ISS Security Alert Summary AS04-10

From: X-Force (xforce_at_iss.net)
Date: 03/08/04

  • Next message: X-Force: "ISS Security Alert Summary AS04-11"
    Date: Mon, 8 Mar 2004 13:50:30 -0500 (EST)
    To: alert@iss.net
    
    

    -----BEGIN PGP SIGNED MESSAGE-----

    Internet Security Systems Security Alert Summary AS04-10
    March 08, 2004

    X-Force Vulnerability and Threat Database:
    http://xforce.iss.net/

    To receive these Alert Summaries, as well as other Alerts and
    Advisories, subscribe to the Internet Security Systems Alert
    mailing list at:
    https://atla-mm1.iss.net/mailman/listinfo/alert

    This summary is available at the following address:
    http://xforce.iss.net/xforce/alerts/id/AS04-10
    _____
    Contents:
    * 56 Reported Vulnerabilities
    * Risk Factor Key
    _____

    Date Reported: 02/28/2004
    Brief Description: WFTPD Pro Server and Server FTP commands buffer
                        overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: WFTPD Pro Server 3.20 R2, WFTPD Pro Server 3.21 R1,
                        WFTPD Server 3.10 R1, WFTPD Server 3.21 R1, Windows
                        2000 Any version, Windows 2003 Any version, Windows
                        NT Any version, Windows XP Any version
    Vulnerability: wftpd-ftp-commands-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15340

    Date Reported: 02/28/2004
    Brief Description: WFTPD Pro Server long strings without an 0Ah byte
                        causes denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: WFTPD Pro Server 3.21 R1, Windows 2000 Any version,
                        Windows NT Any version
    Vulnerability: wftpd-string-0Ahbyte-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15341

    Date Reported: 02/28/2004
    Brief Description: WFTPD Pro MDK or SMKD FTP commands can cause denial
                        of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: WFTPD Pro Server 3.21 R1, Windows 2000 Any version,
                        Windows NT Any version
    Vulnerability: wftpd-ftp-command-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15342

    Date Reported: 02/28/2004
    Brief Description: Invision Power Board search.php SQL injection
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Invision Power Board Any version, Linux Any
                        version, Unix Any version, Windows Any version
    Vulnerability: invision-search-sql-injection
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15343

    Date Reported: 02/27/2004
    Brief Description: FreeBSD jail_attach allows elevated privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: FreeBSD 5.1-RELEASE, FreeBSD 5.2-RELEASE
    Vulnerability: freebsd-jailattach-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15344

    Date Reported: 03/01/2004
    Brief Description: Anubis IDENT buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Anubis 3.6.2, Anubis 3.9.93, Linux Any version
    Vulnerability: anubis-ident-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15345

    Date Reported: 03/01/2004
    Brief Description: Anubis format string error
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Anubis 3.6.2, Anubis 3.9.93, Linux Any version
    Vulnerability: anubis-format-string
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15346

    Date Reported: 02/27/2004
    Brief Description: xboing buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Debian Linux 3.0, xboing Any version
    Vulnerability: xboing-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15347

    Date Reported: 02/29/2004
    Brief Description: phpBB viewtopic.php script allows cross-site
                        scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, phpBB 2.0.6c, Unix Any version,
                        Windows Any version
    Vulnerability: phpbb-viewtopicphp-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15348

    Date Reported: 02/28/2004
    Brief Description: 602Pro LAN SUITE could disclose directory listing
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: 602Pro LAN SUITE Any version, Windows Any version
    Vulnerability: 602pro-directory-listing
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15349

    Date Reported: 02/28/2004
    Brief Description: 602Pro LAN SUITE path disclosure
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: 602Pro LAN SUITE Any version, Windows Any version
    Vulnerability: 602pro-path-disclosure
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15350

    Date Reported: 02/28/2004
    Brief Description: 602Pro LAN SUITE index.html cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: 602Pro LAN SUITE Any version, Windows Any version
    Vulnerability: 602pro-index-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15351

    Date Reported: 02/29/2004
    Brief Description: free-BB couleur or img HTML tags allow cross-site
                        scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, free-BB Any
                        version
    Vulnerability: freebb-html-tags-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15352

    Date Reported: 03/01/2004
    Brief Description: Red Faction buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Mac OS Any version, Red Faction 1.2 and earlier,
                        Windows Any version
    Vulnerability: redfaction-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15353

