ISS Security Alert Summary AS03-28

From: X-Force (xforce_at_iss.net)
Date: 07/14/03

  • Next message: X-Force: "Flaw in Microsoft Windows RPC Implementation"
    To: alert@iss.net
    Date: Mon, 14 Jul 2003 14:35:31 -0400 (EDT)
    
    

    -----BEGIN PGP SIGNED MESSAGE-----

    Internet Security Systems Security Alert Summary AS03-28
    July 14, 2003

    X-Force Vulnerability and Threat Database:
    http://www.iss.net/security_center

    To receive these Alert Summaries, as well as other Alerts and
    Advisories, subscribe to the Internet Security Systems Alert
    mailing list at:
    http://www.iss.net/security_center/maillists

    This summary is available at the following address:
    http://www.iss.net/security_center/alerts/AS03-28.php
    _____
    Contents:
    * 61 Reported Vulnerabilities
    * Risk Factor Key
    _____

    Date Reported: 07/04/2003
    Brief Description: Trillian TypingUser denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Trillian 0.74, Trillian Pro 1.0, Windows Any
                        version
    Vulnerability: trillian-typinguser-dos
    X-Force URL: http://www.iss.net/security_center/static/12507.php

    Date Reported: 07/06/2003
    Brief Description: cPanel Error Log and Latest Visitors page cross-
                        site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: cPanel 6.4.2, Linux Any version
    Vulnerability: cpanel-multiple-xss
    X-Force URL: http://www.iss.net/security_center/static/12508.php

    Date Reported: 07/03/2003
    Brief Description: Xbox Dashboard integer underflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Windows Any version, Xbox Any version
    Vulnerability: xbox-dashboard-integer-underflow
    X-Force URL: http://www.iss.net/security_center/static/12509.php

    Date Reported: 07/06/2003
    Brief Description: Axis Web interface of Axis 560 and Axis
                        5600+ print servers denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: AXIS 560 6.16, AXIS 5600+ 6.16
    Vulnerability: axis-printservers-webinterface-dos
    X-Force URL: http://www.iss.net/security_center/static/12510.php

    Date Reported: 07/03/2003
    Brief Description: isdnrep overly long -t command buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: isdnrep 4.56, Linux Any version
    Vulnerability: isdnrep-t-bo
    X-Force URL: http://www.iss.net/security_center/static/12511.php

    Date Reported: 07/06/2003
    Brief Description: IglooFTP PRO for Windows FTP banner, Username,
                        Password, and Account functions buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: IglooFTP PRO for Windows 3.8, Windows Any version
    Vulnerability: iglooftppro-multiple-functions-bo
    X-Force URL: http://www.iss.net/security_center/static/12512.php

    Date Reported: 07/03/2003
    Brief Description: gnuan overly long -s command buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: gnuan Any version, Linux Any version
    Vulnerability: gnuan-s-command-bo
    X-Force URL: http://www.iss.net/security_center/static/12513.php

    Date Reported: 07/03/2003
    Brief Description: gnuchess overly long -s command buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: gnuchess Any version, Linux Any version
    Vulnerability: gnuchess-s-command-bo
    X-Force URL: http://www.iss.net/security_center/static/12514.php

    Date Reported: 07/07/2003
    Brief Description: ProductCart database file allows attacker to obtain
                        information
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: ProductCart 1.0 to 2.0, Windows Any version
    Vulnerability: productcart-database-obtain-information
    X-Force URL: http://www.iss.net/security_center/static/12515.php

    Date Reported: 07/06/2003
    Brief Description: x-face-el temporary file symlink attack
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Debian Linux 3.0, x-face-el Any version
    Vulnerability: xfaceel-tmp-file-symlink
    X-Force URL: http://www.iss.net/security_center/static/12518.php

    Date Reported: 07/06/2003
    Brief Description: SEMI and WEMI temporary file symlink attack
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Debian Linux 3.0, SEMI Any version, WEMI Any
                        version
    Vulnerability: semi-tmp-file-symlink
    X-Force URL: http://www.iss.net/security_center/static/12519.php

