Summary of Security Items from March 2 through March 8, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, so the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to items appearing in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Bugs,
Holes, & Patches
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
FTP Server 1.4.2 .8 | A buffer overflow vulnerability exists in the 'DELE' command, which could let a remote malicious user cause a Denial of Service or execute arbitrary code.
No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | ArGoSoft FTP Server | Low/ High (High if arbitrary code can be executed) | Security Focus, 12755, March 8, 2005 |
Trillian 3.0, Trillian Pro 3.0 | A buffer overflow vulnerability exists due to insecure image data copying into finite process buffers, which could let a remote malicious user execute arbitrary code.
Cerulean Studios has released an upgrade dealing with this issue. Please contact the vendor for more information on obtaining updated packages. An exploit script has been published. | Cerulean Studios Trillian | High | Security Focus, 12703, March 2, 2005 |
CProxy Server 3.3 SP2, 3.4.1, 3.4.3, 3.4.4 | Several vulnerabilities exist: a Directory Traversal vulnerability exits due to insufficient sanitization of user-supplied input, which could let a remote malicious user obtain sensitive information; and a remote Denial of Service vulnerability exists when a malicious user submits an HTTP GET request to retrieve an ASCII file or an HTTP request to retrieve an executable file. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Computalynx CProxy Directory Traversal & Remote Denial of Service | Low/ Medium (Medium if sensitive information can be obtained) | Security Tracker Alert, 1013359, March 2, 2005 |
Unicenter Asset Management 4.0 | Multiple vulnerabilities exist: a vulnerability exists in the admin console in the 'Change Credentials for Database' window because it is possible to obtain the Admin password, an input validation vulnerability exists in the Reporter, which could let a remote malicious user execute arbitrary HTML and script code; and an input validation vulnerability exists in Query Designer when importing queries, which could let a remote malicious user inject arbitrary SQL code in an imported files. Update available at: There is no exploit code required. | Computer Associates Unicenter Asset Management Multiple Vulnerabilities | Medium/ High (High if arbitrary code can be executed) | Secunia Advisory, SA14454, March 2, 2005 |
G6 FTP Server 2.0, 3.0-3.0.2, 3.1, 3.2, 3.3, 3.3.1, 3.4 | A vulnerability exists due to a failure to secure critical functionality from default users, which could let a remote malicious user execute arbitrary code with SYSTEM privileges. Workaround: - create a new administrator account Do not forget to adjust the "local machine" properties to use the new administration account. There is no exploit code required; however, a Proof of Concept exploit has been published. | Gene6 FTP Server Insecure Critical Functionality | High | Security Focus, 12739, March 7, 2005 |
Hosting Controller 1.1, 1.3, 1.4 b, 1.4, 1.4.1, 6.1 Hotfix 1.7, 6.1 Hotfix 1.4, 6.1 | Two vulnerabilities exist: a vulnerability exists because the site updates log is inside the web root, which could let a remote malicious user obtain sensitive information; and a vulnerability exists in the admin login page due to an error in the password recovery feature, which could let a remote malicious user obtain sensitive information. Note: Successful exploitation requires that the owner's domain name is known. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Hosting Controller Multiple Information Disclosure | Medium | Secunia Advisory, SA14522, March 8, 2005 |
Chaser 1.0, 1.50 | A buffer overflow vulnerability exists due to insecure copying of user-supplied input into finite process buffers, which could let a remote malicious user cause a Denial of Service or execute arbitrary code.
No workaround or patch available at time of publishing. An exploit script has been published. | JoWood Chaser Remote Buffer Overflow | Low/High (High if arbitrary code can be executed) | Security Focus, 12733, March 7, 2005 |
Golden FTP Server 1.0 0b, 1.20 b, 1.30 b, 1.31 b, 1.92 | A buffer overflow vulnerability exists in the 'USER' command due to insufficient bounds checking, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Golden FTP Server 'USER" Remote Buffer Overflow | High | Security Focus, 12704, March 2, 2005 |
Office XP SP2 & SP3, Project 2002, Visio 2002, Works Suite 2002, 2003, 2004 | A buffer overflow vulnerability exists due to a boundary error in the process that passes URL file locations to Office, which could let a remote malicious user execute arbitrary code.
Patches available at: V1.1: Bulletin updated to clarify prerequisites V1.2: Bulletin updated to add an additional FAQ as well as clarify install steps under Update Information. V1.3: Bulletin updated to add a feature list for all products under the Update Information section, Administrative Installation details. Currently we are not aware of any exploits for this vulnerability. | Microsoft Office URL File Location Handling Buffer Overflow | High | Microsoft Security Bulletin, MS05-005, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A US-CERT Cyber Security Alert SA05-039A Microsoft Security Bulletin, MS05-005 V1.1, February 15, 2005 Microsoft Security Bulletin, MS05-005 V1.2, February 23, 2005 Microsoft Security Bulletin, MS05-005 V1.3, March 3, 2005 |
Windows (XP SP2 is not affected) | A Denial of Service vulnerability exists in the parsing of ANI files. A remote user can cause the target user's system to hang or crash. A remote user can create a specially crafted Windows animated cursor file (ANI file) that, when loaded by the target user, will cause the target system to crash. The malicious file can be loaded via HTML, for example. Updates available at: Bulletin V1.1 (January 20, 2005): Updated CAN reference and added acknowledgment to finder for CAN-2004-1305. V1.2 Frequently Asked Questions updated to reflect Windows 98, 98SE and ME security update availability. Another exploit script has been published. | Microsoft Windows ANI File Parsing Errors | Low | VENUSTECH Security Lab, December 23, 2004 Microsoft Security Bulletin MS05-002, January 11, 2005 US-CERT Vulnerability Notes, VU#177584 & VU#697136, January 11, 2005 Security Focus, January 12, 2005 Technical Cyber Security Alert, TA05-012A, January 12, 2005 Microsoft Security Bulletin, MS05-002, V1.1, January 20, 2005 PacketStorm, January 31, 2005 Microsoft Security Bulletin, MS05-002, V1.2, March 8, 2005 ` |
Windows (XP SP2 is not affected) | An integer overflow vulnerability was reported in the LoadImage API. A remote user can execute arbitrary code. A remote user can create a specially crafted image file that, when processed by the target user, will trigger an overflow in the USER32 library LoadImage API and execute arbitrary code. The code will run with the privileges of the target user. Updates available at: V1.2 Frequently Asked Questions updated to reflect Windows 98, 98SE and ME security update availability. A Proof of Concept exploit has been published. | Microsoft Windows LoadImage API Buffer Overflow | High | VENUSTECH Security Lab. December 23, 2004 Microsoft Security Bulletin MS05-002, January 11, 2005 US-CERT Vulnerability Note, VU#625856, January 11, 2005 Technical Cyber Security Alert, TA05-012A, January 12, 2005 Microsoft Security Bulletin, MS05-002, V1.2, March 8, 2005 |
Windows 2000 SP3 & SP4, Windows XP SP1 & SP2, Windows XP 64-Bit Edition SP1, | A buffer overflow vulnerability exists in the Hyperlink Object Library when handling hyperlinks, which could let a remote malicious user execute arbitrary code. Patches available at: V1.1: Mitigating factor for ISA 2004 updated. V1.2: Frequently Asked Questions updated to reflect Windows 98, 98SE and ME security update availability. Currently we are not aware of any exploits for this vulnerability. | Microsoft Windows Hyperlink Object Library Buffer Overflow | High | Microsoft Security Bulletin, MS05-015, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A US-CERT Cyber Security Alert SA05-039A US-CERT Vulnerability Note VU#820427 Microsoft Security Bulletin, MS05-015 V1.1, February 15, 2005 Microsoft Security Bulletin, MS05-015 V1.2, March 8, 2005 |
Windows Server 2003 Datacenter Edition, Enterprise Edition, Standard Edition, Web Edition, Windows XP Home Edition, XP Professional | A remote Denial of Service vulnerability exists due to improper handling of IP packets that contain the same destination and source IP and the SYN flag set.
