ISS Security Alert Summary AS04-26

From: X-Force (xforce_at_iss.net)
Date: 06/28/04


Date: Mon, 28 Jun 2004 12:49:25 -0400 (EDT)
To: alert@iss.net


-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Alert Summary AS04-26
June 28, 2004

X-Force Vulnerability and Threat Database: http://xforce.iss.net/

Attention ISS Alert subscribers: In an effort to reserve communication via
this mailing list for high priority security issues only,
Internet Security Systems will discontinue the weekly Alert Summary report at
the end of June, 2004. The June 28th edition will be the last Alert Summary
published. ISS will continue to release high priority Alerts and Advisories
via this mailing list after that date. ISS X-Force will send Alerts when
X-Force learns of a serious vulnerability or threat posing significant risk
to customers and the public, and Advisories will contain vulnerability
information stemming from original, internal X-Force research. Subscribers
to our X-Force Threat Analysis Service (XFTAS) can access the information
currently contained in the weekly Alert Summary in addition to current
and forecast assessments with links to recommended fixes and security
advice for active vulnerabilities, viruses, worms, and threats. To subscribe
to XFTAS, please visit http://xforce.iss.net/xftas/ or contact sales@iss.net.

This summary is available at the following address:
http://xforce.iss.net/xforce/alerts/id/AS04-26

Contents:
* 57 Reported Vulnerabilities
* Risk Factor Key
_____

Date Reported: 06/21/2004
Brief Description: Microsoft MN-500 Web administration denial of
                    service
Risk Factor: Low
Attack Type: Network Based
Platforms: MN-500 Wireless Router Any version, Windows Any
                    version
Vulnerability: mn500-web-admin-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16448

Date Reported: 06/18/2004
Brief Description: Linux Kernel multiple drivers allows elevated
                    privileges
Risk Factor: High
Attack Type: Host Based
Platforms: Linux kernel 2.4, Linux kernel 2.6, Red Hat
                    Enterprise Linux 2.1AS, Red Hat Enterprise Linux
                    2.1ES, Red Hat Enterprise Linux 2.1WS, Red Hat
                    Enterprise Linux 3AS, Red Hat Enterprise Linux 3ES,
                    Red Hat Enterprise Linux 3WS, Red Hat Linux 3.0,
                    Trustix Secure Enterprise Linux 2, Trustix Secure
                    Linux 2.0, Trustix Secure Linux 2.1
Vulnerability: linux-drivers-gain-privileges
X-Force URL: http://xforce.iss.net/xforce/xfdb/16449

Date Reported: 06/18/2004
Brief Description: Sun Solaris configured as Kerberos logs passwords
                    in plain text
Risk Factor: Medium
Attack Type: Host Based
Platforms: Solaris 9
Vulnerability: solaris-kerberos-password-plaintext
X-Force URL: http://xforce.iss.net/xforce/xfdb/16450

Date Reported: 06/18/2004
Brief Description: Unreal Game Engine secure query command execution
Risk Factor: High
Attack Type: Network Based
Platforms: DeusEx 1.112fm and prior, Devastation 390 and
                    prior, Linux Any version, Mac OS Server Any
                    version, Mobile Forces 20000 and prior, Nerf Arena
                    Blast 1.2 and prior, Postal 2 1337 and prior, Rune
                    107 and prior, Tactical Ops 3.4.0 and prior, TNN
                    Pro Hunter any version, Unreal 226f and prior,
                    Unreal II XMP 7710 and prior, Unreal Tournament
                    451b and prior, Unreal Tournament 2003 2225 and
                    prior, Unreal Tournament 2004 prior to 3236, Wheel
                    of Time 333b and prior, Windows Any version, X-COM
                    Enforcer any version
Vulnerability: unreal-secure-query-command-execute
X-Force URL: http://xforce.iss.net/xforce/xfdb/16451

Date Reported: 06/19/2004
Brief Description: ISS Internet Scanner bypass key restrictions
Risk Factor: Low
Attack Type: Host Based
Platforms: Internet Scanner 7.0, Windows Any version
Vulnerability: is-key-restrictions-bypass
X-Force URL: http://xforce.iss.net/xforce/xfdb/16452

Date Reported: 06/19/2004
Brief Description: rlpr msg format string attack
Risk Factor: High
Attack Type: Network Based
Platforms: Debian Linux 3.0, rlpr 2.04
Vulnerability: rlpr-msg-format-string
X-Force URL: http://xforce.iss.net/xforce/xfdb/16453

