[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ISS Security Alert Summary AS04-02



-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Alert Summary AS04-02
January 12, 2004

X-Force Vulnerability and Threat Database:
http://xforce.iss.net/

To receive these Alert Summaries, as well as other Alerts and
Advisories, subscribe to the Internet Security Systems Alert
mailing list at: 
https://atla-mm1.iss.net/mailman/listinfo/alert

This summary is available at the following address:
http://xforce.iss.net/xforce/alerts/id/AS04-02
_____ 
Contents:
* 38 Reported Vulnerabilities
* Risk Factor Key

Date Reported:      01/06/2004
Brief Description:  PostCalendar search SQL injection
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Linux Any version, PostCalendar 4.0.0, Unix Any
                    version, Windows Any version
Vulnerability:      postcalendar-search-sql-injection
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14111

Date Reported:      01/01/2004
Brief Description:  Microsoft Internet Explorer .lnk shortcuts could
                    allow code execution
Risk Factor:        High
Attack Type:        Network Based
Platforms:          Microsoft Internet Explorer 5.5, Microsoft Internet
                    Explorer 6.0, Windows Any version
Vulnerability:      ie-lnk-code-execution
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14127

Date Reported:      01/02/2004
Brief Description:  Microsoft Word could allow an attacker to bypass
                    'Protect Form' feature
Risk Factor:        Medium
Attack Type:        Host Based
Platforms:          Microsoft Word 2000, Microsoft Word 2002, Microsoft
                    Word 2003, Windows Any version
Vulnerability:      word-protect-forms-bypass
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14128

Date Reported:      01/02/2004
Brief Description:  Webcam Watchdog HTTP GET buffer overflow
Risk Factor:        High
Attack Type:        Network Based
Platforms:          Webcam Watchdog 3.63 and earlier, Windows Any
                    version
Vulnerability:      webcam-watchdog-get-bo
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14131

Date Reported:      01/05/2004
Brief Description:  Flash FTP Server "dot dot" directory traversal
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Flash FTP Server 1.0, Flash FTP Server 2.1, Windows
                    Any version
Vulnerability:      flashftpserver-dotdot-directory-traversal
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14133

Date Reported:      01/05/2004
Brief Description:  Linux kernel do_mremap allows elevated privileges
Risk Factor:        High
Attack Type:        Host Based
Platforms:          Conectiva Linux 8.0, Conectiva Linux 9.0, Debian
                    Linux 3.0, EnGarde Secure Linux Community Edition
                    2, EnGarde Secure Linux Professional Ed 1.5, Fedora
                    Core 1, Immunix OS 7.3, Linux kernel 2.4, Linux
                    kernel 2.6, Mandrake Linux 9.0, Mandrake Linux 9.1,
                    Mandrake Linux 9.2, Mandrake Linux Corporate Server
                    2.1, Mandrake Multi Network Firewall 8.2, Red Hat
                    Advanced Workstation 2.1, Red Hat Enterprise Linux
                    2.1AS, Red Hat Enterprise Linux 2.1ES, Red Hat
                    Enterprise Linux 2.1WS, Red Hat Linux 7.1, Red Hat
                    Linux 7.2, Red Hat Linux 7.3, Red Hat Linux 8.0,
                    Red Hat Linux 9, Slackware Linux 9.0, Slackware
                    Linux 9.1, Slackware Linux current, SuSE eMail
                    Server 3.1, SuSE eMail Server III Any version, SuSE
                    Linux 8.0, SuSE Linux 8.1, SuSE Linux 8.2, SuSE
                    Linux 9.0, SuSE Linux Database Server Any version,
                    SuSE Linux Desktop 1.0, SuSE Linux Enterprise
                    Server 7, SuSE Linux Firewall Any version, SuSE
                    Linux Office Server Any version, SuSE Linux School
                    Server Any version, Trustix Secure Linux 2.0,
                    Turbolinux 10 Desktop, Turbolinux 7 Server,
                    Turbolinux 7 Workstation, Turbolinux 8 Server,
                    Turbolinux 8 Workstation
Vulnerability:      linux-domremap-gain-privileges
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14135

