ISS Security Alert Summary AS04-20

From: X-Force (xforce_at_iss.net)
Date: 05/17/04

  • Next message: X-Force: "ISS Security Alert Summary AS04-21"
    Date: Mon, 17 May 2004 13:47:50 -0400 (EDT)
    To: alert@iss.net
    
    

    -----BEGIN PGP SIGNED MESSAGE-----

    Internet Security Systems Security Alert Summary AS04-20
    May 17, 2004

    X-Force Vulnerability and Threat Database: http://xforce.iss.net/

    To receive these Alert Summaries, as well as other Alerts and Advisories,
    subscribe to the Internet Security Systems Alert mailing list at:
    https://atla-mm1.iss.net/mailman/listinfo/alert

    This summary is available at the following address:
    http://xforce.iss.net/xforce/alerts/id/AS04-20
    _____
    Contents:
    * 51 Reported Vulnerabilities
    * Risk Factor Key
    _____

    Date Reported: 05/07/2004
    Brief Description: Microsoft Internet Explorer file URL could allow an
                        attacker to overwrite registry
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Microsoft Internet Explorer 6.0.2800, Windows Any
                        version
    Vulnerability: ie-file-registry-overwrite
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16091

    Date Reported: 05/07/2004
    Brief Description: OfficeScan modify configuration
    Risk Factor: Medium
    Attack Type: Host Based
    Platforms: OfficeScan prior to 6.5, Windows Any version
    Vulnerability: officescan-configuration-modify
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16092

    Date Reported: 05/10/2004
    Brief Description: IBM Parallel Environment for AIX privilege escalation
    Risk Factor: High
    Attack Type: Host Based
    Platforms: AIX Any version, IBM Parallel Environment for AIX
                        3.2, IBM Parallel Environment for AIX 4.1
    Vulnerability: ibm-pe-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16093

    Date Reported: 05/08/2004
    Brief Description: NukeJokes multiple path disclosure
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Any operating system Any version, NukeJokes 1.7,
                        NukeJokes 2 Beta
    Vulnerability: nukejokes-multiple-path-disclosure
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16094

    Date Reported: 05/11/2004
    Brief Description: Microsoft Windows XP and Windows Server 2003 HCP
                        URL code execution
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Windows Server 2003 Any version, Windows XP Any
                        version
    Vulnerability: win-hcp-code-execution
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16095

    Date Reported: 05/08/2004
    Brief Description: NukeJokes modules.php cross-site scripting
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, NukeJokes 1.7,
                        NukeJokes 2 Beta
    Vulnerability: nukejokes-modules-xss
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16096

    Date Reported: 05/07/2004
    Brief Description: efFingerD sockFinger_DataArrival buffer overflow
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: efFingerD 0.2.12, Windows Any version
    Vulnerability: effingerd-sockfingerdataarrival-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16097

    Date Reported: 05/08/2004
    Brief Description: NukeJokes SQL injection
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, NukeJokes 1.7,
                        NukeJokes 2 Beta
    Vulnerability: nukejokes-sql-injection
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16099

    Date Reported: 05/07/2004
    Brief Description: FreeBSD kernel denial of service
    Risk Factor: Low
    Attack Type: Host Based
    Platforms: FreeBSD 4.x, FreeBSD 5.x
    Vulnerability: freebsd-kernel-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16100

    Date Reported: 05/06/2004
    Brief Description: MyWeb long GET buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: MyWeb 3.3, Windows Any version
    Vulnerability: myweb-long-get-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16101

    Date Reported: 05/08/2004
    Brief Description: Microsoft Internet Explorer and Outlook Express A
                        HREF URL spoofing
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Microsoft Internet Explorer Any version, Microsoft
                        Outlook 2000, Microsoft Outlook 2002, Microsoft
                        Outlook Express Any version, Windows Any version
    Vulnerability: ie-ahref-url-spoofing
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16102