No workaround or patch available at time of publishing. An exploit script has been published. | Microsoft Windows LAND Attack Remote Denial of Service | Low | Secunia Advisory, A14512, March 7, 2005 |
Sentinel License Manager 7.2.0.2 | A buffer overflow vulnerability exists in the 'Lservnt' service on UDP port 5093 due to a boundary error, which could let a remote malicious user execute arbitrary code with SYSTEM privileges. Upgrade to version 8.0 Currently we are not aware of any exploits for this vulnerability. | SafeNet Sentinel License Manager Remote Buffer Overflow | High | CIRT.DK Advisory, March 7, 200 |
TrackerCam 5.12 | Multiple vulnerabilities exist: a buffer overflow vulnerability exists in the TrackerCam HTTP server, which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability exists in TrackerCam PHP scripts due to insufficient bounds checks on arguments, which could let a remote malicious user execute arbitrary code; a Directory Traversal vulnerability exists in the 'ComGetLogFile.php3' script, which could let a remote malicious user obtain sensitive information; a vulnerability exists due to insufficient sanitization of HTML content in the username and password fields, which could let a remote malicious user launch phishing style attacks; and multiple remote Denial of Service vulnerabilities exist. No workaround or patch available at time of publishing. An exploit script has been published. | TrackerCam Multiple Remote Vulnerabilities CAN-2005-0478 | Low/ Medium/ High (Low of a DoS; medium if sensitive information can be obtained; and High if arbitrary code can be executed) | Security Focus, 12592, February 18, 2005 Security Focus, 12592, March 3, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Abuse 2.0 | Multiple vulnerabilities exist in the SDL port, including buffer overflows and an insecure file creation vulnerability, which could let a malicious user execute arbitrary code or overwrite arbitrary files with super user privileges. Debian: http://security.debian.org/pool/updates/main/a/abuse/ Currently we are not aware of any exploits for these vulnerabilities. | Abuse Multiple Vulnerabilities | High | Debian Security Advisory, DSA 691-1, March 7, 2005 |
bidwatcher 1.3-1.3.16 | A vulnerability exists due to a failure of the application to properly implement a formatted string function, which could let a remote malicious user execute arbitrary code. Upgrades available at: Debian: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Bidwatcher Remote Format String | High | Debian Security Advisory DSA 687-1, February 18, 2005 Gentoo Linux Security Advisory, GLSA 200503-06, March 3, 2005 |
CopperExport 0.1, 0.2 | A vulnerability exists in 'xp_publish.php' due to insufficient sanitization before used in a SQL query, which could let a remote malicious user inject arbitrary SQL code.
Upgrades available at: There is no exploit code required. | BrT CopperExport 'XP_Publish.PHP' SQL Injection | High | Secunia Advisory, SA14401, March 7, 2005 |
Cyrus IMAP Server 2.x
| Multiple vulnerabilities exist: a buffer overflow vulnerability exists in mailbox handling due to an off-by-one boundary error, which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability exists in the imapd annotate extension due to an off-by-one boundary error, which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability exists in 'fetchnews,' which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability exist because remote administrative users can exploit the backend; and a buffer overflow vulnerability exists in imapd due to a boundary error, which could let a remote malicious user execute arbitrary code.
Update available at: Gentoo: SUSE: Ubuntu: Mandrake: Currently we are not aware of any exploits for these vulnerabilities. | Cyrus IMAP Server Multiple Remote Buffer Overflows | High | Secunia Advisory, Gentoo Linux Security Advisory, GLSA 200502-29, February 23, 2005 SUSE Security Announcement, SUSE-SA:2005:009, February 24, 2005 Ubuntu Security Notice USN-87-1, February 28, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:051, March 4, 2005 |
Cyrus SASL 1.5.24, 1.5.27, 1.5.28, 2.1.9-2.1.18 | Several vulnerabilities exist: a buffer overflow vulnerability exists in 'digestmda5.c,' which could let a remote malicious user execute arbitrary code; and an input validation vulnerability exists in the 'SASL_PATH' environment variable, which could let a malicious user execute arbitrary code. Fedora: Gentoo: Mandrake: RedHat: Trustix: Debian: Conectiva: OpenPGK: FedoraLegacy: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | Cyrus SASL Buffer Overflow & Input Validation | High | Security Tracker Alert ID: 1011568, October 7, 2004 Debian Security Advisories DSA 563-2, 563-3, & 568-1, October 12, 14, & 16, 2004 Conectiva Linux Security Announcement, CLA-2004:889, November 11, 2004 OpenPKG Security Advisory, OpenPKG Security Advisory, January 28, 2005 Fedora Legacy Update Advisory, FLSA:2137, February 17, 2005 SUSE Security Summary Report, SUSE-SR:2005:006, February 25, 2005 SUSE Security Announcement, SUSE-SA:2005:013, March 3, 2005 |
FreeBSD 5.0 -RELENG, 5.0 -RELEASE-p14, 5.0, 5.1 -RELENG, 5.1 -RELEASE, 5.1, 5.2 -RELENG, 5.2 -RELEASE, 5.2, 5.2.1, 5.3 -STABLE, 5.3 -RELEASE, 5.3 | A vulnerability exists related to SMP (Symmetric Multiprocessing), which could let a malicious user obtain sensitive information.
No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Medium | Security Focus, 12724, March 4, 2005 | |
gFTP 0.1, 0.2, 0.21, 1.0, 1.1-1.13, 2.0-2.0.17 | A Directory Traversal vulnerability exists due to insufficient sanitization of input, which could let a remote malicious user obtain sensitive information. Upgrades available at: Debian: Gentoo: SUSE: Mandrake: There is no exploit code required. | gFTP Remote Directory Traversal | Medium | Security Focus, February 14, 2005 Debian Security Advisory, DSA 686-1, February 17, 2005 SUSE Security Summary Report, SUSE-SR:2005:005, February 18, 2005 Gentoo Linux Security Advisory, GLSA 200502-27, February 19, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:050, March 4, 2005 |
XPDF prior to 3.00pl3 | A buffer overflow vulnerability exists in ' 'xpdf/Decrypt.cc' due to a boundary error in the 'Decrypt::makeFileKey2' function, which could let a remote malicious user execute arbitrary code. Update available at: Patch available at: Debian: http://security.debian.org/pool/ Fedora: Gentoo: KDE: Ubuntu: Conectiva: Mandrake: SUSE: FedoraLegacy: Gentoo: SGI: Trustix: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | Glyph and Cog Xpdf 'makeFileKey2()' Buffer Overflow | High | iDEFENSE Security Advisory, January 18, 2005 Conectiva Linux Security Announcement, CLA-2005:921, January 25, 2005 Mandrakelinux Security Update Advisories, MDKSA-2005:016-021, January 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 SGI Security Advisory, 20050202-01-U, February 9, 2005 Gentoo Linux Security Advisory, GLSA 200502-10, February 9, 2005 Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0003, February 11, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005
|
GNU Midnight Commander Project Midnight Commander 4.x | Multiple vulnerabilities exist due to various design and boundary condition errors, which could let a remote malicious user cause a Denial of Service, obtain elevated privileges, or execute arbitrary code. Debian: SUSE: Gentoo: RedHat: Currently we are not aware of any exploits for these vulnerabilities. | Midnight Commander Multiple Vulnerabilities CAN-2004-1004 | Low/ Medium/ High (Low if a DoS; Medium is elevated privileges can be obtained; and High if arbitrary code can be executed) | Security Tracker Alert, 1012903, January 14, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Gentoo Linux Security Advisory, GLSA 200502-24, February 17, 2005 RedHat Security Advisory, RHSA-2005:217-10, March 4, 2005 |
cpio 1.0, 1.1, 1.2 | A vulnerability exists in 'cpio/main.c' due to a failure to create files securely, which could let a malicious user obtain sensitive information. Upgrades available at: SGI: There is no exploit required. | CPIO Archiver Insecure File Creation | Medium | Security Tracker Alert, 1013041, January 30, 2005 SGI Security Advisory, 20050204-01-U, March 7, 2005 |
CUPS 1.1.22 | A vulnerability was reported in CUPS in the processing of HPGL files. A remote malicious user can cause arbitrary code to be executed by the target user. A remote user can create a specially crafted HPGL file that, when printed by the target user with CUPS, will execute arbitrary code on the target user's system. The code will run with the privileges of the 'lp' user. The buffer overflow resides in the ParseCommand() function in 'hpgl-input.c.' Fixes are available in the CVS repository and are included in version 1.1.23rc1. Fedora: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SGI: SuSE: TurboLinux: FedoraLegacy: A Proof of Concept exploit script has been published. | GNU CUPS HPGL ParseCommand() Buffer Overflow | High | CUPS Advisory STR #1023, December 16, 2004 Mandrakelinux Security Update Advisory, MDKSA-2005:008, January 17, 2005 SGI Security Advisory, 20050101-01-U, January 19, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Turbolinux Security Announcement, February 17, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 |
CUPS Ippasswd 1.1.22 | A vulnerability was reported in the CUPS lppasswd utility. A local malicious user can truncate or modify certain files and cause Denial of Service conditions on the target system. There are flaws in the way that lppasswd edits the '/usr/local/etc/cups/passwd' file. Fixes are available in the CVS repository and are included in version 1.1.23rc1. Fedora: RedHat: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" SGI: TurboLinux: FedoraLegacy: A Proof of Concept exploit has been published. | Low | Security Tracker Alert ID, 1012602, December 16, 2004 Mandrakelinux Security Update Advisory, MDKSA-2005:008, January 17, 2005 SGI Security Advisory, 20050101-01-U, January 19, 2005 Turbolinux Security Announcement, February 17, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 | |
Xpdf prior to 3.00pl2 | A buffer overflow vulnerability exists that could allow a remote user to execute arbitrary code on the target user's system. A remote user can create a specially crafted PDF file that, when viewed by the target user, will trigger an overflow and execute arbitrary code with the privileges of the target user. A fixed version (3.00pl2) is available at: A patch is available: KDE: Gentoo: Fedora: Ubuntu: Mandrakesoft (update for koffice): Mandrakesoft (update for kdegraphics): Mandrakesoft (update for gpdf): Mandrakesoft (update for xpdf): Mandrakesoft (update for tetex): Debian: Fedora (update for tetex): Fedora: Gentoo: TurboLinux: SGI: Conectiva: SuSE: FedoraLegacy: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | GNU Xpdf Buffer Overflow in doImage() | High | iDEFENSE Security Advisory 12.21.04 KDE Security Advisory, December 23, 2004 Mandrakesoft, MDKSA-2004:161,162,163,165, 166, December 29, 2004 Fedora Update Notification, Gentoo Linux Security Advisory, GLSA 200501-13, January 10, 2005 Conectiva Linux Security Announcement, CLA-2005:921, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 Avaya Security Advisory, ASA-2005-027, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005
|
Hashcash 1.0-1.16 | A format string vulnerability exists due to the way the 'From:' mail header is handled, which could let a remote malicious user execute arbitrary code.