    Date Reported: 07/06/2003
    Brief Description: Windows Rundll32.exe overly long routine name
                        buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Windows Any version
    Vulnerability: win-rundll32-routine-name-bo
    X-Force URL: http://www.iss.net/security_center/static/12521.php

    Date Reported: 07/07/2003
    Brief Description: Canon GP300 GET request denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Canon GP300 Any version, Windows Any version
    Vulnerability: canon-gp300-get-dos
    X-Force URL: http://www.iss.net/security_center/static/12522.php

    Date Reported: 07/07/2003
    Brief Description: Liece temporary file symlink attack
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Debian Linux 3.0, Liece Any version
    Vulnerability: liece-tmp-file-symlink
    X-Force URL: http://www.iss.net/security_center/static/12523.php

    Date Reported: 07/05/2003
    Brief Description: ProductCart msg.asp cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: ProductCart 1.5 and earlier, Windows Any version
    Vulnerability: productcart-msg-xss
    X-Force URL: http://www.iss.net/security_center/static/12524.php

    Date Reported: 07/06/2003
    Brief Description: myServer math_sum.mscgi script or post.mscgi script
                        denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Linux Any version, myServer 0.4.2, Windows Any
                        version
    Vulnerability: myserver-multiple-scripts-dos
    X-Force URL: http://www.iss.net/security_center/static/12525.php

    Date Reported: 07/07/2003
    Brief Description: Mozart insecure mailcap MIME configuration file
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Debian Linux 3.0, Mozart Any version
    Vulnerability: mozart-insecure-mailcap-file
    X-Force URL: http://www.iss.net/security_center/static/12526.php

    Date Reported: 07/03/2003
    Brief Description: CCBill whereami.cgi script allows attacker to
                        execute code
    Risk Factor: High
    Attack Type: Network Based
    Platforms: CCBill Any version, Unix Any version, Windows Any
                        version
    Vulnerability: ccbill-whereami-execute-code
    X-Force URL: http://www.iss.net/security_center/static/12527.php

    Date Reported: 07/08/2003
    Brief Description: 1st Security Agent and 1st Screen Lock have default
                        password settings
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: 1st Screen Lock Any version, 1st Security Agent Any
                        version, Windows Any version
    Vulnerability: 1st-security-settings-default
    X-Force URL: http://www.iss.net/security_center/static/12528.php

    Date Reported: 07/08/2003
    Brief Description: ezTrans Server download.php "dot dot" directory
                        traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: ezTrans Server Any version, Windows Any version
    Vulnerability: eztransserver-dotdot-directory-traversal
    X-Force URL: http://www.iss.net/security_center/static/12529.php

    Date Reported: 07/08/2003
    Brief Description: Microsoft SQL Server CreateFile API function allows
                        attacker to gain privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Microsoft SQL Server Any version, Windows 2000 Any
                        version, Windows NT Any version, Windows XP Any
                        version
    Vulnerability: mssql-createfile-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12530.php

    Date Reported: 07/08/2003
    Brief Description: zkfingerd syslog format string
    Risk Factor: High
    Attack Type: Host Based / Network Based
    Platforms: Linux Any version, Unix Any version, zkfingerd
                        2.0.2
    Vulnerability: zkfingerd-syslog-format-string
    X-Force URL: http://www.iss.net/security_center/static/12534.php

    Date Reported: 07/08/2003
    Brief Description: zkfingerd fprintf format string
    Risk Factor: High
    Attack Type: Host Based / Network Based
    Platforms: Linux Any version, Unix Any version, zkfingerd
                        2.0.2
    Vulnerability: zkfingerd-fprintf-format-string
    X-Force URL: http://www.iss.net/security_center/static/12535.php

    Date Reported: 07/07/2003
    Brief Description: XChat three consecutive connections denial of
                        service
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, Unix Any version, Windows 9x,
                        Windows NT Any version, XChat 1.8.11
    Vulnerability: xchat-three-connections-dos
    X-Force URL: http://www.iss.net/security_center/static/12536.php