    Date Reported: 05/09/2004
    Brief Description: Icecast authorization request buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Icecast 2.0.0, Linux Any version, Windows Any
                        version
    Vulnerability: icecast-auth-request-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16103

    Date Reported: 05/09/2004
    Brief Description: Microsoft Outlook 2003 predictable file location
                        could allow code execution
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Microsoft Outlook 2003, Windows 2000 Any version,
                        Windows XP Any version
    Vulnerability: outlook-file-location-predictable
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16104

    Date Reported: 05/10/2004
    Brief Description: Eudora URL spoofing
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Eudora 6.1.0.6, Windows Any version
    Vulnerability: eudora-url-spoofing
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16105

    Date Reported: 05/07/2004
    Brief Description: Linux kernel exit_thread allows elevated privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux kernel 2.6.5
    Vulnerability: linux-exitthread-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16106

    Date Reported: 05/09/2004
    Brief Description: phpShop $base_dir file include
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, phpShop 0.7.1 and prior, Windows
                        2000 Any version, Windows NT Any version
    Vulnerability: phpshop-basedir-file-include
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16107

    Date Reported: 05/11/2004
    Brief Description: Mac OS X TruBlueEnvironment denial of service
    Risk Factor: Low
    Attack Type: Host Based
    Platforms: Mac OS X 10.2.8
    Vulnerability: macos-trublueenvironment-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16108

    Date Reported: 05/10/2004
    Brief Description: Systrace allows elevated privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: FreeBSD Ports Collection Any version, NetBSD Any
                        version
    Vulnerability: systrace-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16110

    Date Reported: 05/11/2004
    Brief Description: eMule HTTP POST and GET requests denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: eMule 0.42e, Windows Any version
    Vulnerability: emule-post-get-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16111

    Date Reported: 05/10/2004
    Brief Description: MSXML3 ampersand denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: MSXML 3.0, Windows Any version
    Vulnerability: msxml3-ampersand-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16112

    Date Reported: 05/11/2004
    Brief Description: OpenServer insecure X sessions
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Caldera OpenServer 5.0.5, Caldera OpenServer 5.0.6,
                        Caldera OpenServer 5.0.7
    Vulnerability: openserver-x-session-insecure
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16113

    Date Reported: 05/09/2004
    Brief Description: MailEnable logging enabled MEHTTPS buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: MailEnable Professional Edition 1.5 through 1.7,
                        Windows Any version
    Vulnerability: mailenable-enabled-mehttps-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16114

    Date Reported: 05/09/2004
    Brief Description: MailEnable logging disabled MEHTTPS buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: MailEnable Professional Edition 1.5 through 1.7,
                        Windows Any version
    Vulnerability: mailenable-disabled-mehttps-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16115

    Date Reported: 05/11/2004
    Brief Description: Outlook VML information disclosure
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Microsoft Outlook 2003, Windows 2000 Any version,
                        Windows 2003 Any version, Windows XP Any version
    Vulnerability: outlook-vml-obtain-information
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16116

    Date Reported: 05/11/2004
    Brief Description: Linux Kernel sctp_setsockopt integer buffer
                        overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux Any version, Linux kernel 2.4.23-pre5 -
                        2.4.25, Trustix Secure Enterprise Linux 2, Trustix
                        Secure Linux 2.0, Trustix Secure Linux 2.1
    Vulnerability: linux-sctpsetsockopt-integer-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16117

    Date Reported: 05/12/2004
    Brief Description: MDaemon IMAP component STATUS buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: MDaemon 7.0.1, Windows Any version
    Vulnerability: mdaemon-imap-status-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16118

    Date Reported: 05/11/2004
    Brief Description: Microsoft Outlook 2000 URL spoofing
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Microsoft Outlook 2000, Windows 9x, Windows 2000
                        Any version, Windows NT Any version
    Vulnerability: outlook-url-spoofing
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16119