    Date Reported: 03/01/2004
    Brief Description: YaBB SE multiple modules allow SQL injection
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Unix Any version, Windows Any
                        version, YaBB SE 1.5.4, YaBB SE 1.5.5, YaBB SE
                        1.5.5b
    Vulnerability: yabb-multiple-sql-injection
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15354

    Date Reported: 02/28/2004
    Brief Description: iG Shop page.php cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, iG Shop 1.4
    Vulnerability: ig-shop-page-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15355

    Date Reported: 02/28/2004
    Brief Description: iG Shop SQL injection
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, iG Shop 1.4
    Vulnerability: ig-shop-sql-injection
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15356

    Date Reported: 03/01/2004
    Brief Description: IA WebMail Server username buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: IA WebMail Server 2.1, Windows 2000 SP3 and
                        earlier, Windows NT 4.0, Windows XP Any version
    Vulnerability: iawebmailserver-username-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15357

    Date Reported: 03/01/2004
    Brief Description: IA WebMail Server view and edit_contact denial of
                        service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: IA WebMail Server 2.1, Windows 2000 SP3 and
                        earlier, Windows NT 4.0, Windows XP Any version
    Vulnerability: iawebmailserver-view-editcontact-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15358

    Date Reported: 03/01/2004
    Brief Description: IA WebMail Server view and edit_contact cross-site
                        scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: IA WebMail Server 2.1, Windows 2000 SP3 and
                        earlier, Windows NT 4.0, Windows XP Any version
    Vulnerability: iawebmailserver-view-editcontact-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15359

    Date Reported: 03/01/2004
    Brief Description: IA WebMail Server email spoofing
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: IA WebMail Server 2.1, Windows 2000 SP3 and
                        earlier, Windows NT 4.0, Windows XP Any version
    Vulnerability: iawebmailserver-email-spoofing
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15360

    Date Reported: 03/02/2004
    Brief Description: Magic Winmail Server path disclosure in the
                        ldaplib.php script
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Magic Winmail Server 3.6, Windows Any version
    Vulnerability: magic-winmail-path-disclosure
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15361

    Date Reported: 03/02/2004
    Brief Description: XBoard -icshost buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Unix Any version, XBoard 4.2.7 and prior
    Vulnerability: xboard-icshost-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15362

    Date Reported: 03/02/2004
    Brief Description: ignitionServer could allow a remote attacker to
                        gain privileges
    Risk Factor: High
    Attack Type: Network Based
    Platforms: ignitionServer 0.1.x, ignitionServer 0.2.x, Windows
                        Any version
    Vulnerability: ignition-server-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15363

    Date Reported: 03/01/2004
    Brief Description: Motorola T270 mobile phone IP packet denial of
                        service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Motorola T270 Any version
    Vulnerability: motorola-t270-ip-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15364

    Date Reported: 03/02/2004
    Brief Description: Hot Open Tickets allows attacker to obtain elevated
                        privileges
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Any operating system Any version, Hot Open Tickets
                        prior 02272004_ver2c
    Vulnerability: hot-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15365

    Date Reported: 03/01/2004
    Brief Description: Squid url_regex ACL bypass
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Squid Web Proxy Cache 2.x to 2.5.STABLE4, Unix Any
                        version
    Vulnerability: squid-urlregex-acl-bypass
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15366

    Date Reported: 03/01/2004
    Brief Description: Novell Client Firewall tray icon allows elevated
                        privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Novell Client Firewall (NCF) 2.0, Novell
                        NetWare Any version
    Vulnerability: ncf-tray-icon-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15367

    Date Reported: 03/02/2004
    Brief Description: NetScreen-SA 5000 Series of IVE SSL VPN Appliances
                        delhomepage.CGI cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: NetScreen-SA 5000 Series, ScreenOS 3.3 Patch1
                        build4797
    Vulnerability: netscreen-delhomepagecgi-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15368

    Date Reported: 03/01/2004
    Brief Description: FreeBSD memory buffers (mbufs) denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: FreeBSD 4.0-Stable, FreeBSD 5.1
    Vulnerability: freebsd-mbuf-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15369

    Date Reported: 03/03/2004
    Brief Description: Spider Sales weak encryption
    Risk Factor: Low
    Attack Type: Host Based
    Platforms: Spider Sales any version, Windows Any version
    Vulnerability: spidersales-weak-encryption
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15370

    Date Reported: 03/03/2004
    Brief Description: Spider Sales userId SQL injection
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Spider Sales any version, Windows Any version
    Vulnerability: spidersales-userid-sql-injection
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15371