Date Reported: 06/19/2004
Brief Description: rlpr msg buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Debian Linux 3.0, rlpr 2.04
Vulnerability: rlpr-msg-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16454

Date Reported: 06/20/2004
Brief Description: www-sql cgi.c command execution
Risk Factor: High
Attack Type: Host Based
Platforms: Debian Linux 3.0, Linux Any version, Unix Any
                    version, www-sql 0.5.7
Vulnerability: wwwsql-cgi-command-execution
X-Force URL: http://xforce.iss.net/xforce/xfdb/16455

Date Reported: 06/18/2004
Brief Description: DNS One DHCP report cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: DNS One prior to 2.4.0-8
Vulnerability: dnsone-dhcp-report-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16456

Date Reported: 06/18/2004
Brief Description: ircd-hybrid and ircd-ratbox parse_client_queued
                    function denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: IRCd-hybrid 7.0.1 and earlier, IRCd-ratbox 1.5.1
                    and earlier, IRCd-ratbox 2.0rc6 and earlier, Unix
                    Any version
Vulnerability: ircd-parseclientqueued-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16457

Date Reported: 06/19/2004
Brief Description: super format string attack
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, super 3.22.2 and earlier, Unix
                    Any version
Vulnerability: super-format-string
X-Force URL: http://xforce.iss.net/xforce/xfdb/16458

Date Reported: 06/19/2004
Brief Description: SUP format string attack
Risk Factor: High
Attack Type: Network Based
Platforms: Debian Linux 3.0, SUP Any version
Vulnerability: sup-format-string
X-Force URL: http://xforce.iss.net/xforce/xfdb/16459

Date Reported: 06/21/2004
Brief Description: Linksys BEFSR41 connection denial of service
Risk Factor: Low
Attack Type: Host Based
Platforms: Linksys EtherFast BEFSR41 any version
Vulnerability: linksys-connection-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16460

Date Reported: 06/15/2004
Brief Description: Invision Power Board IP address spoofing
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, Invision Power
                    Board 1.1
Vulnerability: invision-ip-address-spoofing
X-Force URL: http://xforce.iss.net/xforce/xfdb/16461

Date Reported: 06/21/2004
Brief Description: NETGEAR FVS318 denial of service
Risk Factor: Low
Attack Type: Host Based
Platforms: NETGEAR FVS318 Any version
Vulnerability: netgear-fvs318-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16462

Date Reported: 06/18/2004
Brief Description: Sun StorEdge Enterprise Storage Manager ESMuser
                    allows elevated privileges
Risk Factor: High
Attack Type: Host Based
Platforms: Solaris 8 SPARC, Solaris 9 SPARC, Sun StorEdge
                    Enterprise Storage Manager 2.1
Vulnerability: esm-esmuser-gain-privileges
X-Force URL: http://xforce.iss.net/xforce/xfdb/16463

Date Reported: 06/18/2004
Brief Description: HP-UX xfs buffer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: HP-UX 11.00
Vulnerability: hp-xfs-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16464

Date Reported: 06/18/2004
Brief Description: MoinMoin allows administrative access
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, MoinMoin prior to
                    1.2.2
Vulnerability: moinmoin-gain-admin-access
X-Force URL: http://xforce.iss.net/xforce/xfdb/16465

Date Reported: 06/21/2004
Brief Description: GNU Radius SNMP message invalid OID denial of
                    service
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, GNU Radius 1.1
Vulnerability: radius-snmp-oid-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16466

Date Reported: 06/21/2004
Brief Description: SqWebMail print_header-uc function cross-site
                    scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, SqWebMail 4.0.4.20040524, Unix
                    Any version
Vulnerability: sqwebmail-print-header-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16467

Date Reported: 06/21/2004
Brief Description: D-Link AirPlus DI-614+ DHCP cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: D-Link AirPlus DI-614+ 2.30, D-Link AirPlus DI-704p
                    2.60b2
Vulnerability: dlink614-dhcp-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16468

Date Reported: 06/22/2004
Brief Description: nCipher netHSM stores pass phrase in plain text
Risk Factor: Medium
Attack Type: Host Based
Platforms: nCipher netHSM prior to 2.1.12cam5, Windows Any
                    version
Vulnerability: ncipher-nethsm-passphrase-plaintext
X-Force URL: http://xforce.iss.net/xforce/xfdb/16469