    Date Reported: 05/11/2004
    Brief Description: HP-UX B6848AB GTK+ Support Libraries allows
                        elevated privileges
    Risk Factor: High
    Attack Type: Host Based
    Platforms: HP-UX 11.00, HP-UX 11.11
    Vulnerability: hp-gtk-gain-privileges
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16120

    Date Reported: 05/11/2004
    Brief Description: BEA WebLogic Server and Express bypass server
                        policy
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, WebLogic Server
                        and Express 7.0 through SP5, WebLogic Server and
                        Express 8.1 through 8.1 SP2
    Vulnerability: weblogic-server-policy-bypass
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16121

    Date Reported: 05/11/2004
    Brief Description: BEA WebLogic Server and Express unauthorized access
                        to Web applications
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Any operating system Any version, WebLogic Server
                        and Express 7.0 through SP5, WebLogic Server and
                        Express 8.1 through 8.1 SP2
    Vulnerability: weblogic-application-unauth-access
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16123

    Date Reported: 05/11/2004
    Brief Description: Surfboard long argument buffer overflow
    Risk Factor: High
    Attack Type: Host Based
    Platforms: Linux Any version, Surfboard 1.1.6, Unix Any
                        version
    Vulnerability: surfboard-long-argument-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16124

    Date Reported: 05/13/2004
    Brief Description: Opera onUnload URL spoofing
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Opera 7.23, Windows Any version
    Vulnerability: opera-onunload-url-spoofing
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16131

    Date Reported: 05/12/2004
    Brief Description: Symantec Firewalls DNS response packets denial of
                        service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Norton AntiSpam 2004, Norton Internet Security
                        2002, Norton Internet Security 2002 Pro, Norton
                        Internet Security 2003, Norton Internet Security
                        2003 Pro, Norton Internet Security 2004, Norton
                        Internet Security 2004 Pro, Norton Personal
                        Firewall 2003, Norton Personal Firewall 2004,
                        Norton Personal Firewall 2002 Any version, Symantec
                        Client Firewall 5.01 and 5.1.1, Symantec Client
                        Security 1.0 and 1.1, Symantec Client Security 2.0,
                        Windows Any version
    Vulnerability: symantec-firewall-dns-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16132

    Date Reported: 05/13/2004
    Brief Description: Outpost Firewall Pro packet denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Outpost Firewall Pro 2.1, Windows Any version
    Vulnerability: outpost-packet-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16133

    Date Reported: 05/12/2004
    Brief Description: Symantec NBNS response buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Norton AntiSpam 2004, Norton Internet Security
                        2002, Norton Internet Security 2002 Pro, Norton
                        Internet Security 2003, Norton Internet Security
                        2003 Pro, Norton Internet Security 2004, Norton
                        Internet Security 2004 Pro, Norton Personal
                        Firewall 2003, Norton Personal Firewall 2004,
                        Norton Personal Firewall 2002 Any version, Symantec
                        Client Firewall 5.01 and 5.1.1, Symantec Client
                        Security 1.0 and 1.1, Symantec Client Security
                        2.0(SCF 7.1), Symantec Client Security 2.0(SCF
                        7.1), Symantec Client Security 2.0(SCF 7.1),
                        Windows Any version
    Vulnerability: symantec-nbns-response-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16134

    Date Reported: 05/12/2004
    Brief Description: Symantec Firewalls NBNS packet buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Norton AntiSpam 2004, Norton Internet Security
                        2002, Norton Internet Security 2002 Pro, Norton
                        Internet Security 2003, Norton Internet Security
                        2003 Pro, Norton Internet Security 2004, Norton
                        Internet Security 2004 Pro, Norton Personal
                        Firewall 2003, Norton Personal Firewall 2004,
                        Norton Personal Firewall 2002 Any version, Symantec
                        Client Firewall 5.01 and 5.1.1, Symantec Client
                        Security 1.0 and 1.1, Symantec Client Security 2.0,
                        Windows Any version
    Vulnerability: symantec-firewalls-nbns-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16135