    Date Reported: 03/02/2004
    Brief Description: SkyHigh Chat Server multiple connections denial of
                        service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: SkyHigh Chat Server 1.0, Windows Any version
    Vulnerability: skyhigh-multiple-connections-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15372

    Date Reported: 03/01/2004
    Brief Description: Nortel Wireless LAN Access Point 2200
                        administrative Telnet service denial of service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Nortel Wireless LAN Access Point 2200 Any version
    Vulnerability: nortel-accesspoint-telnet-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15373

    Date Reported: 03/02/2004
    Brief Description: SonicWALL VPN/Firewall Appliance ARP information
                        disclosure
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: SonicWALL PRO 6.2.0.0 thru 6.5.0.4
    Vulnerability: sonicwall-arp-obtain-information
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15374

    Date Reported: 03/02/2004
    Brief Description: QuickTime Player could allow remote code execution
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Mac OS X Any version, QuickTime Player Any version,
                        Windows Any version
    Vulnerability: quicktime-code-execution
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15376

    Date Reported: 03/02/2004
    Brief Description: SandSurfer cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, SandSurfer prior to 1.7.1
    Vulnerability: sandsurfer-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15377

    Date Reported: 03/02/2004
    Brief Description: SonicWALL VPN/Firewall Appliance ARP denial of
                        service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: SonicWALL PRO 6.2.0.0 thru 6.5.0.4
    Vulnerability: sonicwall-arp-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15378

    Date Reported: 03/03/2004
    Brief Description: Dream FTP Server FTP command format string
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Dream FTP Server 1.02, Windows Any version
    Vulnerability: dreamftp-command-format-string
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15380

    Date Reported: 03/03/2004
    Brief Description: GWeb HTTP Server directory traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, GWeb HTTP Server
                        0.6
    Vulnerability: gweb-dotdot-directory-traversal
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15381

    Date Reported: 03/04/2004
    Brief Description: DAWKCo POP3 Server with WebMAIL extension session
                        reactivation
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: DAWKCo POP3 Server 6.1, Windows 2000 Any version,
                        Windows NT Any version
    Vulnerability: dawkco-session-hijack
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15383

    Date Reported: 03/03/2004
    Brief Description: Adobe Acrobat Reader XFDF buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Acrobat Reader 5.1, Any operating system Any
                        version
    Vulnerability: acrobatreader-xfdf-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15384

    Date Reported: 03/03/2004
    Brief Description: qmail RELAYCLIENT buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux Any version, qmail 1.03, Unix Any version
    Vulnerability: qmail-relayclient-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15385

    Date Reported: 03/02/2004
    Brief Description: Coreutils dir -W integer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Coreutils prior to 5.2.0, Linux Any version
    Vulnerability: coreutils-dir-w-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15386

    Date Reported: 03/04/2004
    Brief Description: ProFTPD off-by-one _xlate_ascii_write function
                        buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, ProFTPD 1.2.x, Unix Any version
    Vulnerability: proftpd-offbyone-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15387

    Date Reported: 03/04/2004
    Brief Description: Cisco CSS switches UDP packet denial of service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Cisco Content Service Switch 11050, Cisco Content
                        Service Switch 11800, Cisco WebNS prior -06.10
                        (02.05)S, Cisco ebNS prior to 05.0(04.07),
                        Cisco WebNS prior to 05.0(04.07)
    Vulnerability: cisco-css-udp-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15388

    Date Reported: 03/03/2004
    Brief Description: SmarterMail "dot dot" directory traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: SmarterMail 3.1, Windows 2000 Any version, Windows
                        2003 Any version, Windows XP Any version
    Vulnerability: smartermail-dotdot-directory-traversal
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15389

    Date Reported: 03/04/2004
    Brief Description: SmarterMail login.aspx denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: SmarterMail 3.1, Windows 2000 Any version, Windows
                        2003 Any version, Windows XP Any version
    Vulnerability: smartermail-login-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15390

    Date Reported: 03/04/2004
    Brief Description: SmarterMail multiple connection denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: SmarterMail 3.1, Windows 2000 Any version, Windows
                        2003 Any version, Windows XP Any version
    Vulnerability: smartermail-multiple-connection-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15391

    Date Reported: 03/04/2004
    Brief Description: SmarterMail frmAddfolder.aspx file manipulation
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: SmarterMail 3.1, Windows 2000 Any version, Windows
                        2003 Any version, Windows XP Any version
    Vulnerability: smartermail-frmaddfolder-file-manipulation
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15392