    Date Reported: 07/08/2003
    Brief Description: laforge-group board51, news51, and forum51 user.idx
                        file information disclosure
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: board51 1.0b, board51 2.0, forum51 2.5b, forum51
                        2.6b, Linux Any version, news51 1.0a, news51 1.5,
                        Unix Any version, Windows Any version
    Vulnerability: laforgegroup-user-obtain-information
    X-Force URL: http://www.iss.net/security_center/static/12537.php

    Date Reported: 07/07/2003
    Brief Description: Microsoft Internet Explorer C:\aux URL denial of
                        service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Microsoft Internet Explorer 6.0, Windows Any
                        version
    Vulnerability: ie-aux-url-dos
    X-Force URL: http://www.iss.net/security_center/static/12538.php

    Date Reported: 07/08/2003
    Brief Description: XBlockOut -display command buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Debian Linux 3.0, Unix Any version, XBlockOut prior
                        to 1.0k
    Vulnerability: xbl-display-command-bo
    X-Force URL: http://www.iss.net/security_center/static/12539.php

    Date Reported: 07/08/2003
    Brief Description: Teapop PostSQL and MySQL modules SQL injection
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Debian Linux 3.0, Linux Any version, Teapop Any
                        version, Unix Any version
    Vulnerability: teapop-modules-sql-injection
    X-Force URL: http://www.iss.net/security_center/static/12540.php

    Date Reported: 07/09/2003
    Brief Description: Cisco Catalyst CatOS multiple malformed TCP
                        connections denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Cisco Catalyst 4000 5.5, Cisco Catalyst 4000 6.3,
                        Cisco Catalyst 4000 7.2, Cisco Catalyst 5000 5.5,
                        Cisco Catalyst 5000 6.3, Cisco Catalyst 5000 6.4,
                        Cisco Catalyst 6000 5.5, Cisco Catalyst 6000 6.3,
                        Cisco Catalyst 6000 6.4, Cisco Catalyst 6000 7.2,
                        Cisco Catalyst 6000 7.4, Cisco Catalyst 6000 8.1
    Vulnerability: cisco-catalyst-tcp-dos
    X-Force URL: http://www.iss.net/security_center/static/12541.php

    Date Reported: 07/08/2003
    Brief Description: Rockliffe's MailSite stats Web page information
                        disclosure
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: MailSite 5.3.4, Windows Any version
    Vulnerability: rockliffe-stats-obtain-information
    X-Force URL: http://www.iss.net/security_center/static/12542.php

    Date Reported: 07/09/2003
    Brief Description: Microsoft Windows 2000 Accessibility Utility
                        Manager could allow an attacker to gain privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Windows 2000 Any version
    Vulnerability: win2k-accessibility-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12543.php

    Date Reported: 07/09/2003
    Brief Description: Microsoft Windows Servers SMB packet buffer
                        overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Windows 2000 Any version, Windows NT 4.0 Server,
                        Windows NT 4.0 TSE, Windows XP Professional
    Vulnerability: win-smb-bo
    X-Force URL: http://www.iss.net/security_center/static/12544.php

    Date Reported: 07/09/2003
    Brief Description: Coda RPC2 (Remote Procedure Call) library malformed
                        packet denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Coda 6.0.1, Linux Any version, Unix Any version
    Vulnerability: coda-rpc2-packet-dos
    X-Force URL: http://www.iss.net/security_center/static/12545.php

    Date Reported: 07/09/2003
    Brief Description: Q-Shop upload.htm allows attacker to obtain
                        information
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Q-Shop 2.5, Windows Any version
    Vulnerability: qshop-upload-obtain-information
    X-Force URL: http://www.iss.net/security_center/static/12546.php

    Date Reported: 07/09/2003
    Brief Description: terminatorX HOME and XLOCALDIR environment
                        variables allows attacker to gain privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux Any version, terminatorX 3.80
    Vulnerability: terminatorx-variables-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12547.php

    Date Reported: 07/08/2003
    Brief Description: SKK and DDSKK create insecure temporary files
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: DDSKK Any version, Debian Linux 3.0, Linux Any
                        version, Unix Any version
    Vulnerability: skkddskk-temporary-files-insecure
    X-Force URL: http://www.iss.net/security_center/static/12548.php