Gentoo: http://security.gentoo.org/glsa/glsa-200503-12.xml Currently we are not aware of any exploits for this vulnerability. | Hashcash 'From:' Email Reply Header Format String | High | Gentoo Linux Security Advisory, GLSA 200503-12, March 7, 2005 |
HP-UX B.11.23, HP-UX B.11.11, HP-UX B.11.00 | A remote Denial of Service vulnerability exists due to a failure to handle malformed network data. Upgrades available at: Currently we are not aware of any exploits for this vulnerability.
| HP-UX BIND Remote Denial of Service | Low | HP Security Bulletin, HPSBUX01117, February 9, 2005 HP Security Bulletin, HPSBUX01117, Revision 1, March 2, 2005 |
Sylpheed 0.8.11, 0.9.4-0.9.12, 0.9.99, 1.0 .0-1.0.2 | A buffer overflow vulnerability exists in certain headers that contain non-ASCII characters, which could let a remote malicious user execute arbitrary code. Upgrades available at: Currently we are not aware of any exploits for this vulnerability. | Sylpheed Mail Client Remote Buffer Overflow | High | Security Tracker Alert, 1013376, March 4, 2005 |
XV 3.10 a | A format string vulnerability exists in a formatted printing function due to insufficient sanitization of user-supplied input, which could let a remote malicious user cause a Denial of Service or execute arbitrary code.
Gentoo: Currently we are not aware of any exploits for this vulnerability. | XV File Name Handling Remote Format String | Low/ High (High if arbitrary code can be executed) | Gentoo Linux Security Advisory, GLSA 200503-09, March 4, 2005 |
kdelibs 3.3.2 | A vulnerability exists in the 'dcopidling' library due to insufficient validation of a files existence, which could let a malicious user corrupt arbitrary files. Patch available at: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Gentoo: Currently we are not aware of any exploits for this vulnerability. | KDE 'DCOPIDLING' Library | Medium | Security Focus, February 11, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:045, February 18, 2005 Gentoo Linux Security Advisory, GLSA 200503-14, March 7, 2005 |
libexif 0.6.9, 0.6.11 | A vulnerability exists in the 'EXIF' library due to insufficient validation of 'EXIF' tag structure, which could let a remote malicious user execute arbitrary code.
Ubuntu: Fedora: Currently we are not aware of any exploits for this vulnerability. | LibEXIF Library EXIF Tag Structure Validation | High | Ubuntu Security Notice USN-91-1, March 7, 2005 Fedora Update Notifications, |
LibTIFF 3.6.1 Avaya MN100 (All versions), Avaya Intuity LX (version 1.1-5.x), Avaya Modular Messaging MSS (All versions)
| Several buffer overflow vulnerabilities exist: a vulnerability exists because a specially crafted image file can be created, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; a remote Denial of Service vulnerability exists in 'libtiff/tif_dirread.c' due to a division by zero error; and a vulnerability exists in the 'tif_next.c,' 'tif_thunder.c,' and 'tif_luv.c' RLE decoding routines, which could let a remote malicious user execute arbitrary code. Debian: Gentoo: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/"> OpenPKG: Trustix:
href="ftp://ftp.trustix.org/pub/trustix/updates/"> Mandrake: SuSE:
href="ftp://ftp.suse.com/pub/suse/"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2004-577.html"> Slackware: Conectiva: KDE: Update to version 3.3.2: Apple Mac OS X: Gentoo: KDE kfax: Avaya: No solution but workarounds available at: http://support.avaya.com/elmodocs2/ TurboLinux: Mandrake: Proofs of Concept exploits have been published. | LibTIFF Buffer
href="http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=+CAN-2004-0803">CAN-2004-0803 | Low/High (High if arbitrary code can be execute) | Gentoo Linux Security Advisory, GLSA 200410-11, October 13, 2004 Fedora Update Notification, OpenPKG Security Advisory, OpenPKG-SA-2004.043, October 14, 2004 Debian Security Advisory, DSA 567-1, October 15, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0054, October 15, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:109 & MDKSA-2004:111, October 20 & 21, 2004 SuSE Security Announcement, SUSE-SA:2004:038, October 22, 2004 RedHat Security Advisory, RHSA-2004:577-16, October 22, 2004 Slackware Security Advisory, SSA:2004-305-02, November 1, 2004 Conectiva Linux Security Announcement, CLA-2004:888, November 8, 2004 US-CERT Vulnerability Notes VU#687568 & VU#948752, December 1, 2004 Gentoo Linux Security Advisory, GLSA 200412-02, December 6, 2004 KDE Security Advisory, December 9, 2004 Apple Security Update SA-2004-12-02 Gentoo Security Advisory, GLSA 200412-17 / kfax, December 19, 2004 Avaya Advisory ASA-2005-002, January 5, 2005 Conectiva Linux Security Announcement, CLA-2005:914, January 6, 2005 Turbolinux Security Announcement, January 20, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:052, March 4, 2005 |
mlterm 2.5, 2.6-2.6.3, 2.7, 2.8, 2.9, 2.9.1 | An integer overflow vulnerability exists due to insufficient sanity checks of malformed image files, which could let a remote malicious user execute arbitrary code.
Upgrades available at: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Mlterm Background Image Integer Overflow | High | Gentoo Linux Security Advisory, GLSA 200503-13, March 7, 2005 |
ClamAV 0.51-0.54, 0.60, 0.65, 0.67, 0.68 -1, 0.68, 0.70, 0.80 rc1-rc4, 0.80; | A remote Denial of Service vulnerability exists due to an error in the handling of file Upgrade available at: Gentoo: Mandrake: SUSE: Trustix: Conectiva: Currently we are not aware of any exploits for this vulnerability. | Clam Anti-Virus ClamAV Remote Denial of Service | Low | Security Focus, January 31, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:025, January 31, 2005 Gentoo Linux Security Advisory, GLSA 200501-46, January 31, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0003, February 11, 2005 Conectiva Linux Security Announcement, CLA-2005:928, March 3, 2005 |
Linux kernel 2.6.10, 2.6.9; RedHat Fedora Core2&3 | A Denial of Service vulnerability exists in the 'mlockall()' system call due to a failure to properly enforce defined limits.
Fedora: RedHat: Conectiva: A Proof of Concept exploit script has been published. | Linux Kernel Local RLIMIT_MEMLOCK | Low | Bugtraq, January 7, 2005 Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
Bernd Johanness Wueb kppp 1.1.3; | A vulnerability exists due to a file descriptor leak, which could let a malicious user obtain sensitive information. Patch available at: RedHat: Debian: There is no exploit code required. | KPPP Privileged File Descriptor Information Disclosure | Medium | iDEFENSE Security Advisory, February 28, 2005 RedHat Security Advisory, RHSA-2005:175-06, March 3, 2005 Debian Security Advisory, DSA 692-1, March 8, 2005 |
Gentoo Linux;
| A remote Denial of Service vulnerability exists in 'ms_fnmatch()' function due to insufficient input validation. Patch available at: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SuSE: Ubuntu: RedHat: Trustix: Conectiva: Fedora: SGI: TurboLinux: OpenPKG: SCO: There is no exploit code required. | Multiple Vendors Samba Remote Wild Card Denial of Service | Low | Security Focus, November 15, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0058, November 16, 2004 RedHat Security Advisory, RHSA-2004:632-17, November 16, 2004 Conectiva Linux Security Announcement, CLA-2004:899, November 25, 2004 Fedora Update Notifications, Turbolinux Security Advisory, TLSA-2004-32, December 8, 2004 SGI Security Advisory, 20041201-01-P, December 13, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.054 December 17, 2004 SCO Security Advisory, SCOSA-2005.17, March 7, 2005 |
ImageMagick 5.3.3, 5.4.3, 5.4.4 .5, 5.4.7, 5.4.8 .2-1.1.0, 5.4.8, 5.5.3 .2-1.2.0, 5.5.6 .0-20030409, 5.5.7, 6.0-6.0.8, 6.1-6.1.7, 6.2 | A format string vulnerability exists when handling malformed file names, which could let a remote malicious user cause a Denial of Service or execute arbitrary code. Update available at: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | ImageMagick File Name Handling Remote Format String | Low/ High (High if arbitrary code can be executed) | Secunia Advisory, Ubuntu Security Notice, USN-90-1, March 3, 2004 |
Linux Kernel 2.4 - 2.4.28, 2.6 - 2.6.9; Avaya Intuity LX, Avaya MN100, | Several vulnerabilities exist in the Linux kernel in the processing of IGMP messages. A local user may be able to gain elevated privileges. A remote user can cause the target system to crash. These are due to flaws in the ip_mc_source() and igmp_marksources() functions. SUSE: Trustix: Ubuntu: Fedora: Mandrake: RedHat: TurboLinux: FedoraLegacy: Conectiva: A Proof of Concept exploit script has been published. | Multiple Vendors Linux Kernel IGMP Integer Underflow | Low/ Medium (Medium if elevated privileges can be obtained) | iSEC Security Research Advisory 0018, December 14, 2004 Security Focus, December 25, 2005 Secunia, SA13706, January 4, 2005 Avaya Security Advisory, ASA-2005-006, January 14, 2006 Mandrake Security Advisory, MDKSA-2005:022, January 26, 2005 RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005 Turbolinux Security Announcement , February 28, 2005 Fedora Legacy Update Advisory, FLSA:2336, February 24, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
Linux Security Modules (LSM); Ubuntu Linux 4.1 ppc, ia64, ia32 | A security issue in Linux Security Modules (LSM) may grant normal user processes escalated privileges. When loading the Capability LSM module as a loadable kernel module, all existing processes gain unintended capabilities granting them root privileges. Only use the Capability LSM module when compiled into the kernel and grant only trusted users access to affected systems. Ubuntu: Conectiva: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Linux Security Modules | High | Secunia SA13650, December 27, 2004 Ubuntu Security Notice, USN-57-1, January 9, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
Samba 3.0 - 3.0.7; RedHat Advanced Workstation for the Itanium Processor 2.1, IA64, Desktop 3.0, Enterprise Linux WS 3, WS 2.1 IA64, 2.1, ES 3, 2.1 IA64, 2.1, AS 3, 2.1 IA64, 2.1; Ubuntu Linux 4.1 ppc, ia64, ia32 | A buffer overflow vulnerability exists in the 'QFILEPATHINFO' request handler when constructing 'TRANSACT2_QFILEPATHINFO' responses, which could let a remote malicious user execute arbitrary code.