    Date Reported: 05/12/2004
    Brief Description: ZoneMinder zms buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Linux Any version, ZoneMinder prior to 1.19.2
    Vulnerability: zoneminder-zms-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16136

    Date Reported: 05/12/2004
    Brief Description: Symantec DNS response buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Norton AntiSpam 2004, Norton Internet Security
                        2002, Norton Internet Security 2002 Pro, Norton
                        Internet Security 2003, Norton Internet Security
                        2003 Pro, Norton Internet Security 2004, Norton
                        Internet Security 2004 Pro, Norton Personal
                        Firewall 2003, Norton Personal Firewall 2004,
                        Norton Personal Firewall 2002 Any version, Symantec
                        Client Firewall 5.01 and 5.1.1, Symantec Client
                        Security 1.0 and 1.1, Symantec Client Security
                        2.0(SCF 7.1), Symantec Client Security 2.0(SCF
                        7.1), Symantec Client Security 2.0(SCF 7.1),
                        Windows Any version
    Vulnerability: symantec-dns-response-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16137

    Date Reported: 05/13/2004
    Brief Description: IEEE 802.11 wireless LAN devices CCA denial of
                        service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: 802.11 Wireless Access Points Any version, 802.11
                        Wireless Clients Any version
    Vulnerability: ieee80211-cca-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16138

    Date Reported: 05/12/2004
    Brief Description: Opera Telnet file overwrite
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linux Any version, Opera 7.23, Windows Any version
    Vulnerability: opera-telnet-file-overwrite
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16139

    Date Reported: 05/12/2004
    Brief Description: Sweex Wireless Broadband Router information
                        disclosure
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Sweex Wireless Broadband Router LC000060, Windows
                        98 Second Edition, Windows Me, Windows 2000 Any
                        version, Windows XP Any version
    Vulnerability: sweex-router-obtain-information
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16140

    Date Reported: 05/13/2004
    Brief Description: Linksys EtherFast routers BOOTP packet denial of
                        service
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Linksys EtherFast BEFSR41 prior to 1.05.00, Linksys
                        EtherFast BEFW11S4 Any version
    Vulnerability: linksys-etherfast-bootp-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16142

    Date Reported: 05/13/2004
    Brief Description: mah-jong NULL pointer denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Debian Linux 3.0, Mah-Jong Any version
    Vulnerability: mah-jong-null-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16143

    Date Reported: 05/13/2004
    Brief Description: Solaris Management Console "dot dot" directory
                        traversal
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Solaris 8, Solaris 9, Solaris Management Console
                        Server Any version
    Vulnerability: smc-dotdot-directory-traversal
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16146

    Date Reported: 05/13/2004
    Brief Description: Microsoft Internet Explorer showHelp CHM file
                        execution
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Microsoft Internet Explorer 6.0, Windows Any
                        version
    Vulnerability: ie-showhelp-chm-execution
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16147

    Date Reported: 05/13/2004
    Brief Description: Ethereal SIP packet denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Any operating system Any version, Ethereal 0.10.3
    Vulnerability: ethereal-sip-packet-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16148

    Date Reported: 05/13/2004
    Brief Description: Ethereal AIM dissector denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Any operating system Any version, Ethereal 0.10.3
    Vulnerability: ethereal-aim-dissector-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16150

    Date Reported: 05/13/2004
    Brief Description: Ethereal SPNEGO dissector denial of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Any operating system Any version, Ethereal 0.9.8
                        through 0.10.3
    Vulnerability: ethereal-spnego-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16151

    Date Reported: 05/13/2004
    Brief Description: Ethereal MMSE dissector buffer overflow
    Risk Factor: High
    Attack Type: Network Based
    Platforms: Any operating system Any version, Ethereal 0.10.1 -
                        0.10.3
    Vulnerability: ethereal-mmse-bo
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16152

