ISS Security Alert Summary AS03-24

From: X-Force (xforce_at_iss.net)
Date: 06/16/03

  • Next message: Brass, Phil (ISS Atlanta): "RE: Honeypot detection and countermeasures"
    To: alert@iss.net
    Date: Mon, 16 Jun 2003 14:28:37 -0400 (EDT)
    
    

    -----BEGIN PGP SIGNED MESSAGE-----

    Internet Security Systems Security Alert Summary AS03-24
    June 16, 2003

    X-Force Vulnerability and Threat Database:
    http://www.iss.net/security_center

    To receive these Alert Summaries, as well as other Alerts and
    Advisories, subscribe to the Internet Security Systems Alert
    mailing list at:
    http://www.iss.net/security_center/maillists

    This summary is available at the following address:
    http://www.iss.net/security_center/alerts/AS03-24.php
    _____
    Contents:
    * 62 Reported Vulnerabilities
    * Risk Factor Key
    _____

    Date Reported: 06/05/2003
    Brief Description: Novell iChain login buffer overflow
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: iChain 2.2, Linux Any version, Novell NetWare Any
                        version, Solaris Any version, Windows Any version
    Vulnerability: ichain-login-bo
    X-Force URL: http://www.iss.net/security_center/static/12207.php

    Date Reported: 06/06/2003
    Brief Description: Sun JDK/JRE/SDK untrusted Applet could access
                        restricted resources
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Solaris Any version, Sun JDK
                        1.1.8_008 and prior, Sun JDK 1.1.8_14 and earlier,
                        Sun JRE 1.3.0_05 and earlier, Sun JRE 1.3.1_02 and
                        earlier, Sun SDK 1.2.2_010 and prior, Sun SDK
                        1.3.0_05 and earlier, Sun SDK 1.3.1_02 and earlier,
                        Windows Any version
    Vulnerability: sun-applet-resources-access
    X-Force URL: http://www.iss.net/security_center/static/12210.php

    Date Reported: 06/06/2003
    Brief Description: Sun JDK/JRE/SDK untrusted Applet could access HTTP
                        request properties
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Solaris Any version, Sun JDK
                        1.1.8_008 and prior, Sun JDK 1.1.8_14 and earlier,
                        Sun JRE 1.2.2_011 and prior, Sun JRE 1.3.0_05 and
                        earlier, Sun JRE 1.3.1_02 and earlier, Sun SDK
                        1.2.2_011 and prior, Sun SDK 1.3.0_05 and earlier,
                        Sun SDK 1.3.1_02 and earlier, Windows Any version
    Vulnerability: sun-applet-properties-access
    X-Force URL: http://www.iss.net/security_center/static/12211.php

    Date Reported: 06/06/2003
    Brief Description: Sun JRE/SDK untrusted Applet could allow access to
                        authentication credentials
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Solaris Any version, Sun JRE
                        1.2.2_014 or earlier, Sun JRE 1.3.1_06 and earlier,
                        Sun JRE 1.4.0_03 and earlier, Sun JRE 1.4.1_01 and
                        earlier, Sun SDK 1.2.2_014 or earlier, Sun SDK
                        1.3.1_06 and earlier, Sun SDK 1.4.0_03 and earlier,
                        Sun SDK 1.4.1_01 and earlier, Windows Any version
    Vulnerability: sun-applet-authentication-access
    X-Force URL: http://www.iss.net/security_center/static/12212.php

    Date Reported: 06/05/2003
    Brief Description: zenTrack index.php PHP file include
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Unix Any version, Windows Any
                        version, zenTrack 2.4.1 and earlier
    Vulnerability: zentrack-index-file-include
    X-Force URL: http://www.iss.net/security_center/static/12213.php

    Date Reported: 06/06/2003
    Brief Description: zenTrack debug or demo mode could allow an attacker
                        to obtain information
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Unix Any version, Windows Any
                        version, zenTrack 2.4.1 and earlier
    Vulnerability: zentrack-debug-obtain-information
    X-Force URL: http://www.iss.net/security_center/static/12214.php

