Trojan |
Troj/Dloader-JQ | Trojan | |
Troj/Feutel-B | Backdoor.Win32.Hupigon.j | Trojan |
Troj/HideDial-D | Trojan-Downloader.Win32.Tibser.c Trojan.Downloader.Tibser-3 | Trojan |
TROJ_ASH.A | Ash PWSteal.Bankash.D Troj/BankAsh-C | Trojan |
TROJ_ASH.B | PWS-Banker.j.dll PWSteal.Bankash.D Win32.Bankash.D | Trojan |
Trojan.Alpiok | Trojan | |
Trojan.Domcom | Troj/Domcom-C TROJ_DOMCOM.D | Trojan |
Trojan.Eaghouse | Trojan | |
Trojan.Eaghouse.B | Trojan | |
Trojan.Goldun.D | Trojan | |
Trojan.Magise | Trojan | |
Trojan.Mdropper | Trojan | |
Trojan.Prevert | Trojan | |
Trojan.Sientok | Trojan | |
VBS.Scafene@mm | Visual Basic Worm | |
VBS/LoveLet-AA | Visual Basic Worm | |
W32.Kelvir.I | Win32 Worm | |
W32.Mydoom.BG@mm | Win32 Worm | |
W32.Mytob.H@mm | Win32 Worm | |
W32.Mytob.I@mm | Win32 Worm | |
W32.Randex.CZZ | Win32 Worm | |
W32.Serflog.C | W32/Crog.worm WORM_FATSO.C | Win32 Worm |
W32/Demotrayo.worm | Email-Worm.Win32.LovGate.W Trojan.Win32.Dtray.a Win32.HLLW.Demot | Win32 Worm |
W32/Domwis-I | Backdoor.Win32.Wisdoor.ao BackDoor-AOZ | Win32 Worm |
W32/MyDoom-BH | Win32 Worm | |
W32/Myfip-K | W32/Myfip.worm.q WORM_MYFIP.I | Win32 Worm |
W32/Mytob-B | Win32 Worm | |
W32/Netsky-AD | Win32 Worm | |
W32/Poebot-K | Win32 Worm | |
W32/Rbot-YB | backdoor.win32.rbot.gen w32/sdbot.worm.gen.i worm_rbot.aub worm_rbot.gen trojan.mybot.gen-77 | Win32 Worm |
W32/Rbot-YN | Backdoor.Win32.Rbot.lp W32/Sdbot.worm.gen.h | Win32 Worm |
W32/Rbot-YO | Win32 Worm | |
W32/Rbot-YV | Win32 Worm | |
W32/Rbot-YY | Backdoor.Win32.Rbot.lm | Win32 Worm |
W32/Sdbot-SB | Win32 Worm | |
W32/Sdbot-WE | Backdoor.Win32.SdBot.gen | Win32 Worm |
W32/Sumom-C | M-Worm.Win32.Sumom.c | Win32 Worm |
Win32.Bropia.U | Win32 Worm | |
Win32.Bropia.V | Win32 Worm | |
Win32.Elitper.A | Win32 Worm | |
Win32.Harbag.X | Win32 Worm | |
Win32.Lioten.KX | Win32 Worm | |
Win32.Mydoom.BI | Win32 Worm | |
Win32.SilentCaller.D | Win32 Worm | |
Win32.Startpage.NS | Win32 Worm | |
WORM_BUCHON.E | W32/Buchon Win32/NewMalware.gen! | Win32 Worm |
WORM_CROWT.B | Win32 Worm | |
WORM_MYDOOM.AT | W32.Mydoom.BG@mm W32/Mydoom W32/MyDoom-BH Win32.Mydoom.BI Win32/Mydoom.AT@mm | Win32 Worm |
WORM_MYTOB.G | W32.Mydoom.gen@mm W32/Mydoom Win32.Mytob.G | Win32 Worm |
WORM_MYTOB.H | Exploit-DcomRpc W32.Mydoom.gen@mm Win32.Lioten | Win32 Worm |
WORM_TOXBOT.A | MS03-026_Exploit!Trojan W32.Toxbot Win32.Toxbot.W Worm:Win32/Codbot.L | Win32 Worm |
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.