Date Reported:      01/02/2004
Brief Description:  EasyDynamicPages PHP file include
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          EasyDynamicPages 2.0, Linux Any version, Unix Any
                    version, Windows Any version
Vulnerability:      easydynamicpages-php-file-include
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14136

Date Reported:      01/02/2004
Brief Description:  GoodTech Telnet Server for Windows NT/2000/XP long
                    string denial of service
Risk Factor:        Low
Attack Type:        Network Based
Platforms:          GoodTech Telnet Server WindowsNT/2000/XP 4.0.103,
                    Windows 2000 Any version, Windows NT Any version,
                    Windows XP Any version
Vulnerability:      goodtechtelnet-long-string-dos
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14137

Date Reported:      01/02/2004
Brief Description:  PostNuke sortby SQL injection
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Linux Any version, PostNuke Phoenix 0.7.2.6 and
                    earlier, Unix Any version, Windows Any version
Vulnerability:      postnuke-sortby-sql-injection
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14138

Date Reported:      12/29/2003
Brief Description:  BulletScript bsml.pl script information disclosure
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          BulletScript Any version, Windows Any version
Vulnerability:      bulletscript-bsmlpl-obtain-information
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14139

Date Reported:      01/03/2004
Brief Description:  HotNews PHP file include
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Any operating system Any version, HotNews 0.7.2 and
                    earlier
Vulnerability:      hotnews-php-file-include
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14140

Date Reported:      01/05/2004
Brief Description:  nd long string buffer overflow
Risk Factor:        High
Attack Type:        Network Based
Platforms:          Debian Linux 3.0, nd 0.8.1 and earlier
Vulnerability:      nd-long-string-bo
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14141

Date Reported:      01/06/2004
Brief Description:  ThWboard board.php cross-site scripting
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Linux Any version, ThWboard prior to Beta 2.84,
                    Unix Any version, Windows Any version
Vulnerability:      thwboard-board-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14143

Date Reported:      01/05/2004
Brief Description:  vBulletin Forum 2.3.xx calendar.php script SQL
                    Injection
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Linux Any version, Unix Any version, vBulletin
                    2.3.xx and earlier, Windows Any version
Vulnerability:      vbulletin-calendar-sql-injection
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14144

Date Reported:      01/05/2004
Brief Description:  Phorum common.php, profile.php, and login.php
                    script cross-site scripting
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Linux Any version, Phorum 3.4.5 and earlier, Unix
                    Any version, Windows Any version
Vulnerability:      phorum-common-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14145

Date Reported:      01/05/2004
Brief Description:  Phorum register.php script SQL injection
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Linux Any version, Phorum 3.4.5 and earlier, Unix
                    Any version, Windows Any version
Vulnerability:      phorum-register-sql-injection
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14146

Date Reported:      01/05/2004
Brief Description:  FreznoShop search.php script cross-site scripting
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          FreznoShop 1.3.0 RC1and earlier, Linux Any version,
                    Unix Any version, Windows Any version
Vulnerability:      freznoshop-searchphp-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14147

Date Reported:      01/05/2004
Brief Description:  mpg321 mp3 file format string
Risk Factor:        High
Attack Type:        Network Based
Platforms:          Debian Linux 3.0, mpg321 prior to 0.2.10.2
Vulnerability:      mpg321-mp3-format-string
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14148

Date Reported:      01/05/2004
Brief Description:  FirstClass Client executes code without displaying
                    a warning dialog
Risk Factor:        High
Attack Type:        Host Based
Platforms:          FirstClass Client 7.1, Mac OS Any version, Mac OS X
                    Any version, Windows Any version
Vulnerability:      firstclassclient-execute-code
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14151

Date Reported:      01/06/2004
Brief Description:  Lotus Notes and Domino notes.ini file has insecure
                    permissions
Risk Factor:        High
Attack Type:        Host Based
Platforms:          Linux Any version, Lotus Domino 6.0.2, Lotus Notes
                    6.0.2
Vulnerability:      lotus-notes-insecure-permissions
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14153