Date Reported: 06/22/2004
Brief Description: rssh allows an attacker to obtain information
                    outside of jail
Risk Factor: Medium
Attack Type: Host Based
Platforms: Linux Any version, OpenSSH Any version, rssh 2.0
                    through 2.1.1, Unix Any version
Vulnerability: rssh-jail-obtain-info
X-Force URL: http://xforce.iss.net/xforce/xfdb/16470

Date Reported: 06/21/2004
Brief Description: ZoneAlarm bypass Mobile Code filter
Risk Factor: Medium
Attack Type: Network Based
Platforms: Windows Any version, ZoneAlarm Pro 5.0.590.015
Vulnerability: zonealarm-mobile-code-bypass
X-Force URL: http://xforce.iss.net/xforce/xfdb/16471

Date Reported: 06/22/2004
Brief Description: BT Voyager 2000 Wireless ADSL Router account
                    password in plain text
Risk Factor: Medium
Attack Type: Network Based
Platforms: BT Voyager 2000 Wireless ADSL Router Any version
Vulnerability: bt-voyager-password-plaintext
X-Force URL: http://xforce.iss.net/xforce/xfdb/16472

Date Reported: 06/21/2004
Brief Description: ASP-Rider cookie allows administrative access
Risk Factor: Medium
Attack Type: Network Based
Platforms: ASP-Rider 1.6, Windows Any version
Vulnerability: asprider-cookie-gain-access
X-Force URL: http://xforce.iss.net/xforce/xfdb/16473

Date Reported: 06/22/2004
Brief Description: ISC DHCP daemon ASCII characters in log lines
                    buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Any operating system Any version, ISC DHCP
                    3.0.1rc12, ISC DHCP 3.0.1rc13
Vulnerability: dhcp-ascii-log-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16475

Date Reported: 06/22/2004
Brief Description: ISC DHCP daemon C include file buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: AIX Any version, Caldera OpenServer Any version,
                    Caldera OpenUnix Any version, Cygwin Any version,
                    HP-UX Any version, IRIX Any version, ISC DHCP
                    3.0.1rc12, ISC DHCP 3.0.1rc13, Linux Any version,
                    Mandrake Linux 10.0, Mandrake Linux 9.2, NeXTSTEP
                    Any version, SunOS 4.0, SunOS 5.5, SuSE Linux 8.0,
                    SuSE Linux 8.1, SuSE Linux 8.2, SuSE Linux 9.0,
                    SuSE Linux 9.1, Ultrix Any version
Vulnerability: dhcp-c-include-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16476

Date Reported: 06/21/2004
Brief Description: osTicket PHP file upload
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, osTicket Any
                    version
Vulnerability: osticket-php-file-upload
X-Force URL: http://xforce.iss.net/xforce/xfdb/16477

Date Reported: 06/21/2004
Brief Description: osTicket could allow an attacker to view ticket
                    attachments
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, osTicket Any
                    version
Vulnerability: osticket-view-attachments
X-Force URL: http://xforce.iss.net/xforce/xfdb/16478

Date Reported: 06/20/2004
Brief Description: aMSN hotlog.htm allows attacker to obtain passwords
Risk Factor: Medium
Attack Type: Host Based
Platforms: aMSN 0.90, Windows Any version
Vulnerability: amsn-hotlog-obtain-passwords
X-Force URL: http://xforce.iss.net/xforce/xfdb/16479

Date Reported: 06/22/2004
Brief Description: Linux Kernel IEEE 1394 driver integer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: Linux kernel 2.4, Linux kernel 2.6
Vulnerability: linux-1394-integer-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16480

Date Reported: 06/22/2004
Brief Description: ArbitroWeb rawURL cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, ArbitroWeb 0.6
Vulnerability: arbitroweb-rawurl-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16481

Date Reported: 06/23/2004
Brief Description: cplay creates insecure temporary files
Risk Factor: Medium
Attack Type: Host Based
Platforms: cplay 1.49, Linux Any version
Vulnerability: cplay-tmpfile-insecure
X-Force URL: http://xforce.iss.net/xforce/xfdb/16482