Update available at: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SuSE: Trustix: Ubuntu Upgrade samba-doc_ Conectiva: Fedora: TurboLinux: Red Hat: OpenPKG: SCO: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Samba 'QFILEPATHINFO' Buffer Overflow | High | e-matters GmbH Security Advisory, November 14, 2004 SuSE Security Announcement, SUSE-SA:2004:040, November 15, 2004 Trustix Secure Linux Security Advisory, TSLSA-2004-0058, November 16, 2004 Ubuntu Security Notice, USN-29-1, November 18, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:136, November 19, 2004 US-CERT Vulnerability Note VU#457622, November 19, 2004 Conectiva Linux Security Announcement, CLA-2004:899, November 25, 2004 Fedora Update Notifications, Turbolinux Security Advisory, TLSA-2004-32, December 8, 2004 Red Hat Security Advisory RHSA-2004:632-17, November 16, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.054 December 17, 2004 SCO Security Advisory, SCOSA-2005.17, March 7, 2005 |
Squid Web Proxy Cache 2.0 PATCH2, 2.1 PATCH2, 2.3 .STABLE4&5, 2.4 .STABLE6&7, 2.4 .STABLE2, 2.4, 2.5 .STABLE3-7, 2.5 .STABLE1; Conectiva Linux 9.0, 10.0 | Two vulnerabilities exist: remote Denial of Service vulnerability exists in the Web Cache Communication Protocol (WCCP) functionality due to a failure to handle unexpected network data; and buffer overflow vulnerability exists in the 'gopherToHTML()' function due to insufficient validation of user-supplied strings, which could let a remote malicious user execute arbitrary code. Patches available at: http://www.squid-cache.org/Versions/v2/ Gentoo: Debian: Ubuntu: Mandrake: Conectiva: Fedora: RedHat: SUSE: Trustix: TurboLinux: Astaro: There is no exploit required. | Squid Proxy Web Cache WCCP Functionality Remote Denial of Service & Buffer Overflow | Low/High (High if arbitrary code can be executed) | Secunia Advisory, SA13825, January 13, 2005 Debian Security Advisory, DSA 651-1, January 20, 2005 Ubuntu Security Notice, USN-67-1, January 20, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:014, January 25, 2005 Conectiva Linux Security Announcement, CLA-2005:923, January 26, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0003, February 11, 2005 SUSE Security Announcement, SUSE-SA:2005:006, February 10, 2005 RedHat Security Advisory, RHSA-2005:061-19, February 11, 2005 Turbolinux Security Announcement, February 17, 2005 Security Focus, 12275 & 12276, March 7, 2005
|
Squid Web Proxy Cache 2.5 .STABLE9, .STABLE8, .STABLE7 | A vulnerability exists when using the Patches available at: Ubuntu: There is no exploit code required. | Squid Proxy Set-Cookie Headers Information Disclosure | Medium | Secunia Advisory, SA14451, March 3, 2005 Ubuntu Security Notice, USN-93-1 March 08, 2005 |
Apple Mac OS X 10.2-10.2.8, 10.3 -10.3.5, OS X Server 10.2-10.2.8, 10.3 -10.3.5; Easy Software Products CUPS 1.0.4 -8, 1.0.4, 1.1.1, | A vulnerability exists in 'error_log' when certain methods of remote printing are carried out by an authenticated malicious user, which could disclose user passwords. Update available at:
href="http://www.cups.org/software.php"> Apple: Fedora: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-06.xml"> Debian:
href="http://security.debian.org/pool/updates/main/c/cupsys/"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> RedHat: FedoraLegacy: There is no exploit code required. | Medium | Apple Security Update, APPLE-SA-2004-09-30, October 4, 2004 Fedora Update Notification, Gentoo Linux Security Advisory, GLSA 200410-06, October 9, 2004 Debian Security Advisory, DSA 566-1, October 14, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:116, October 21, 2004 RedHat Security Advisory, RHSA-2004:543-15, October 22, 2004 US-CERT Vulnerability Note, VU#557062, November 19, 2004 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 | |
Daniel Stenberg curl 6.0-6.4, 6.5-6.5.2, 7.1, 7.1.1, 7.2, 7.2.1, 7.3, 7.4, 7.4.1, 7.10.1, 7.10.3-7.10.7, 7.12.1 | A buffer overflow vulnerability exists in the Kerberos authentication code in the 'Curl_krb_kauth()' and 'krb4_auth()' functions and in the NT Lan Manager (NTLM) authentication in the 'Curl_input_ntlm()' function, which could let a remote malicious user execute arbitrary code. SUSE: Ubuntu: Mandrake: Updates available at: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors cURL / libcURL Kerberos Authentication & 'Curl_input_ntlm()' Remote Buffer Overflows | High | iDEFENSE Security Advisory , February 21, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:048, March 4, 2005 |
Debian Linux 3.0, sparc, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, alpha; | Several integer overflow vulnerabilities exist in 'pdftops/Catalog.cc' and 'pdftops/XRef.cc,' which could let a remote malicious user execute arbitrary code.
Debian: Fedora: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-20.xml"> KDE: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/"> Conectiva: Debian: SUSE: Update: Gentoo: Fedora: FedoraLegacy: RedHat: FedoraLegacy: RedHat: SGI: Currently we are not aware of any exploits for these vulnerabilities.