    Date Reported: 05/10/2004
    Brief Description: Squid Web Proxy Cache send URL to bypass security
    Risk Factor: Medium
    Attack Type: Network Based
    Platforms: Squid Web Proxy Cache 2.3STABLE5, Unix Any version
    Vulnerability: squid-url-bypass-security
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16153

    Date Reported: 05/11/2004
    Brief Description: Microsoft Windows NT 4.0 TSE Security Patch denial
                        of service
    Risk Factor: Low
    Attack Type: Network Based
    Platforms: Windows NT 4.0 TSE
    Vulnerability: winnt-patch-dos
    X-Force URL: http://xforce.iss.net/xforce/xfdb/16154

    _____

    Risk Factor Key:

         High Security issues that allow immediate remote, or local access
                  or immediate execution of code or commands, with unauthorized
                  privileges. Examples are most buffer overflows, backdoors,
                  default or no password, and bypassing security on firewalls
                  or other network components.
         Medium Security issues that have the potential of granting access or
                  allowing code execution by means of complex ory lengthy exploit
                  procedures, or low risk issues applied to major Internet
                  components. Examples are cross-site scripting, man-in-the-middle
                  attacks, SQL injection, denial of service of major applications,
                  and denial of service resulting in system information disclosure
                  (such as core files).
         Low Security issues that deny service or provide non-system
                  information that could be used to formulate structured attacks
                  on a target, but not directly gain unauthorized access. Examples
                  are brute force attacks, non-system information disclosure
                  (configurations, paths, etc.), and denial of service attacks.

    ______

    About Internet Security Systems (ISS)
    Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a pioneer and
    world leader in software and services that protect critical online resources from
    an ever-changing spectrum of threats and misuse. Internet Security Systems is
    headquartered in Atlanta, GA, with additional operations throughout the Americas,
    Asia, Australia, Europe and the Middle East.

    Copyright (c) 2004 Internet Security Systems, Inc. All rights reserved worldwide.

    Permission is hereby granted for the electronic redistribution of this document.
    It is not to be edited or altered in any way without the express written consent
    of the Internet Security Systems X-Force. If you wish to reprint the whole or any
    part of this document in any other medium excluding electronic media, please email
    xforce@iss.net for permission.

    Disclaimer: The information within this paper may change without notice. Internet
    Security Systems provides this information on an AS IS basis with NO warranties,
    implied or otherwise. Any use of this information is at the user's risk. In no
    event shall Internet Security Systems be held liable for any damages whatsoever
    arising out of or in connection with the use or dissemination of this information.

    X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, as
    well as at http://xforce.iss.net/xforce/sensitive.php

    Please send suggestions, updates, and comments to: X-Force xforce@iss.net of
    Internet Security Systems, Inc.

    _______________________________________________
    TO SUBSCRIBE, UNSUBSCRIBE, OR CHANGE YOUR SUBSCRIPTION, go to
    https://atla-mm1.iss.net/mailman/listinfo/alert

    To contact the ISS Alert List Administrator, send email to
    mod-alert@iss.net

    The ISS Alert mailing list is hosted and managed by Internet Security
    Systems, 6303 Barfield Road, Atlanta, Georgia, USA 30328.

    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2

    iQCVAwUBQKj6pjRfJiV99eG9AQEFZAP/UYD5tYqnJMO4Z/v3B4KnvxZ2f3Z5no/1
    2LUB3ovk2UdHbtEqNdAE4lEys+zKwSXzXkJLDt+eRLef55XzSnm7QzaQNIOJvJVV
    5Upt36xxcv9e9bYxwgohc6587leSFbZA6gQGhY3YtPiEPBrdmHHTYXQRvJTWjVkz
    Y2pq1Y9uY54=
    =36jm
    -----END PGP SIGNATURE-----


  • Next message: X-Force: "ISS Security Alert Summary AS04-21"