Date Reported: 06/22/2004
Brief Description: Sun Solaris BSM audit denial of service
Risk Factor: Low
Attack Type: Host Based
Platforms: Solaris 7, Solaris 8, Solaris 9
Vulnerability: solaris-bsm-audit-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16483

Date Reported: 06/22/2004
Brief Description: PHP-Nuke voteinclude.php path disclosure
Risk Factor: Low
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-voteinclude-path-disclosure
X-Force URL: http://xforce.iss.net/xforce/xfdb/16484

Date Reported: 06/22/2004
Brief Description: PHP-Nuke statistics path disclosure
Risk Factor: Low
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-statistics-path-disclosure
X-Force URL: http://xforce.iss.net/xforce/xfdb/16485

Date Reported: 06/22/2004
Brief Description: PHP-Nuke add.php path disclosure
Risk Factor: Low
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-add-path-disclosure
X-Force URL: http://xforce.iss.net/xforce/xfdb/16486

Date Reported: 06/19/2004
Brief Description: Novell ichain has default SNMP community string
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, iChain 2.2,
                    iChain 2.3
Vulnerability: ichain-default-snmp
X-Force URL: http://xforce.iss.net/xforce/xfdb/16487

Date Reported: 06/22/2004
Brief Description: PHP-Nuke modify.php path disclosure
Risk Factor: Low
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-modify-path-disclosure
X-Force URL: http://xforce.iss.net/xforce/xfdb/16488

Date Reported: 06/22/2004
Brief Description: PHP-Nuke Journal allows multiple cross-site
                    scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-journal-multiple-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16489

Date Reported: 06/22/2004
Brief Description: PHP-Nuke journal entry cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-journal-entry-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16490

Date Reported: 06/22/2004
Brief Description: PHP-Nuke GET comment deletion
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-get-comment-deletion
X-Force URL: http://xforce.iss.net/xforce/xfdb/16491

Date Reported: 06/22/2004
Brief Description: PHP-Nuke savenew.php add journal entries
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-savenew-add-entry
X-Force URL: http://xforce.iss.net/xforce/xfdb/16492

Date Reported: 06/22/2004
Brief Description: PHP-Nuke search.php SQL injection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, PHP-Nuke Any
                    version
Vulnerability: phpnuke-forwhat-sql-injection
X-Force URL: http://xforce.iss.net/xforce/xfdb/16493

Date Reported: 06/23/2004
Brief Description: Broadcom 5820 Cryptonet Driver add_dsa_buf_bytes
                    integer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version
Vulnerability: bcm5820-adddsabufbytes-integer-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16495

Date Reported: 06/23/2004
Brief Description: Lotus Notes Notes URL handler cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Lotus Notes 6.0.3, Lotus Notes 6.5, Windows Any
                    version
Vulnerability: lotus-notes-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16496

Date Reported: 06/24/2004
Brief Description: 3Com SuperStack 4400 Switches Web management
                    interface denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: 3Com SuperStack 3 Switch 4400 prior to 3.31, 3Com
                    SuperStack 3 Switch 4400 FX prior to 3.31, 3Com
                    SuperStack 3 Switch 4400 PWR prior to 3.31, 3Com
                    SuperStack 3 Switch 4400 SE prior to 3.31
Vulnerability: 3com-superstack-mngmt-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16497

Date Reported: 06/24/2004
Brief Description: php-exec-dir semicolon bypass restriction
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, php-exec-dir Any
                    version
Vulnerability: phpexecdir-semicolon-restriction-bypass
X-Force URL: http://xforce.iss.net/xforce/xfdb/16498

Date Reported: 06/25/2004
Brief Description: FreeBSD execve denial of service
Risk Factor: Low
Attack Type: Host Based
Platforms: FreeBSD 5.1-RELEASE/Alpha
Vulnerability: freebsd-execve-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16499

Date Reported: 06/24/2004
Brief Description: vBulletin newreply.php and newthread.php cross-site
                    scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Any operating system Any version, vBulletin 3.0.1
                    and earlier
Vulnerability: vbulletin-newreply-newthread-xss
X-Force URL: http://xforce.iss.net/xforce/xfdb/16502

Date Reported: 06/24/2004
Brief Description: gzip gzexe script creates insecure temporary files
Risk Factor: High
Attack Type: Host Based / Network Based
Platforms: Gentoo Linux Any version, gzip Any version
Vulnerability: gzip-gzexe-tmpfile
X-Force URL: http://xforce.iss.net/xforce/xfdb/16506