| Multiple Vendors Xpdf PDFTOPS Multiple Integer Overflows
href="http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2004-0888">CAN-2004-0888 | High | Security Tracker Alert ID, 1011865, October 21, 2004 Conectiva Linux Security Announcement, CLA-2004:886, November 8, 2004 Debian Security Advisory, DSA 599-1, November 25, 2004 SUSE Security Summary Report, SUSE-SR:2004:002, November 30, 2004 Gentoo Linux Security Advisory, GLSA 200501-31, January 23, 2005 Fedora Update Notifications, Fedora Legacy Update Advisory, FLSA:2353, February 10, 2005 Mandrakelinux Security Update Advisories, MDKSA-2005:041-044, February 18, 2005 RedHat Security Advisory, RHSA-2005:132-09, February, 18. 2005 Fedora Legacy Update Advisory, FLSA:2127, March 2, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:052, March 4, 2005 RedHat Security Advisory, RHSA-2005:213-04, March 4, 2005 SGI Security Advisory, 20050204-01-U, March 7, 2005 |
Debian Linux 3.0, sparc, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, alpha; | A vulnerability exists in the tiffdump utility, which could let a remote malicious user execute arbitrary code. Debian: Fedora: Gentoo: Mandrake: SuSE: Ubuntu: RedHat: SGI: TurboLinux: Conectiva: Avaya: Mandrake: Currently we are not aware of any exploits for this vulnerability. | LibTIFF TIFFDUMP Heap Corruption | High | Security Tracker Alert ID, 1012785, January 6, 2005 RedHat Security Advisory, RHSA-2005:019-11, January 13, 2005 SGI Security Advisory, 20050101-01-U, January 19, 2005 Turbolinux Security Announcement, January 20, 2005 Conectiva Linux Security Announcement, CLA-2005:920, January 20, 2005 Avaya Security Advisory, ASA-2005-021, January 25, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:052, March 4, 2005 |
Gentoo Linux 1.4; | Multiple vulnerabilities exist: a buffer overflow vulnerability exists in the 'read_dib()' function when handling 8-bit RLE encoded BMP files, which could let a malicious user execute arbitrary code; and buffer overflow vulnerabilities exist in the in the XPM, GIF, and JPEG image file handlers, which could let a remote malicious user execute arbitrary code. Debian:
href="http://security.debian.org/pool/updates/main/q/qt-copy/ "> Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200408-20.xml"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Slackware:
href="ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kde/qt-3.1.2-i486-4.tgz"> SuSE:
href="ftp://ftp.suse.com/pub/suse/i386/update"> Trolltech Upgrade:
href="http://www.trolltech.com/download/index.html"> TurboLinux:
href="ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/ "> Sun:
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57637-1&searchclause=security"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2004-478.html"> SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Avaya:
href="http://support.avaya.com/japple/css/japple?temp.groupID=128450&temp.selectedFamily=128451&temp.selectedProduct=154235&temp.selectedBucket=126655&temp.feedbackState=askForFeedback&temp.documentID=203389&PAGE=avaya.css.CSSLvl1Detail&executeTransaction=avaya.css.UsageUpdate()"> FedoraLegacy: Proof of Concept exploit has been published. | QT Image File Buffer Overflows
vlink="#999999" link="#999999">
class=style45>
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691" | High | Secunia Advisory, SA12325, August 10, 2004 Sun Alert ID: 57637, September 3, 2004 Conectiva Linux Security Announcement, CLA-2004:866, September 22, 2004 RedHat Security Advisories, RHSA-2004:478-13 & RHSA-2004:479-05, October 4 & 6, 2004 SUSE Security Announcement, SUSE-SA:2004:035, October 5, 2004 Security Focus, October 18, 2004 Fedora Legacy Update Advisory, FLSA:2314, March 2, 2005 |
Gentoo Linux; | Multiple vulnerabilities exist due to integer overflows, memory access errors, input validation errors, and logic errors, which could let a remote malicious user execute arbitrary code, obtain sensitive information, or cause a Denial of Service. Fedora: Gentoo: SUSE: X.org: Fedora: RedHat: Mandrakesoft: http://www.mandrakesoft.com/security/ Debian: SGI: TurboLinux: Avaya: http://support.avaya.com/elmodocs2/ Gentoo: http://security.gentoo.org/ Ubuntu: FedoraLegacy: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors LibXPM Multiple Vulnerabilities | Low/ Medium/ High (Low if a DoS; Medium if sensitive information can be obtained; and High if arbitrary code can be executed) | X.Org Foundation Security Advisory, November 17, 2004 Fedora Update Notifications, SUSE Security Announcement, SUSE-SA:2004:041, November 17, 2004 Gentoo Linux Security Advisory, GLSA 200411-28, November 19, 2004 Fedora Security Update Notifications RedHat Security Advisory, RHSA-2004:537-17, December 2, 2004 Mandrakesoft: MDKSA-2004:137: libxpm4; MDKSA-2004:138: XFree86, November 22, 2004 Debian Security Advisory Turbolinux Security Announcement, January 20, 2005 Avaya Security Advisories, ASA-2005-023 & 025, January 25, 2005 Gentoo Linux Security Advisories, GLSA 200502-06 & 07, February 7, 2005 Ubuntu Security Notice, USN-83-1 February 16, 2005 Fedora Legacy Update Advisory, FLSA:2314, March 2, 2005 |
Linux kernel 2.2-2.2.2.27 -rc1, 2.4-2.4.29 -rc1, 2.6 .10, 2.6- 2.6.10 | A race condition vulnerability exists in the page fault handler of the Linux Kernel on symmetric multiprocessor (SMP) computers, which could let a malicious user obtain superuser privileges.
Fedora: Trustix: Ubuntu: SuSE: RedHat: http://rhn.redhat.com/errata/ Mandrake: RedHat: FedoraLegacy: SuSE: TurboLinux: Conectiva: Exploit scripts have been published. | Linux Kernel Symmetrical Multiprocessing Page Fault Superuser Privileges | High | Security Tracker Alert, 1012862, January 12, 2005 SUSE Security Announcement, SUSE-SA:2005:003, January 21, 2005 RedHat Security Advisory, RHSA-2005:016-13 & 017-14, January 21, 2005 Mandrake Security Advisory, MDKSA-2005:022, January 26, 2005 RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005 Fedora Legacy Update Advisory, FLSA:2336, February 24, 2005 SUSE Security Announcement, SUSE-SA:2005:010, February 25, 2005 Turbolinux Security Announcement , February 28, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
Linux kernel 2.4 .0-test1-test12, 2.4-2.4.28, 2.4.29rc1&rc2, 2.5 .0-2.5.69, 2.6 -test1-test11, 2.6-2.6.10; SuSE . Linux 8.1, 8.2, 9.0 | A Denial of Service vulnerability exists with Direct I/O access to NFS file systems.
SuSE: Conectiva: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel NFS I/O Denial of Service | Low | SUSE Security Announcement, SUSE-SA:2005:003, January 21, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
Linux Kernel 2.4.0 test1-test12, 2.4-2.4.28, 2.4.29 -rc2, 2.6, test1-test11, 2.6.1, rc1-rc2, 2.6.2-2.6.9, 2.6.10 rc2; Avaya S8710/S8700/ S8500/S8300, Converged Communication Server, Intuity LX, MN100, Modular Messaging, Network Routing | A vulnerability exists in the 'load_elf_library()' function in 'binfmt_elf.c' because memory segments are not properly processed, which could let a remote malicious user execute arbitrary code with root privileges. Fedora: Trustix: Ubuntu: Mandrake: Ubuntu: RedHat: FedoraLegacy: TurboLinux: Conectiva: Another exploit script has been published. | Linux Kernel uselib() Root Privileges | High | iSEC Security Research Advisory, January 7, 2005 Fedora Update Notifications, Trustix Secure Linux Security Advisory, TSLSA-2005-0001, January 13, 2005 Mandrake Security Advisory, MDKSA-2005:022, January 26, 2005 PacketStorm, January 27, 2005 Avaya Security Advisory, ASA-2005-034, February 8, 2005 Ubuntu Security Notice, USN-57-1, February 9, 2005 RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005 Fedora Legacy Update Advisory, FLSA:2336, February 24, 2005 SUSE Security Announcement, SUSE-SA:2005:010, February 25, 2005 Turbolinux Security Announcement , February 28, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6-test1- -test11, 2.6, 2.6.1-2.6.11 ; RedHat Desktop 4.0, Enterprise Linux WS 4, ES 4, AS 4 | Multiple vulnerabilities exist: a vulnerability exists in the 'shmctl' function, which could let a malicious user obtain sensitive information; a Denial of Service vulnerability exists in 'nls_ascii.c' due to the use of incorrect table sizes; a race condition vulnerability exists in the 'setsid()' function; and a vulnerability exists in the OUTS instruction on the AMD64 and Intel EM64T architecture, which could let a malicious user obtain elevated privileges. RedHat: Ubuntu: FedoraLegacy: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | Linux Kernel Multiple Vulnerabilities | Low/Medium (Low if a DoS) | Ubuntu Security Notice, USN-82-1, February 15, 2005 RedHat Security Advisory, RHSA-2005:092-14, February 18, 2005 Fedora Legacy Update Advisory, FLSA:2336, February 24, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
Linux kernel 2.6.x, 2.4.x , SUSE Linux 8.1, 8.2, 9.0, 9.1, Linux 9.2, SUSE Linux Desktop 1.x, SUSE Linux Enterprise Server 8, 9; Turbolinux Turbolinux Server 10.0 | Two vulnerabilities exist: a Denial of Service vulnerability exists via a specially crafted 'a.out' binary; and a vulnerability exists due to a race condition in the memory management, which could let a malicious user obtain sensitive information. SUSE: TurboLinux: Ubuntu: Trustix: Mandrake: FedoraLegacy: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors Linux Kernel Local DoS & | Low/ Medium (Medium if sensitive information can be obtained)
| Secunia Advisory, SUSE Security Summary Report, SUSE-SA:2004:042, December 1, 2004 Security Focus, December 16, 2004 Trustix Secure Linux Security Advisory, TSLSA-2005-0001, January 13, 2005 Mandrake Security Advisory, MDKSA-2005:022, January 26, 2005 Fedora Legacy Update Advisory, FLSA:2336, February 24, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 |
nfs-utils 1.0.6 | A vulnerability exists due to an error in the NFS statd server in 'statd.c' where the 'SIGPIPE' signal is not correctly ignored. This can be exploited to crash a vulnerable service via a malicious peer terminating a TCP connection prematurely. Upgrade to 1.0.7-pre1: Mandrakesoft: Debian: Red Hat: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors nfs-utils 'SIGPIPE' TCP Connection Termination Denial of Service | Low | Secunia Advisory ID, SA13384, December 7, 2004 Debian Security Advisory Red Hat Security Advisory, RHSA-2004:583-09, December 20, 2004 Mandrakelinux Security Update Advisory, MDKSA-2005:005, January 12, 2005 |
Samba 2.2.9, 3.0.8 and prior | An integer overflow vulnerability in all versions of Samba's smbd 0.8 could allow an remote malicious user to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges. Patches available at: Red Hat: Gentoo: Trustix: Red Hat (Updated): Fedora: SUSE: Mandrakesoft: Conectiva: RedHat: TurboLinux: SCO: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors Samba smbd Security | High | iDEFENSE Security Advisory 12.16.04 Red Hat Advisory, RHSA-2004:670-10, December 16, 2004 Gentoo Security Advisory, GLSA 200412-13 / Samba, December 17, 2004 US-CERT, Vulnerability Note VU#226184, December 17, 2004 Trustix Secure Linux Advisory #2004-0066, December 17, 2004 Red Hat, RHSA-2004:670-10, December 16, 2004 SUSE, SUSE-SA:2004:045, December 22, 2004 RedHat Security Advisory, RHSA-2005:020-04, January 5, 2005 Conectiva Linux Security Announcement, CLA-2005:913,January 6, 2005 Turbolinux Security Announcement, February 7, 2005 HP Security Advisory, HPSBUX01115, February 3, 2005 SCO Security Advisory, SCOSA-2005.17, March 7, 2005 |
Squid 2.x; Gentoo Linux;Ubuntu Linux 4.1 ppc, ia64, ia32;Ubuntu Linux 4.1 ppc, ia64, ia32; Conectiva Linux 9.0, 10.0 | A remote Denial of Service vulnerability exists in the NTLM fakeauth_auth helper when running under a high load or for a long period of time, and a specially crafted NTLM type 3 message is submitted.