    Date Reported: 06/06/2003
    Brief Description: Debian Linux gzip znew script temporary file
                        symlink attack
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Debian Linux 2.2, Debian Linux 3.0, Gentoo Linux
                        Any version, OpenPKG 1.1, OpenPKG 1.2, OpenPKG
                        CURRENT
    Vulnerability: gzip-znew-tmpfile-symlink
    X-Force URL: http://www.iss.net/security_center/static/12215.php

    Date Reported: 06/06/2003
    Brief Description: zenTrack index.php directory traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Unix Any version, Windows Any
                        version, zenTrack 2.4.1 and earlier
    Vulnerability: zentrack-index-directory-traversal
    X-Force URL: http://www.iss.net/security_center/static/12216.php

    Date Reported: 06/09/2003
    Brief Description: Mailtraq .asp file source disclosure
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Mailtraq Any version, Windows Any version
    Vulnerability: mailtraq-asp-source-disclosure
    X-Force URL: http://www.iss.net/security_center/static/12217.php

    Date Reported: 06/09/2003
    Brief Description: Multiple vendor Ethernet network device driver TCP
                        packet information leak
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Unix Any version, Windows Any
                        version
    Vulnerability: ethernet-tcp-information-leak
    X-Force URL: http://www.iss.net/security_center/static/12218.php

    Date Reported: 06/09/2003
    Brief Description: Mailtraq browse.asp path disclosure
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Mailtraq 2.3.0.1413, Windows Any version
    Vulnerability: mailtraq-browse-path-disclosure
    X-Force URL: http://www.iss.net/security_center/static/12219.php

    Date Reported: 06/09/2003
    Brief Description: Mailtraq browse.asp cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Mailtraq Any version, Windows Any version
    Vulnerability: mailtraq-browse-xss
    X-Force URL: http://www.iss.net/security_center/static/12220.php

    Date Reported: 06/09/2003
    Brief Description: Nokia GGSN IP packet denial of service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: GGSN release 1
    Vulnerability: nokia-ggsn-ip-dos
    X-Force URL: http://www.iss.net/security_center/static/12221.php

    Date Reported: 06/09/2003
    Brief Description: Synkron.web search module cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Synkron.web 3, Windows Any version
    Vulnerability: synkronweb-search-xss
    X-Force URL: http://www.iss.net/security_center/static/12222.php

    Date Reported: 06/09/2003
    Brief Description: Linux kernel large ICMP citations memory leak
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Linux kernel 2.0 through 2.0.39
    Vulnerability: linux-kernel-memory-leak
    X-Force URL: http://www.iss.net/security_center/static/12223.php

    Date Reported: 06/09/2003
    Brief Description: Multiple vendor implementations of Java Virtual
                        Machine jpsock symlink attack
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux Any version, Solaris Any version, Windows Any
                        version
    Vulnerability: jvm-jpsock-symlink
    X-Force URL: http://www.iss.net/security_center/static/12224.php

    Date Reported: 06/08/2003
    Brief Description: FlashFXP PASV command overly long IP address buffer
                        overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: FlashFXP 2.0 build 905, Windows Any version
    Vulnerability: flashfxp-pasv-ip-bo
    X-Force URL: http://www.iss.net/security_center/static/12225.php

    Date Reported: 06/08/2003
    Brief Description: FlashFXP long hostname buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: FlashFXP 2.0 build 905, Windows Any version
    Vulnerability: flashfxp-long-hostname-bo
    X-Force URL: http://www.iss.net/security_center/static/12226.php

    Date Reported: 06/08/2003
    Brief Description: FTP Voyager file list buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: FTP Voyager prior to 10.0.0.1, Windows 98SE JP,
                        Windows 2000 Pro SP3 JP
    Vulnerability: ftp-voyager-filelist-bo
    X-Force URL: http://www.iss.net/security_center/static/12227.php

    Date Reported: 06/08/2003
    Brief Description: SmartFTP overly long directory name PWD command
                        response buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: SmartFTP 1.0.973, Windows Any version
    Vulnerability: smartftp-pwd-directory-bo
    X-Force URL: http://www.iss.net/security_center/static/12228.php