Date Reported:      01/06/2004
Brief Description:  KpyM Telnet Server multiple connections denial of
                    service
Risk Factor:        Low
Attack Type:        Network Based
Platforms:          KpyM Telnet Server 1.05 and earlier, Windows Any
                    version
Vulnerability:      kpymtelnetserver-multiple-connections-dos
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14157

Date Reported:      01/07/2004
Brief Description:  Jabber SSL connections denial of service
Risk Factor:        Low
Attack Type:        Network Based
Platforms:          Debian Linux 3.0, Jabber prior to 1.4.3, Linux Any
                    version, Unix Any version, Windows Any version
Vulnerability:      jabber-ssl-connections-dos
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14158

Date Reported:      01/06/2004
Brief Description:  PhpGedView $PGV_BASE_DIRECTORY PHP file include
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Any operating system Any version, PhpGedView 2.61
Vulnerability:      phpgedview-pgvbasedirectory-file-include
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14159

Date Reported:      01/06/2004
Brief Description:  PhpGedView search.php cross-site scripting
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Any operating system Any version, PhpGedView 2.61
Vulnerability:      phpgedview-search-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14160

Date Reported:      01/06/2004
Brief Description:  PhpGedView allows administrative password
                    modification
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Any operating system Any version, PhpGedView 2.61
Vulnerability:      phpgedview-modify-admin-password
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14161

Date Reported:      01/06/2004
Brief Description:  PhpGedView admin.php information disclosure
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Any operating system Any version, PhpGedView 2.61
Vulnerability:      phpgedview-admin-info-disclosure
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14162

Date Reported:      01/06/2004
Brief Description:  ZyWALL cross-site scripting
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Windows Any version, ZyWALL 10 4.07
Vulnerability:      zywall-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14163

Date Reported:      01/06/2004
Brief Description:  SnapStream quotation character cross-site scripting
Risk Factor:        High
Attack Type:        Network Based
Platforms:          Snapstream PVS LITE, Unix Any version, Windows Any
                    version
Vulnerability:      snapstream-quotation-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14164

Date Reported:      01/06/2004
Brief Description:  EDIMAX AR-6004 Full Rate ADSL Router Integrated 4
                    port Switch cross-site scripting
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          EDIMAX AR-6004 Full Rate ADSL Router Any version,
                    Windows Any version
Vulnerability:      edimax-ar6004-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14165

Date Reported:      01/06/2004
Brief Description:  RealOne Player SMIL cross-site scripting
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          RealOne Player 1.0, RealOne Player 2.0, Windows Any
                    version
Vulnerability:      realoneplayer-smil-xss
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14168

Date Reported:      01/07/2004
Brief Description:  PortalApp URL allows access to database
Risk Factor:        High
Attack Type:        Network Based
Platforms:          PortalApp Any version, Windows Any version
Vulnerability:      portalapp-url-access-database
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14169

Date Reported:      01/07/2004
Brief Description:  vbox3 allows elevated privileges
Risk Factor:        High
Attack Type:        Host Based
Platforms:          Debian Linux 3.0, Linux Any version, vbox3 prior to
                    0.1.7.1
Vulnerability:      vbox3-gain-privileges
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14170

Date Reported:      01/08/2004
Brief Description:  Yahoo! Messenger filename buffer overflow
Risk Factor:        High
Attack Type:        Network Based
Platforms:          Windows Any version, Yahoo! Messenger 5.6.0.1358
                    and prior
Vulnerability:      yahoo-messenger-filename-bo
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14171

Date Reported:      01/08/2004
Brief Description:  Cisco Personal Assistant allows access to the
                    configuration file
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          Cisco Personal Assistant  1.4(1), Cisco Personal
                    Assistant  1.4(1), Cisco Personal Assistant
                    1.4(1), Cisco Personal Assistant  1.4(2), Cisco
                    Personal Assistant  1.4(2), Cisco Personal
                    Assistant  1.4(2), Windows 2000 Any version
Vulnerability:      ciscopersonalassistant-config-file-access
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14172