Patch available at: Gentoo: Ubuntu: Conectiva: Fedora: RedHat: SUSE: Trustix: Astaro: Currently we are not aware of any exploits for this vulnerability. | Low | Secunia Advisory, Gentoo Linux Security Advisor, GLSA 200501-25, January 17, 2005 Ubuntu Security Notice, USN-67-1, January 20, 2005 Conectiva Linux Security Announcement, CLA-2005:923, January 26, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 SUSE Security Announcement, SUSE-SA:2005:006, February 10, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0003, February 11, 2005 RedHat Security Advisory, RHSA-2005:061-19, February 11, 2005 Security Focus, 12324, March 7, 2005 | |
X.org X11R6 6.7.0, 6.8, 6.8.1; | An integer overflow vulnerability exists in 'scan.c' due to insufficient sanity checks on on the 'bitmap_unit' value, which could let a remote malicious user execute arbitrary code. Patch available at: Gentoo: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | High | Security Focus, 12714, March 2, 2005 Gentoo Linux Security Advisory, GLSA 200503-08, March 4, 2005 Ubuntu Security Notice, USN-92-1 March 07, 2005 | |
xli 1.14-1.17 | A vulnerability exists due to a failure to manage internal buffers securely, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | XLI Internal Buffer Management | High | Gentoo Linux Security Advisory, GLSA 200503-05, March 2, 2005 |
xli 1.14-1.17; xloadimage 3.0, 4.0, 4.1 | A vulnerability exists due to a failure to parse compressed images safely, which could let a remote malicious user execute arbitrary code.
Gentoo: Currently we are not aware of any exploits for this vulnerability. | XLoadImage Compressed Image Remote Command Execution | High | Gentoo Linux Security Advisory, GLSA 200503-05, March 2, 2005 |
Open Motif 2.x, Motif 1.x; Avaya CMS Server 8.0, 9.0, 11.0, CVLAN, Integrated Management, Intuity LX, MN100, Modular Messaging (MSS) 1.1, 2.0, Network Routing | Multiple vulnerabilities have been reported in Motif and Open Motif, which potentially can be exploited by malicious people to compromise a vulnerable system. Updated versions of Open Motif and a patch are available. A Fedora: Red Hat: Gentoo: Debian: Mandrake: SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Ubuntu: TurboLinux: Avaya: http://support.avaya.com/elmodocs2/ Gentoo: Conectiva: FedoraLegacy: Currently we are not aware of any exploits for these vulnerabilities. | Open Group Motif / Open Motif libXpm Vulnerabilities | High | Integrated Computer Solutions Secunia Advisory ID: SA13353, December 2, 2004 RedHat Security Advisory: RHSA-2004:537-17, December 2, 2004 Turbolinux Security Announcement, January 20, 2005 Avaya Security Advisories, ASA-2005-023 & 025, January 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 Gentoo Linux Security Advisory, GLSA 200502-07, February 7, 2005 Conectiva Security Advisory, CLSA-2005:924, February 14, 2005 Fedora Legacy Update Advisory, FLSA:2314, March 2, 2005 |
OpenBSD 3.5, 3.6 | A vulnerability exists in 'sys/arch/i386/i386/locore.s' in the copy(9) function due to improper checking functions. The impact was not specified.
Patches available at: ftp://ftp.openbsd.org/pub/OpenBSD/ Currently we are not aware of any exploits for this vulnerability. | OpenBSD copy(9) Function | Not Specified | Security Tracker Alert, 1013333, March 1, 2005 |
Linux 9.0 i386 | A buffer overflow vulnerability exists due to insecure copying of file data into finite process buffers, which could let a remote malicious user execute arbitrary code. Upgrade available at: Currently we are not aware of any exploits for this vulnerability. | RedHat Linux Remote Buffer Overflow | High | Fedora Legacy Update Advisory, FLSA:2404, March 8, 2005 |
LibTIFF 3.5.7, 3.6.1, 3.7.0; Avaya CVLAN, Integrated Management, Intuity LX, MN100, Modular Messaging (MSS) 1.1, 2.0 | Two vulnerabilities exist which can be exploited by malicious people to compromise a vulnerable system by executing arbitrary code. The vulnerabilities are caused due to an integer overflow in the "TIFFFetchStripThing()" function in "tif_dirread.c" when parsing TIFF files and"CheckMalloc()" function in "tif_dirread.c" and "tif_fax3.c" when handling data from a certain directory entry in the file header. Update to version 3.7.1: Fedora: Debian: Gentoo: Mandrake: SUSE: RedHat: SGI: TurboLinux: Conectiva: Avaya: Mandrake: Currently we are not aware of any exploits for these vulnerabilities. | Remote Sensing LibTIFF Two Integer Overflow Vulnerabilities | High | iDEFENSE Security Advisory 12.21.04 Secunia SA13629, December 23, 2004 SUSE Security Announcement, SUSE-SA:2005:001, January 10, 2005 RedHat Security Advisory, RHSA-2005:019-11, January 13, 2005 US-Cert Vulnerability Note, VU#125598, January 14, 2005 SGI Security Advisory, 20050101-01-U, January 19, 2005 Turbolinux Security Announcement, January 20, 2005 Conectiva Linux Security Announcement, CLA-2005:920, January 20, 2005 Avaya Security Advisory, ASA-2005-021, January 25, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:052, March 4, 2005 |
Gaim 1.0-1.0.2, 1.1.1, 1.1.2 | Multiple remote Denial of Service vulnerabilities exist: a vulnerability exists when a remote malicious ICQ or AIM user submits certain malformed SNAC packets; and a vulnerability exists when parsing malformed HTML data.
Upgrades available at: Fedora: Ubuntu: Gentoo: Mandrake: There is no exploit code required. | Gaim Multiple Remote Denials of Service | Low | Gaim Advisory, February 17, 2005 Fedora Update Notifications, Ubuntu Security Notice, USN-85-1 February 25, 2005 Gentoo Linux Security Advisory, GLSA 200503-03, March 1, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:049, March 4, 2005 |
HTTP Anti Virus Proxy prior to 0.51 | A vulnerability exists due to a failure to detect known viruses in cab and zip archives. Update available at: Currently we are not aware of any exploits for this vulnerability. | HTTP Anti Virus Proxy Virus Detection | Medium | Security Tracker Alert, 1013370, March 4, 2005 |
Squid Web Proxy Cache 2.5 .STABLE5-STABLE8 | A remote Denial of Service vulnerability exists when performing a Fully Qualify Domain Name (FQDN) lookup and and unexpected response is received. Patches available at: Gentoo: Ubuntu: Fedora: SUSE: Debian: Mandrake: RedHat: Currently we are not aware of any exploits for this vulnerability. | Squid Proxy FQDN Remote Denial of Service | Low | Secunia Advisory, Gentoo Linux Security Advisory GLSA, 200502-25, February 18, 2005 Ubuntu Security Notice, USN-84-1, February 21, 2005 Fedora Update Notifications, SUSE Security Announcement, SUSE-SA:2005:008, February 21, 2005 Debian Security Advisory, DSA 688-1, February 23, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:047, February 24, 2005 RedHat Security Advisory, RHSA-2005:173-09, March 3, 2005 |
AnswerBook2 1.2-1.4.4 | Multiple Cross-Site Scripting vulnerabilities exist: a vulnerability exists in the 'Search' function and the 'AnswerBook2 admin' interface due to insufficient sanitization of user-supplied data, which could let a remote malicious user execute arbitrary HTML and script code. Workaround available at: There is no exploit code required. | Sun Solaris AnswerBook2 Multiple Cross-Site Scripting | High | Sun(sm) Alert Notification, Sun Alert ID: 57737, March 7, 2005 |
Symantec
Enterprise Firewall 8.0 | A vulnerability exists win the integrated DNS proxy when acting as a caching DNS server, which could let a remote malicious user deny service to legitimate users by redirecting traffic to inappropriate hosts, perform man-in-the-middle attacks, and impersonate sites.