    Date Reported: 06/09/2003
    Brief Description: Spyke's PHP Board stores usernames and passwords in
                        plain text
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Linux Any version, PHP Any version, Spyke's PHP
                        Board 2.1, Unix Any version, Windows Any version
    Vulnerability: spyke-phpboard-plaintext-password
    X-Force URL: http://www.iss.net/security_center/static/12229.php

    Date Reported: 06/09/2003
    Brief Description: H-Sphere error page cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: BSD Any version, H-Sphere 2.0.x, H-Sphere 2.1.x, H-
                        Sphere 2.2.x, H-Sphere 2.3.x, Linux Any version,
                        Windows 2000 Any version
    Vulnerability: hsphere-error-page-xss
    X-Force URL: http://www.iss.net/security_center/static/12230.php

    Date Reported: 06/08/2003
    Brief Description: SmartFTP long LIST command response buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: SmartFTP 1.0.973, Windows Any version
    Vulnerability: smartftp-long-list-bo
    X-Force URL: http://www.iss.net/security_center/static/12231.php

    Date Reported: 06/10/2003
    Brief Description: Nuca WebServer "dot dot" directory traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Nuca WebServer 0.01, Unix Any
                        version, Windows Any version
    Vulnerability: nuca-webserver-directory-traversal
    X-Force URL: http://www.iss.net/security_center/static/12232.php

    Date Reported: 06/08/2003
    Brief Description: LeapFTP PASV command overly long IP address buffer
                        overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: LeapFTP 2.7.3.600, Windows Any version
    Vulnerability: leapftp-pasv-ip-bo
    X-Force URL: http://www.iss.net/security_center/static/12233.php

    Date Reported: 06/09/2003
    Brief Description: HP-UX pcltotiff strcopy() function buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: HP-UX 10.20
    Vulnerability: hp-pcltotiff-strcopy-bo
    X-Force URL: http://www.iss.net/security_center/static/12234.php

    Date Reported: 06/04/2003
    Brief Description: Ability Mail Server stores usernames and passwords
                        in plain text in the accounts.dta file
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Ability Mail Server 1.0.9, Windows Any version
    Vulnerability: ability-accounts-plaintext-passwords
    X-Force URL: http://www.iss.net/security_center/static/12236.php

    Date Reported: 06/03/2003
    Brief Description: Novell NetWare HTTPSTK.NLM module denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Novell NetWare 6.x
    Vulnerability: netware-httpstk-dos
    X-Force URL: http://www.iss.net/security_center/static/12239.php

    Date Reported: 06/04/2003
    Brief Description: Unicenter TNG file_upload.pl script command
                        execution
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, UnicenterTNG 2.1, UnicenterTNG
                        2.4, UnicenterTNG 2.4.2, Unix Any version, Windows
                        Any version
    Vulnerability: unicentertng-fileupload-execute-code
    X-Force URL: http://www.iss.net/security_center/static/12240.php

    Date Reported: 06/10/2003
    Brief Description: SGI IRIX PIOCSWATCH ioctl() denial of service
    Risk Factor: Low
    Attack Type: Host Based
    Platforms: IRIX prior to 6.5.21
    Vulnerability: irix-piocswatch-ioctl-dos
    X-Force URL: http://www.iss.net/security_center/static/12241.php

    Date Reported: 06/04/2003
    Brief Description: Unicenter TNG pdm_cgireport.exe unauthorized access
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, UnicenterTNG 2.1, UnicenterTNG
                        2.4, UnicenterTNG 2.4.2, Unix Any version, Windows
                        Any version
    Vulnerability: unicentertng-pdmcgireport-unauth-access
    X-Force URL: http://www.iss.net/security_center/static/12242.php

    Date Reported: 06/09/2003
    Brief Description: Mac OS X Apple File Service (AFS) on UFS or NFS may
                        overwrite files
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Mac OS X Server 10.2.6 and earlier
    Vulnerability: macos-afs-ufs-nfs-overwrite-files
    X-Force URL: http://www.iss.net/security_center/static/12243.php