Date Reported:      12/30/2003
Brief Description:  SAP Internet Transaction Server (ITS) and Web
                    Application Server multiple buffer overflows
Risk Factor:        Medium
Attack Type:        Network Based
Platforms:          SAP Internet Transaction Server (ITS) Any version,
                    SAP Internet Transaction Server (ITS) Any version,
                    SAP Internet Transaction Server (ITS) Any version,
                    SAP Web Application Server Any version, Windows Any
                    version
Vulnerability:      sap-multiple-bo
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14186

Date Reported:      01/08/2004
Brief Description:  HD Soft Windows FTP Server format string
Risk Factor:        High
Attack Type:        Network Based
Platforms:          Windows Any version, Windows FTP Server 1.6 and
                    earlier
Vulnerability:      hdsoft-windowsftpserver-format-string
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14188

Date Reported:      01/08/2004
Brief Description:  Leafnode fetchnews program in network news transfer
                    protocol denial of service
Risk Factor:        Low
Attack Type:        Network Based
Platforms:          Leafnode 1.9.47 and earlier, Linux Any version,
                    Unix Any version
Vulnerability:      leafnode-fetchnews-nntp-dos
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14189

Date Reported:      01/07/2004
Brief Description:  InterNetNews ARTpost control message handling
                    buffer overflow
Risk Factor:        High
Attack Type:        Network Based
Platforms:          INN 2.4.0, INN STABLE snapshots, Linux Any version
Vulnerability:      inn-artpost-control-message-bo
X-Force URL:        http://xforce.iss.net/xforce/xfdb/14190

_____

Risk Factor Key:

     High     Security issues that allow immediate remote, or local access 
              or immediate execution of code or commands, with unauthorized 
              privileges. Examples are most buffer overflows, backdoors, 
              default or no password, and bypassing security on firewalls 
              or other network components.
     Medium   Security issues that have the potential of granting access or 
              allowing code execution by means of complex or lengthy exploit 
              procedures, or low risk issues applied to major Internet 
              components. Examples are cross-site scripting, man-in-the-middle 
              attacks, SQL injection, denial of service of major applications, 
              and denial of service resulting in system information disclosure 
              (such as core files).
     Low      Security issues that deny service or provide non-system 
              information that could be used to formulate structured attacks 
              on a target, but not directly gain unauthorized access. Examples 
              are brute force attacks, non-system information disclosure 
              (configurations, paths, etc.), and denial of service attacks.

______

About Internet Security Systems (ISS)
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
pioneer and world leader in software and services that protect critical
online resources from an ever-changing spectrum of threats and misuse.
Internet Security Systems is headquartered in Atlanta, GA, with
additional operations throughout the Americas, Asia, Australia, Europe
and the Middle East. 

Copyright (c) 2004 Internet Security Systems, Inc. All rights reserved
worldwide.

Permission is hereby granted for the electronic redistribution of this
document. It is not to be edited or altered in any way without the
express written consent of the Internet Security Systems X-Force. If you
wish to reprint the whole or any part of this document in any other
medium excluding electronic media, please email xforce@xxxxxxx for
permission.

Disclaimer: The information within this paper may change without notice. Internet
Security Systems provides this information on an AS IS basis with NO warranties,
implied or otherwise. Any use of this information is at the user's risk. In no event
shall Internet Security Systems be held liable for any damages whatsoever arising
out of or in connection with the use or dissemination of this information.

X-Force PGP Key available on MIT's PGP key server and PGP.com's key server,
as well as at http://xforce.iss.net/xforce/sensitive.php

Please send suggestions, updates, and comments to: X-Force
xforce@xxxxxxx of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBQALyWzRfJiV99eG9AQFqQAP/d4FE8qMLxUIwNBGrmESIlAnQWtv1dBtk
WwMx9VeJE0G1AInUdBzF51cUuXCRMvHUElaw6tSIVTxL9zcr9aiu7KQ0cEJj8dIT
cnRt26VNLO8ax2UG2OsZPhZUDYOTXo7E3Z/dj5QEjBh7a8FsQe4D2o802FGeUhl1
nUWAvdG7Mbw=
=GVOX
-----END PGP SIGNATURE-----