Updates available at: Hotfixes available at: Proof of Concept exploit scripts have been published. | Symantec Enterprise Firewall DNSD DNS Cache Poisoning | Medium | Symantec Security Advisory, SYM04-010, June 21, 2004 Security Focus, 10557, March 6, 2005 |
PaX linux 2.6.5, 2.4.20-2.4.28, 2.2.x | A vulnerability exists due to an undisclosed error, which could let a malicious user obtain elevated privileges and execute arbitrary code.
Patches available at: Currently we are not aware of any exploits for this vulnerability. | PaX Undisclosed Arbitrary Code Execution | High | Security Focus, 12729, March 4, 2005 |
Qt 3.0, 3.0.3, 3.0.5, 3.1-3.1.2, 3.2.1, 3.2.3, 3.3.0-3.3.4 | A vulnerability exists due to a failure to secure local dynamically loaded libraries, which could let a malicious user execute arbitrary code.
Gentoo: There is no exploit code required. | Trolltech QT Arbitrary Code Execution | High | Gentoo Linux Security Advisory, GLSA 200503-01, March 1, 2005 |
imap 2004b, 2004a, 2004, 2002b-2002e | A vulnerability exists due to a logic error in the Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) code, which could let a remote malicious user bypass authentication. Update available at: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" RedHat: SUSE: SGI: Currently we are not aware of any exploits for this vulnerability. | University Of Washington IMAP Server CRAM-MD5 Remote Authentication Bypass | Medium | US-CERT VU#702777, January 27, 2005 Gentoo Linux Security Advisory, GLSA 200502-02, February 2, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:026, February 2, 2005 RedHat Security Advisory, RHSA-2005:128-06, February 23, 2005 SUSE Security Announcements, SUSE-SR:2005:006 & SUSE-SA:2005:012, February 25 & March 1, 2005 SGI Security Advisory, 20050301-01-U, March 7, 2005 |
VIM 6.0-6.2, 6.3.011, 6.3.025, 6.3 .030, 6.3.044, 6.3 .045 | Multiple vulnerabilities exist in 'tcltags' and 'vimspell.sh' due to the insecure creation of temporary files, which could let a malicious user corrupt arbitrary files. Ubuntu: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" RedHat: Fedora: SGI: There is no exploit required. | Vim Insecure Temporary File Creation | Medium | Secunia Advisory, Ubuntu Security Notice, USN-61-1, January 18, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:026, February 2, 200 Fedora Legacy Update Advisory, FLSA:2343, February 24, 2005 SGI Security Advisory, 20050204-01-U, March 7, 2005 |
OpenBSD; xdm CVS | A vulnerability exists in xdm because even though ‘DisplayManager.requestPort’ is set to 0 xdm will open a ‘chooserFd’ TCP socket on all interfaces, which could lead to a false sense of security.
Patch available at: Gentoo: Mandrake: RedHat: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | XFree86 XDM RequestPort False Sense of Security | Medium | Secunia Advisory, SA11723, May 30, 2004 RedHat Security Advisory, RHSA-2004:478-13, October 4, 2004 Fedora Legacy Update Advisory, FLSA:2314, March 2, 2005 |
id=multiple name=multiple>Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
mod_python | A vulnerability exists in mod_python in the publisher handler that could permit a remote malicious user to view certain python objects. A remote user can submit a specially crafted URL to view the names and values of variables. Red Hat: Ubuntu: Fedora: Gentoo: Trustix: Debian: Conectiva: Currently we are not aware of any exploits for this vulnerability. | Apache mod_python Information Disclosure Vulnerability | Medium | Security Tracker Alert ID, 1013156, February 11, 2005 Red Hat RHSA-2005:104-03, February 10, 2005 Ubuntu, USN-80-1 February 11, 2005 Trustix #2005-0003, February 11, 2005 Debian, DSA-689-1, February 23, 2005 Conectiva CLSA-2005:926, March 2, 2005 |
phpWebSite 0.10.0 and prior | A vulnerability exists in the Announce module that could let a remote malicious user who has privileges to upload image files execute arbitrary commands. No workaround or patch available at time of publishing. Gentoo: A Proof of Concept exploit has been published. | Appalachian State phpWebSite Arbitrary Code Execution Vulnerability | High | Security Focus, Bugtraq ID: 12653, February 25, 2005 Gentoo, GLSA 200503-04, March 1, 2005 |
auraCMS 1.5 | Multiple vulnerabilities exist that could let a remote malicious user conduct Cross-Site Scripting attacks or determine the installation path. This is due to input validation errors in various parameters. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | auraCMS Discloses Path to Remote Users and Permits Cross-Site Scripting Attacks | High | Security Tracker Alert ID: 1013357, March 2 2005 |
An authentication vulnerability exists that could let a remote malicious user obtain a backup file. This is because of an authentication error in the 'myadmin.php' script. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Aztek Forum Information Disclosure Vulnerability | Low | Security Focus, Bugtraq ID 12745, March 7 2005 | |
Einstein 1.x | A vulnerability exists that could permit local malicious users to access sensitive information. This is because user credentials are stored in plain text. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Bfriendly.com Einstein Information Disclosure Vulnerability | Medium | Secunia SA14455, March 2, 2005 |
Carsten's 3D Engine (Ca3DE) March 2004 and prior version | Two vulnerabilities exist that could let a remote malicious user cause the game service to crash or execute arbitrary code. This is caused when a command containing certain format string characters are executed. A text string that is not NULL can also cause a Denial of Service. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Carsten's 3D Engine Remote Code Execution Vulnerability | Low/High (High if arbitrary code can be executed) | Security Tracker Alert ID: 1013361, March 3, 2005 |
phpCOIN 1.2.0, 1.2.1, 1.2.1b | A vulnerability exists that could permit a remote malicious user to inject SQL commands and conduct Cross-Site Scripting attacks. This is due to input validation errors in the 'mod.php' and 'login.php' scripts. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | COINSoft Technologies phpCOIN Input Validation Vulnerabilities | High | Secunia, SA14439, March 1, 2005 |
License 1.53 - 1.61.8 | Multiple buffer overflow vulnerabilities exist that could let a remote malicious user execute arbitrary code with root level privileges. A remote user can also create files in arbitrary locations on the target system. This is because of input validation errors PUTOLF requests, GETCONFIG, and GCR requests.
A fixed version (1.61.9) is available at: An exploit script has been published. | Computer Associates License Remote Code Execution Vulnerability | High | iDEFENSE, 03.02.05 |
Forumwa v1 | An input validation vulnerability exists that could let a remote malicious user conduct Cross-Site Scripting attacks. There is an input validation error in the 'search.php' script. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | demof Forumwa Input Validation Vulnerabilities | High | Hackerlounge Research Group, HRG005, March 1, 2005 |
Multiple vulnerabilities exist that could let a remote malicious user conduct Cross-Site Scripting attacks. There are input validation errors in a number of different fields. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | D-forum Input Validation Vulnerabilities | High | Security Tracker Alert ID: 1013349, March 2, 2005 | |
Drupal prior to 4.5.2 | A vulnerability exists that could let remote malicious users conduct Cross-Site Scripting attacks. This ids due to improper input validation. Update to version 4.5.2: A Proof of Concept exploit has been published. | Drupal Unspecified Cross-Site Scripting Vulnerability | High | Security Focus, Bugtraq ID 12757, March 8, 2005 |
Ethereal 0.10-0.10.8 | A buffer overflow vulnerability exists due to a failure to copy network derived data securely into sensitive process buffers, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. An exploit script has been published. | Ethereal Buffer Overflow | High | Security Focus, 12759, March 8, 2005 |
Multiple vulnerabilities exist that could let a remote malicious user execute arbitrary code or cause a Denial of Service on the target system. This is because the POP server does not properly validate input in the 'USER' command. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for these vulnerabilities. | Foxmail Remote Code Execution Vulnerability | Low/High (High if arbitrary code can be executed) | Security Tracker Alert ID: 1013356, March 2, 2005 | |
427BB 2.2 | A vulnerability exists that could let a remote malicious user conduct Cross-Site Scripting attacks. The 'profile.php' script does not properly validate user-supplied input in the avatar field. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | GNU 427BB Input Validation Vulnerabilities | High | Security Tracker Alert ID: 1013337 March 1 2005 |
CuteNews 1.3.6 | Multiple vulnerabilities exist that could let a remote malicious user conduct Cross-Site Scripting attacks or gain elevated privileges. This is due to input validation errors in the 'X-FORWARDED-FOR' and 'CLIENT-IP' variables in '/inc/show.inc.php'. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | GNU CuteNews Input Validation Vulnerabilities | High | Security Tracker Alert ID: 1013331, March 1, 2005 |
Gaim prior to 1.1.4 | A vulnerability exists in the processing of HTML that could let a remote malicious user crash the Gaim client. This is due to a NULL pointer dereference.