    Date Reported: 06/04/2003
    Brief Description: Unicenter TNG pdmcgi.exe could allow an attacker to
                        view requests
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, UnicenterTNG 2.1, UnicenterTNG
                        2.4, UnicenterTNG 2.4.2, Unix Any version, Windows
                        Any version
    Vulnerability: unicentertng-pdmcgi-view-requests
    X-Force URL: http://www.iss.net/security_center/static/12245.php

    Date Reported: 06/02/2003
    Brief Description: CDE libDtHelp could allow an attacker to gain
                        privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: HP-UX 10.20, HP-UX 11.00, HP-UX 11.04, HP-UX 11.11,
                        HP-UX 11.22
    Vulnerability: cde-libdthelp-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12246.php

    Date Reported: 06/02/2003
    Brief Description: CDE libDtSvc could allow an attacker to gain
                        privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: HP-UX 10.20, HP-UX 11.00, HP-UX 11.04, HP-UX 11.11,
                        HP-UX 11.22
    Vulnerability: cde-libdtsvc-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12247.php

    Date Reported: 06/04/2003
    Brief Description: Unicenter Asset Management weak password encryption
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Unicenter Asset Management Any
                        version, Unix Any version, Windows Any version
    Vulnerability: unicenter-weak-password-encryption
    X-Force URL: http://www.iss.net/security_center/static/12248.php

    Date Reported: 06/04/2003
    Brief Description: Microsoft Internet Explorer FTP implementation
                        "classic view" cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Microsoft Internet Explorer 5.01, Microsoft
                        Internet Explorer 5.5, Microsoft Internet Explorer
                        6.0, Windows Any version
    Vulnerability: ie-ftp-classic-xss
    X-Force URL: http://www.iss.net/security_center/static/12249.php

    Date Reported: 06/05/2003
    Brief Description: Novell iChain long username buffer overflow
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: iChain 2.2, Linux Any version, Solaris Any version,
                        Windows Any version
    Vulnerability: ichain-long-username-bo
    X-Force URL: http://www.iss.net/security_center/static/12250.php

    Date Reported: 06/11/2003
    Brief Description: Mollensoft FTP Server FTP command buffer overflow
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Mollensoft FTP Server 3.5.2, Windows Any version
    Vulnerability: mollensoft-ftp-command-bo
    X-Force URL: http://www.iss.net/security_center/static/12252.php

    Date Reported: 06/11/2003
    Brief Description: mnoGoSearch search.cgi "ul" parameter buffer
                        overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, mnoGoSearch 3.1.20, mnoGoSearch
                        3.2.10, Unix Any version
    Vulnerability: mnogosearch-search-ul-bo
    X-Force URL: http://www.iss.net/security_center/static/12253.php

    Date Reported: 06/11/2003
    Brief Description: mnoGoSearch search.cgi "tmplt" parameter buffer
                        overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, mnoGoSearch 3.1.20, mnoGoSearch
                        3.2.10, Unix Any version
    Vulnerability: mnogosearch-search-tmplt-bo
    X-Force URL: http://www.iss.net/security_center/static/12254.php

    Date Reported: 06/05/2003
    Brief Description: NewsPHP Advanced delimiter allows attacker to gain
                        low-level administrative privileges
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, NewsPHP Advanced 216, Unix Any
                        version, Windows Any version
    Vulnerability: newsphp-delimiter-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12255.php

    Date Reported: 06/11/2003
    Brief Description: ArGoSoft Mail Server HTTP GET request buffer
                        overflow
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: ArGoSoft Mail Server 1.8.3.5, Windows 2000 Any
                        version, Windows NT Any version, Windows XP Any
                        version
    Vulnerability: argosoft-http-get-bo
    X-Force URL: http://www.iss.net/security_center/static/12256.php