    Date Reported: 07/09/2003
    Brief Description: Apache HTTP Server type-map file denial of service
    Risk Factor: Low
    Attack Type: Host Based
    Platforms: Apache HTTP Server 2.0 to 2.0.46, Linux Any
                        version, Unix Any version, Windows Any version
    Vulnerability: apache-type-map-dos
    X-Force URL: http://www.iss.net/security_center/static/12549.php

    Date Reported: 07/09/2003
    Brief Description: Apache HTTP Server weaker than expected encryption
    Risk Factor: Low
    Attack Type: Host Based
    Platforms: Apache HTTP Server 2.0 to 2.0.46, Linux Any
                        version, Trustix Secure Linux 2.0, Unix Any
                        version, Windows Any version
    Vulnerability: apache-weak-encryption
    X-Force URL: http://www.iss.net/security_center/static/12550.php

    Date Reported: 07/09/2003
    Brief Description: Apache HTTP Server prefork MPM denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Apache HTTP Server 2.0 to 2.0.46, Linux Any
                        version, Trustix Secure Linux 2.0, Unix Any
                        version, Windows Any version
    Vulnerability: apache-prefork-mpm-dos
    X-Force URL: http://www.iss.net/security_center/static/12551.php

    Date Reported: 07/09/2003
    Brief Description: Apache HTTP Server FTP proxy server denial of
                        service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Apache HTTP Server 2.0 to 2.0.46, Linux Any
                        version, Trustix Secure Linux 2.0, Unix Any
                        version, Windows Any version
    Vulnerability: apache-ftp-proxy-dos
    X-Force URL: http://www.iss.net/security_center/static/12552.php

    Date Reported: 07/09/2003
    Brief Description: Apache HTTP Server redirects and subrequests denial
                        of service
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Apache HTTP Server 2.0 to 2.0.46, Linux Any
                        version, Unix Any version, Windows Any version
    Vulnerability: apache-redirects-subrequests-dos
    X-Force URL: http://www.iss.net/security_center/static/12553.php

    Date Reported: 07/09/2003
    Brief Description: Apache Tomcat stores password in plain text
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Linux Any version, Tomcat 4.0, Tomcat 4.1, Unix Any
                        version, Windows Any version
    Vulnerability: tomcat-plaintext-password
    X-Force URL: http://www.iss.net/security_center/static/12554.php

    Date Reported: 07/09/2003
    Brief Description: bitboard2 data_passw.dat file information
                        disclosure
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: bitboard2 Any version, Linux Any version, Unix Any
                        version, Windows Any version
    Vulnerability: bitboard2-datapassw-obtain-information
    X-Force URL: http://www.iss.net/security_center/static/12558.php

    Date Reported: 07/08/2003
    Brief Description: KNOPPIX Qt temporary files race condition
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: KNOPPIX 3.1, Linux Any version
    Vulnerability: knoppix-qt-race-condition
    X-Force URL: http://www.iss.net/security_center/static/12560.php

    Date Reported: 07/05/2003
    Brief Description: ICQ could allow an attacker to bypass
                        authentication
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: ICQ Pro 2003a, Windows Any version
    Vulnerability: icq-auth-bypass
    X-Force URL: http://www.iss.net/security_center/static/12562.php

    Date Reported: 07/08/2003
    Brief Description: BEA WebLogic Node Manager discloses keyfile
                        password in plain text
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: AIX 4.3.3, HP-UX 11.00, HP-UX 11i, Red Hat Linux
                        for Intel Pentium, Solaris 2.6, Solaris 2.7,
                        Solaris 8, WebLogic Server and Express 6.1.x,
                        WebLogic Server and Express 7.0, WebLogic Server
                        and Express 7.0.0.1, Windows 2000 Any version,
                        Windows 2000 Professional, Windows NT 4.0, Windows
                        XP Any version
    Vulnerability: weblogic-keyfile-password-disclosure
    X-Force URL: http://www.iss.net/security_center/static/12565.php