    Date Reported: 03/04/2004
    Brief Description: SmarterMail spell checker cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: SmarterMail 3.1, Windows 2000 Any version, Windows
                        2003 Any version, Windows XP Any version
    Vulnerability: smartermail-spellchecker-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15393

    Date Reported: 03/04/2004
    Brief Description: Tru64 UNIX IPSec and IKE allows unauthorized access
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Compaq Tru64 UNIX 5.1a, Compaq Tru64 UNIX 5.1b
    Vulnerability: tru64-ipsec-ike-gain-access
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15397

    Date Reported: 03/05/2004
    Brief Description: SLMail Pro Supervisor Report Center stack-based
                        buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: SLMail Pro 2.0.9 and earlier, Windows 2000 Any
                        version
    Vulnerability: slmail-src-stack-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15398

    Date Reported: 03/05/2004
    Brief Description: SLMail Pro SLWebmail buffer overflows
    Risk Factor: High
    Attack Type: Network Based
    Platforms: SLMail Pro 2.0.9 and earlier, Windows 2000 Any
                        version
    Vulnerability: slmail-slwebmail-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15399

    Date Reported: 03/02/2004
    Brief Description: Invision Power Board invalid character could
                        disclose path
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Any operating system Any version, Invision Power
                        Board 1.3 Final
    Vulnerability: invision-invalid-path-disclosure
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15400

    Date Reported: 03/05/2004
    Brief Description: Norton AntiVirus 2002 ASCII character scan denial
                        of service
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: Norton AntiVirus 2002, Windows Any version
    Vulnerability: nav-ascii-scan-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/15401

    _____

    Risk Factor Key:

         High Security issues that allow immediate remote, or local access
                  or immediate execution of code or commands, with unauthorized
                  privileges. Examples are most buffer overflows, backdoors,
                  default or no password, and bypassing security on firewalls
                  or other network components.
         Medium Security issues that have the potential of granting access or
                  allowing code execution by means of complex or lengthy exploit
                  procedures, or low risk issues applied to major Internet
                  components. Examples are cross-site scripting, man-in-the-middle
                  attacks, SQL injection, denial of service of major applications,
                  and denial of service resulting in system information disclosure
                  (such as core files).
         Low Security issues that deny service or provide non-system
                  information that could be used to formulate structured attacks
                  on a target, but not directly gain unauthorized access. Examples
                  are brute force attacks, non-system information disclosure
                  (configurations, paths, etc.), and denial of service attacks.

    ______

    About Internet Security Systems (ISS)
    Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
    pioneer and world leader in software and services that protect critical
    online resources from an ever-changing spectrum of threats and misuse.
    Internet Security Systems is headquartered in Atlanta, GA, with
    additional operations throughout the Americas, Asia, Australia, Europe
    and the Middle East.

    Copyright (c) 2004 Internet Security Systems, Inc. All rights reserved
    worldwide.

    Permission is hereby granted for the electronic redistribution of this
    document. It is not to be edited or altered in any way without the
    express written consent of the Internet Security Systems X-Force. If you
    wish to reprint the whole or any part of this document in any other
    medium excluding electronic media, please email xforce@iss.net for
    permission.

    Disclaimer: The information within this paper may change without notice. Internet
    Security Systems provides this information on an AS IS basis with NO warranties,
    implied or otherwise. Any use of this information is at the user's risk. In no event
    shall Internet Security Systems be held liable for any damages whatsoever arising
    out of or in connection with the use or dissemination of this information.

    X-Force PGP Key available on MIT's PGP key server and PGP.com's key server,
    as well as at http://xforce.iss.net/xforce/sensitive.php

    Please send suggestions, updates, and comments to: X-Force
    xforce@iss.net of Internet Security Systems, Inc.

    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2

    iQCVAwUBQEzAVzRfJiV99eG9AQHpIwQAh7aaFABdvAxpsioZxdOTej2XnKbKcrC9
    HpPP9R6vv8jPTmKxNkwWff0UrPxmNset2Bh2G13DCuG6MnWLFXVGGYBZx+mlFl9O
    CzOnCGDHRpYtQf6cwfzHr1bfJGLvcDzrDbu1L/4SGir+WIbdt/f/CaUkM45le4zR
    5V/AXXC83Mc=
    =H4UH
    -----END PGP SIGNATURE-----


  • Next message: X-Force: "ISS Security Alert Summary AS04-11"