    Date Reported: 06/11/2003
    Brief Description: Gnocatan multiple buffer overflows
    Risk Factor: High
    Attack Type: Host Based / Network Based
    Platforms: Debian Linux 3.0, Gnocatan Any version
    Vulnerability: gnocatan-multiple-bo
    X-Force URL: http://www.iss.net/security_center/static/12260.php

    Date Reported: 06/11/2003
    Brief Description: Barricade Wireless Cable/DSL Broadband Router
                        packet denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Barricade Wireless Router (SMC7004VWBR) prior to
                        1.23
    Vulnerability: barricade-router-packet-dos
    X-Force URL: http://www.iss.net/security_center/static/12263.php

    Date Reported: 06/12/2003
    Brief Description: ike-scan format string attack
    Risk Factor: High
    Attack Type: Host Based
    Platforms: ike-scan prior to 1.2, Linux Any version, Unix Any
                        version, Windows Any version
    Vulnerability: ike-scan-format-string
    X-Force URL: http://www.iss.net/security_center/static/12276.php

    Date Reported: 06/06/2003
    Brief Description: MaxWebPortal search.asp cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
                        version
    Vulnerability: maxwebportal-search-xss
    X-Force URL: http://www.iss.net/security_center/static/12277.php

    Date Reported: 06/06/2003
    Brief Description: MaxWebPortal could allow an attacker to modify form
                        fields
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
                        version
    Vulnerability: maxwebportal-form-field-modify
    X-Force URL: http://www.iss.net/security_center/static/12278.php

    Date Reported: 06/06/2003
    Brief Description: MaxWebPortal database file access
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
                        version
    Vulnerability: maxwebportal-database-access
    X-Force URL: http://www.iss.net/security_center/static/12279.php

    Date Reported: 06/06/2003
    Brief Description: MaxWebPortal password reset
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, MaxWebPortal 1.30, Windows Any
                        version
    Vulnerability: maxwebportal-password-reset
    X-Force URL: http://www.iss.net/security_center/static/12280.php

    Date Reported: 06/05/2003
    Brief Description: NewsPHP comment cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, NewsPHP Any version, Unix Any
                        version, Windows Any version
    Vulnerability: newsphp-comment-xss
    X-Force URL: http://www.iss.net/security_center/static/12281.php

    Date Reported: 06/12/2003
    Brief Description: silentThought Simple Web Server "dot dot" directory
                        traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: silentThought 1.0, Windows 98, Windows Me, Windows
                        XP, Windows 2000 Any version
    Vulnerability: silentthought-dotdot-directory-traversal
    X-Force URL: http://www.iss.net/security_center/static/12283.php

    Date Reported: 06/12/2003
    Brief Description: WebBBS multiple denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: WebBBS Pro 1.8, Windows Any version
    Vulnerability: webbbs-multiple-dos
    X-Force URL: http://www.iss.net/security_center/static/12287.php

    Date Reported: 06/04/2003
    Brief Description: Cistron RADIUS NAS ports buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Cistron RADIUS Any version, Debian Linux 3.0, SuSE
                        Linux 7.2, SuSE Linux 7.3, SuSE Linux 8.0
    Vulnerability: cistron-radius-nas-bo
    X-Force URL: http://www.iss.net/security_center/static/12290.php

    Date Reported: 06/13/2003
    Brief Description: PostNuke modules.php cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, PostNuke Phoenix 0.7.2.3, Unix
                        Any version, Windows Any version
    Vulnerability: postnuke-modulesphp-xss
    X-Force URL: http://www.iss.net/security_center/static/12291.php

    Date Reported: 06/13/2003
    Brief Description: PostNuke user.php cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, PostNuke Phoenix 0.7.2.3, Unix
                        Any version, Windows Any version
    Vulnerability: postnuke-user-xss
    X-Force URL: http://www.iss.net/security_center/static/12292.php

    Date Reported: 06/12/2003
    Brief Description: Typespeed strcspn() function buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, Typespeed 0.4.1 and earlier
    Vulnerability: typespeed-strcspn-bo
    X-Force URL: http://www.iss.net/security_center/static/12297.php