    Date Reported: 07/08/2003
    Brief Description: BEA WebLogic Operator could allow attacker to gain
                        administrative privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: AIX 4.3.3, HP-UX 11.00, HP-UX 11i, Red Hat Linux
                        for Intel Pentium, Solaris 2.6, Solaris 2.7,
                        Solaris 8, WebLogic Server and Express 7.0,
                        WebLogic Server and Express 7.0.0.1, WebLogic
                        Server and Express 8.1, Windows 2000 Any version,
                        Windows 2000 Professional, Windows NT 4.0, Windows
                        XP Any version
    Vulnerability: weblogic-operator-gain-privileges
    X-Force URL: http://www.iss.net/security_center/static/12566.php

    Date Reported: 07/08/2003
    Brief Description: BEA WebLogic could allow an attacker to gain access
                        to the console
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: AIX 4.3.3, HP-UX 11.00, HP-UX 11i, Red Hat Linux
                        for Intel Pentium, Solaris 2.6, Solaris 2.7,
                        Solaris 8, WebLogic Server and Express 7.0,
                        WebLogic Server and Express 7.0.0.1, Windows 2000
                        Any version, Windows 2000 Professional, Windows NT
                        4.0, Windows XP Any version
    Vulnerability: weblogic-console-gain-access
    X-Force URL: http://www.iss.net/security_center/static/12567.php

    Date Reported: 07/07/2003
    Brief Description: Macromedia ColdFusion MX RDS could allow an
                        attacker to gain access to server
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: ColdFusion MX Any version, Windows 2000 Any
                        version, Windows NT Any version, Windows XP Any
                        version
    Vulnerability: coldfusion-rds-gain-access
    X-Force URL: http://www.iss.net/security_center/static/12569.php

    Date Reported: 07/07/2003
    Brief Description: Macromedia ColdFusion MX RDS transmits password in
                        plain text
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: ColdFusion MX Any version, Windows 2000 Any
                        version, Windows NT Any version, Windows XP Any
                        version
    Vulnerability: coldfusion-rds-password-plaintext
    X-Force URL: http://www.iss.net/security_center/static/12571.php

    Date Reported: 07/07/2003
    Brief Description: Macromedia ColdFusion MX fails to properly validate
                        ASP SESSION IDs
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: ColdFusion MX Any version, Windows 2000 Any
                        version, Windows NT Any version, Windows XP Any
                        version
    Vulnerability: coldfusion-session-improper-validation
    X-Force URL: http://www.iss.net/security_center/static/12572.php

    Date Reported: 07/10/2003
    Brief Description: Gattaca Server forward slash sequence file
                        disclosure
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Gattaca Server 1.0.8.1, Windows 2000 Any version,
                        Windows NT Any version, Windows XP Any version
    Vulnerability: gattaca-slash-file-disclosure
    X-Force URL: http://www.iss.net/security_center/static/12573.php

    Date Reported: 07/10/2003
    Brief Description: Gattaca Server LLIST command buffer overflow
    Risk Factor: Low
    Attack Type: Host Based / Network Based
    Platforms: Gattaca Server 1.0.8.1, Windows 2000 Any version,
                        Windows NT Any version, Windows XP Any version
    Vulnerability: gattaca-llist-bo
    X-Force URL: http://www.iss.net/security_center/static/12574.php

    Date Reported: 07/10/2003
    Brief Description: Gattaca Server view.tmpl script directory traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Gattaca Server 1.0.8.1, Windows 2000 Any version,
                        Windows NT Any version, Windows XP Any version
    Vulnerability: gattaca-view-directory-traversal
    X-Force URL: http://www.iss.net/security_center/static/12575.php

    Date Reported: 07/10/2003
    Brief Description: Gattaca Server view2.tmpl script cross-site
                        scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Gattaca Server 1.0.8.1, Windows 2000 Any version,
                        Windows NT Any version, Windows XP Any version
    Vulnerability: gattaca-view-xss
    X-Force URL: http://www.iss.net/security_center/static/12576.php

    Date Reported: 07/07/2003
    Brief Description: BillingExplorer contains no authentication
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: BillingExplorer Any version, Windows Any version
    Vulnerability: billingexplorer-no-auth
    X-Force URL: http://www.iss.net/security_center/static/12577.php