Date Reported: 06/24/2004
Brief Description: ZWS Newsletter allows administrative access
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, ZWS Newsletter
                    Any version
Vulnerability: zws-gain-admin-access
X-Force URL: http://xforce.iss.net/xforce/xfdb/16507

Date Reported: 06/25/2004
Brief Description: giFT-FastTrack daemon denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: giFT-FastTrack 0.8.6 and prior, Linux Any version
Vulnerability: gift-fasttrack-daemon-dos
X-Force URL: http://xforce.iss.net/xforce/xfdb/16508

Date Reported: 06/25/2004
Brief Description: Confixx backup script allows attacker to view files
Risk Factor: Medium
Attack Type: Network Based
Platforms: Confixx Any version, Linux Any version
Vulnerability: confixx-backup-view-files
X-Force URL: http://xforce.iss.net/xforce/xfdb/16510

Date Reported: 06/25/2004
Brief Description: Dr.Cat invalid file name buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms: Dr.Cat Any version, Linux Any version
Vulnerability: drcat-invalid-filename-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16511

Date Reported: 06/25/2004
Brief Description: Dr.Cat buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms: Dr.Cat Any version, Linux Any version
Vulnerability: drcat-bo
X-Force URL: http://xforce.iss.net/xforce/xfdb/16512

_____

Risk Factor Key:

     High Security issues that allow immediate remote, or local access
              or immediate execution of code or commands, with unauthorized
              privileges. Examples are most buffer overflows, backdoors,
              default or no password, and bypassing security on firewalls
              or other network components.
     Medium Security issues that have the potential of granting access or
              allowing code execution by means of complex or lengthy exploit
              procedures, or low risk issues applied to major Internet
              components. Examples are cross-site scripting, man-in-the-middle
              attacks, SQL injection, denial of service of major applications,
              and denial of service resulting in system information disclosure
              (such as core files).
     Low Security issues that deny service or provide non-system
              information that could be used to formulate structured attacks
              on a target, but not directly gain unauthorized access. Examples
              are brute force attacks, non-system information disclosure
              (configurations, paths, etc.), and denial of service attacks.

______

About Internet Security Systems (ISS)
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a pioneer and
world leader in software and services that protect critical online resources from
an ever-changing spectrum of threats and misuse. Internet Security Systems is
headquartered in Atlanta, GA, with additional operations throughout the Americas,
Asia, Australia, Europe and the Middle East.

Copyright (c) 2004 Internet Security Systems, Inc. All rights reserved worldwide.

Permission is hereby granted for the electronic redistribution of this document.
It is not to be edited or altered in any way without the express written consent
of the Internet Security Systems X-Force. If you wish to reprint the whole or any
part of this document in any other medium excluding electronic media, please email
xforce@iss.net for permission.

Disclaimer: The information within this paper may change without notice. Internet
Security Systems provides this information on an AS IS basis with NO warranties,
implied or otherwise. Any use of this information is at the user's risk. In no
event shall Internet Security Systems be held liable for any damages whatsoever
arising out of or in connection with the use or dissemination of this information.

X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, as
well as at http://xforce.iss.net/xforce/sensitive.php

Please send suggestions, updates, and comments to: X-Force xforce@iss.net of
Internet Security Systems, Inc.

_______________________________________________
TO SUBSCRIBE, UNSUBSCRIBE, OR CHANGE YOUR SUBSCRIPTION, go to
https://atla-mm1.iss.net/mailman/listinfo/alert

To contact the ISS Alert List Administrator, send email to
mod-alert@iss.net

The ISS Alert mailing list is hosted and managed by Internet Security
Systems, 6303 Barfield Road, Atlanta, Georgia, USA 30328.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBQOBL/jRfJiV99eG9AQHCcAP/fNJJP4cgieUy4+/oeRn6+PI18Fg47OYd
I8LX5q4Zo/mm1QevsYXvburEeUuKHNFsn4zc9Sf01GpQIqHzqqvrJI0Q5qX5Arct
1A05MdsFxyshkWWSNkuB8NweLZm5ACWjcVzibMRiIKYI17cxPPTg+QZhXEFKlXQr
3R6YV8B41Js=
=eDNe
-----END PGP SIGNATURE-----