    Date Reported: 06/13/2003
    Brief Description: Progress Database dlopen() allows attacker to gain
                        privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux Any version, Progress Database 9.1D through
                        9.1D06, Unix Any version
    Vulnerability: progress-dlopen-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12300.php

    Date Reported: 06/13/2003
    Brief Description: Progress Database _dbagent allows attacker to gain
                        privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux Any version, Progress Database 9.1D through
                        9.1D06, Unix Any version
    Vulnerability: progress-dbagent-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12301.php

    Date Reported: 06/13/2003
    Brief Description: MikMod long file name buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Debian Linux 2.2, Debian Linux 3.0, MikMod Any
                        version
    Vulnerability: mikmod-long-filename-bo
    X-Force URL: http://www.iss.net/security_center/static/12302.php

    Date Reported: 06/14/2003
    Brief Description: pMachineFree lib.inc.php PHP file include
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, pMachineFree 2.2.1, Unix Any
                        version, Windows Any version
    Vulnerability: pmachinefree-php-file-include
    X-Force URL: http://www.iss.net/security_center/static/12303.php

    Date Reported: 06/15/2003
    Brief Description: LedNews message cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: LedNews 0.7, Linux Any version, Unix Any version,
                        Windows Any version
    Vulnerability: lednews-message-xss
    X-Force URL: http://www.iss.net/security_center/static/12304.php

    _____

    Risk Factor Key:

         High Security issues that allow immediate remote, or local access
                  or immediate execution of code or commands, with unauthorized
                  privileges. Examples are most buffer overflows, backdoors,
                  default or no password, and bypassing security on firewalls
                  or other network components.
         Medium Security issues that have the potential of granting access or
                  allowing code execution by means of complex or lengthy exploit
                  procedures, or low risk issues applied to major Internet
                  components. Examples are cross-site scripting, man-in-the-middle
                  attacks, SQL injection, denial of service of major applications,
                  and denial of service resulting in system information disclosure
                  (such as core files).
         Low Security issues that deny service or provide non-system
                  information that could be used to formulate structured attacks
                  on a target, but not directly gain unauthorized access. Examples
                  are brute force attacks, non-system information disclosure
                  (configurations, paths, etc.), and denial of service attacks.

    ______

    About Internet Security Systems (ISS)
    Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
    pioneer and world leader in software and services that protect critical
    online resources from an ever-changing spectrum of threats and misuse.
    Internet Security Systems is headquartered in Atlanta, GA, with
    additional operations throughout the Americas, Asia, Australia, Europe
    and the Middle East.

    Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved
    worldwide.

    Permission is hereby granted for the electronic redistribution of this
    document. It is not to be edited or altered in any way without the
    express written consent of the Internet Security Systems X-Force. If you
    wish to reprint the whole or any part of this document in any other
    medium excluding electronic media, please email xforce@iss.net for
    permission.

    Disclaimer: The information within this paper may change without notice. Internet
    Security Systems provides this information on an AS IS basis with NO warranties,
    implied or otherwise. Any use of this information is at the userís risk. In no event
    shall Internet Security Systems be held liable for any damages whatsoever arising
    out of or in connection with the use or dissemination of this information.

    X-Force PGP Key available on MIT's PGP key server and PGP.com's key server,
    as well as at http://www.iss.net/security_center/sensitive.php

    Please send suggestions, updates, and comments to: X-Force
    xforce@iss.net of Internet Security Systems, Inc.

    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2

    iQCVAwUBPu4L+TRfJiV99eG9AQHkAgQAp4gw1t1iq9SKFJvHhdkWTe03GHpA70J5
    2k4lMD9X08l90E5QGYn17XJIMT1GYLaF6GSVl+EJAWdcS3x1ojO5MMHZuZQ7cZtw
    nljaa5Cq/qKV8oxYkkqrHiQfS6dGj2pPTHxjK/cuSkVoxpqVNfZ8no0owg/KkNLG
    iOlKcS42o88=
    =wxLc
    -----END PGP SIGNATURE-----


  • Next message: Brass, Phil (ISS Atlanta): "RE: Honeypot detection and countermeasures"