    Date Reported: 07/07/2003
    Brief Description: BillingExplorer transmits administrator's password
                        in plain text
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: BillingExplorer Any version, Windows Any version
    Vulnerability: billingexplorer-admin-password-plaintext
    X-Force URL: http://www.iss.net/security_center/static/12578.php

    Date Reported: 07/10/2003
    Brief Description: TurboFTP overly long response during connection
                        buffer overflow
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: TurboFTP 3.85 Build 304, Windows Any version
    Vulnerability: turboftp-response-bo
    X-Force URL: http://www.iss.net/security_center/static/12579.php

    Date Reported: 07/10/2003
    Brief Description: phpForum mainfile.php PHP file include
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, phpForum 2 RC-1, Unix Any
                        version, Windows Any version
    Vulnerability: phpforum-mainfile-file-include
    X-Force URL: http://www.iss.net/security_center/static/12581.php

    Date Reported: 07/13/2003
    Brief Description: MDaemon IMAP4rev1 EXAMINE buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: MDaemon 6.7.9, Windows Any version
    Vulnerability: mdaemon-imap4rev1-examine-bo
    X-Force URL: http://www.iss.net/security_center/static/12583.php

    Date Reported: 07/13/2003
    Brief Description: MDaemon IMAP4rev1 SELECT buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: MDaemon 6.7.9, Windows Any version
    Vulnerability: mdaemon-imap4rev1-select-bo
    X-Force URL: http://www.iss.net/security_center/static/12584.php

    _____

    Risk Factor Key:

         High Security issues that allow immediate remote, or local access
                  or immediate execution of code or commands, with unauthorized
                  privileges. Examples are most buffer overflows, backdoors,
                  default or no password, and bypassing security on firewalls
                  or other network components.
         Medium Security issues that have the potential of granting access or
                  allowing code execution by means of complex or lengthy exploit
                  procedures, or low risk issues applied to major Internet
                  components. Examples are cross-site scripting, man-in-the-middle
                  attacks, SQL injection, denial of service of major applications,
                  and denial of service resulting in system information disclosure
                  (such as core files).
         Low Security issues that deny service or provide non-system
                  information that could be used to formulate structured attacks
                  on a target, but not directly gain unauthorized access. Examples
                  are brute force attacks, non-system information disclosure
                  (configurations, paths, etc.), and denial of service attacks.

    ______

    About Internet Security Systems (ISS)
    Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
    pioneer and world leader in software and services that protect critical
    online resources from an ever-changing spectrum of threats and misuse.
    Internet Security Systems is headquartered in Atlanta, GA, with
    additional operations throughout the Americas, Asia, Australia, Europe
    and the Middle East.

    Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved
    worldwide.

    Permission is hereby granted for the electronic redistribution of this
    document. It is not to be edited or altered in any way without the
    express written consent of the Internet Security Systems X-Force. If you
    wish to reprint the whole or any part of this document in any other
    medium excluding electronic media, please email xforce@iss.net for
    permission.

    Disclaimer: The information within this paper may change without notice. Internet
    Security Systems provides this information on an AS IS basis with NO warranties,
    implied or otherwise. Any use of this information is at the userís risk. In no event
    shall Internet Security Systems be held liable for any damages whatsoever arising
    out of or in connection with the use or dissemination of this information.

    X-Force PGP Key available on MIT's PGP key server and PGP.com's key server,
    as well as at http://www.iss.net/security_center/sensitive.php

    Please send suggestions, updates, and comments to: X-Force
    xforce@iss.net of Internet Security Systems, Inc.

    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2

    iQCVAwUBPxL34TRfJiV99eG9AQFK4AP/cl7Yc4KuWuq8bSPPClQg9FqRM95l3zwJ
    NkC7XeAVcGMI+6m03GHHwqK/dWVMChRM5+LXBxsr/+VsOlWcSgDqC/Zf6k8r3I8a
    90ZVvZP6mU6qsMC0CdQFOZpW1RwmQwT8/5xbvzgP5ZeaS+Q68U1+QpAN+I0gpuro
    6ZtPBcjLtBg=
    =IWjS
    -----END PGP SIGNATURE-----


  • Next message: X-Force: "Flaw in Microsoft Windows RPC Implementation"