Update to version 1.1.4: http://gaim.sourceforge.net/downloads.php Ubuntu: Fedora: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Currently we are not aware of any exploits for this vulnerability. | GNU Gaim Denial of Service Vulnerability | Low | Sourceforge.net Gaim Vulnerability Note, February 24, 2005 Gentoo, GLSA 200503-03, March 1, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:049, March 4, 2005 |
ProjectBB 0.4.5.1 | A vulnerability exists that could permit a remote malicious user to inject SQL commands and conduct Cross-Site Scripting attacks. This is due to input validation errors in the 'drivers.php' scripts. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | GNU ProjectBB Input Validation Vulnerabilities | High | Security Tracker Alert ID: 1013332, March 1, 2005 |
MercuryBoard 1.1.2 | Two vulnerabilities exists that can let remote malicious users conduct script insertion and SQL injection attacks. This is due to improper input validation in the avatar URL parameter and the 'f' parameter in 'index.php.' No workaround or patch available at time of publishing. Currently we are not aware of any exploits for these vulnerabilities. | GPL MercuryBoard SQL Injection and Script Insertion Vulnerabilities | High | Secunia SA14414, March 2, 2005 |
MyPHP Forum | A vulnerability exists that could permit a remote malicious user to inject SQL commands. This is because several scripts do not properly validate user-supplied input in certain fields. These scripts are: 'forum.php', 'member.php', 'forgot.php', and 'include.php'. FedoraLegacy: href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/redhat/ A Proof of Concept exploit has been published. | High | Security Tracker Alert ID: 1013136, February 9, 2005 Fedora Legacy Update Advisory, FLSA:1748, March 7, 2005 | |
OpenVMS VAX 6.2-x, 7.3; OpenVMS Alpha 6.2-x, 7.3-1, 7.3-2 | A vulnerability exists that could let a local user can gain elevated privileges. HP has issued patches at: http://www2.itrc.hp.com/service/cki/enterService.do Customers who have installed DECnet-Plus must install both MUP kits listed. OpenVMS Alpha V7.3-2 OpenVMS Alpha V7.3-1 OpenVMS Alpha V6.2-x OpenVMS VAX V7.3 OpenVMS VAX V6.2-x Currently we are not aware of any exploits for this vulnerability. | Hewlett-Packard OpenVMS Access Vulnerability | Medium | HP Security Bulletin HPSBOV01121, SSRT4866 rev.0 March 1, 2005 |
phpWebLog 0.4.2, 0.5-0.5.3 | A vulnerability exists in the 'include_once()' function call due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. There is no exploit code required, however, a Proof of Concept exploit has been published. | Jason Hines PHPWebLog Remote File Include | High | Security Focus, 12747, March 7, 2005 |
Mozilla 1.7.x and prior Mozilla Firefox 1.x and prior Mozilla Thunderbird 1.x and prior | Multiple vulnerabilities exist in Firefox, Mozilla and Thunderbird. These can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to conduct spoofing attacks, disclose and manipulate sensitive information, and potentially compromise a user's system. Firefox: Update to version 1.0.1: http://www.mozilla.org/products/firefox/ Mozilla: Thunderbird: Fedora update for Firefox: http://download.fedora.redhat.com/ Red Hat: Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | Mozilla / Firefox / Thunderbird Multiple Vulnerabilities CAN-2005-0255 | High | Mozilla Foundation Security Advisories 2005-14, 15, 17, 18, 19, 20, 21, 24, 28 Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 |
Firefox 1.x, 0.x, | A vulnerability exists because a website can inject content into another site's window if the target name of the window is known, which could let a remote malicious user spoof the content of websites Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-10.xml"> A Proof of Concept exploit has been published. Vulnerability has appeared in the press and other public media. | Medium | Secunia SA13129, December 8, 2004 Gentoo Linux Security Advisory GLSA 200503-10, March 4, 2005 | |
Firefox 1.0 | A vulnerability exists in the XPCOM implementation that could let a remote malicious user execute arbitrary code. The exploit can be automated in conjunction with other reported vulnerabilities so no user interaction is required.
A fixed version (1.0.1) is available at: http://www.mozilla.org/products/firefox/all.html Red Hat: http://rhn.redhat.com/errata/ Gentoo: A Proof of Concept exploit has been published. | Mozilla Firefox Remote Code Execution Vulnerability | High | Security Tracker Alert ID: 1013301, February 25, 2005 Red Hat RHSA-2005:176-11, March 1, 2005 and RHSA-2005:277-10, March 4, 2005 Gentoo, GLSA 200503-10, March 4, 2005 |
Firefox 1.0 | There are multiple vulnerabilities in Mozilla Firefox. A remote user may be able to cause a target user to execute arbitrary operating system commands in certain situations or access access content from other windows, including the 'about:config' settings. This is due to a hybrid image vulnerability that allows batch statements to be dragged to the desktop and because tabbed javascript vulnerabilities let remote users access other windows. A fix is available via the CVS repository Fedora:
href="ftp://aix.software.ibm.com/aix/efixes/security/perl58x.tar.Z"> Red Hat: Gentoo: A Proof of Concept exploit has been published. | Mozilla Firefox Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230 | High | Security Tracker Alert ID: 1013108, February 8, 2005 Fedora Update Notification, Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 |
Mozilla 1.7.3 for Linux, Mozilla 1.7.5 for Windows, and Mozilla Firefox 1.0 | A vulnerability exists which can be exploited by malicious people to spoof the source displayed in the Download Dialog box. The problem is that long sub-domains and paths aren't displayed correctly, which therefore can be exploited to obfuscate what is being displayed in the source field of the Download Dialog box. Upgrade available at: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"> Red Hat: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Medium | Secunia SA13599, January 4, 2005 Fedora Update Notification, Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 | |
Mozilla 1.7.3 Mozilla Firefox 1.0 for Windows | A vulnerability exists that could let remote malicious users trick users into downloading malicious files. This is because the the browser uses the different criteria to determine the the file type when saving the downloaded file. Updated versions are available. Mozilla Firefox 1.0.1: http://www.mozilla.org/products/firefox/ Mozilla 1.7.5: http://www.mozilla.org/products/mozilla1.x/ Red Hat: Gentoo: Currently we are not aware of any exploits for this vulnerability. | Mozilla / Firefox Download Spoofing Vulnerability | Medium | Secunia SA13258, March 1, 2005 Mozilla Foundation Security Advisory 2005-22 Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 |
Mozilla Firefox 1.0 and 1.0.1 | A vulnerability exists that could let remote malicious users conduct Cross-Site Scripting attacks. This is due to missing URI handler validation when dragging an image with a "javascript:" URL to the address bar. No workaround or patch available at time of publishing. Red Hat: Gentoo: A Proof of Concept exploit has been published. | Mozilla Firefox Image Javascript URI Dragging Cross-Site Scripting Vulnerability | High | Secunia SA14406, March 1, 2005 Red Hat RHSA-2005:176-11, March 1, 2005 Gentoo, GLSA 200503-10, March 4, 2005 |
Multiple (See advisory | A vulnerability exists that affects implementations of the Transmission Control Protocol (TCP) that comply with the Internet Engineering Task Force’s (IETF’s) Requests For Comments (RFCs) for TCP. The impact of this vulnerability varies by vendor and application but could let a remote malicious user cause a Denial of Service, or allow unauthorized malicious users to inject malicious data into TCP streams. List of updates available at: NetBSD:
href="ftp://ftp.netbsd.org/pub/NetBSD/security/patches/SA2004-006-kernel/netbsd-1-6/"> SCO:
href="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14">
href="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9">ftp://ftp.sco.com/pub/updates/ SGI:
href="http://www.sgi.com/support/security/"> SCO:
href="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3"> Proofs of Concept exploits have been published. | Low/High (High if arbitrary code can be executed) | NISCC Vulnerability Advisory, 236929, April 23, 2004 VU#415294,
href="http://www.kb.cert.org/vuls/id/415294">http://www.kb.cert.org TA04-111A, href="http://www.us-cert.gov/cas/techalerts/TA04-111A.html">http://www.us-cert.gov/cas/techalerts/TA04-111A.html SGI Security Advisory, 20040905-01-P, September 28,2004 SCO Security Advisory, SCOSA-2005.3, March 1, 2005 | |
OpenPGP | A vulnerability exists that could permit a remote malicious user to conduct an adaptive-chosen-ciphertext attack against OpenPGP's cipher feedback mode. The flaw is due to an ad-hoc integrity check feature in OpenPGP. A solution will be available in the next release of the product. SUSE: A Proof of Concept exploit has been published. | Medium | SUSE Security Summary Report, SUSE-SR:2005:007, March 4, 2005 | |
Nokia Symbian OS | A vulnerability exists that could let a remote malicious user cause a Denial of Service by causing the phone to restart. This is due to a error in the nickname functionality. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Nokia Symbian OS Phone Denial of Service Vulnerability | Low | Security Focus, Bugtraq ID 12743, March 8, 2005 |
Oracle Database Server 8i, 9i | An input validation vulnerability exists in the UTL_FILE package that could let remote malicious authenticated user access arbitrary files on the target system. This is because the of input validation errors is some Directory Object functions. Critical Patch Update - January 2005 is available: http://www.oracle.com/technology/ Currently we are not aware of any exploits for this vulnerability. | Oracle Database Server UTL_FILE Error Discloses Files to Remote Authenticated Users | Medium | Oracle Critical Patch Update, January 2005 |
paBox | A vulnerability exists that could let a remote malicious user conduct Cross-Site Scripting attacks. A hidden POST variable set to 'text' can trigger the attack. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | PHP Arena paBox Cross-Site Scripting Vulnerability | High | Security Tracker Alert ID: 1013363, March 3, 2005 |
PHP Gift Registry 1.x | A vulnerability exists in 'index.php' due to insufficient sanitization of the 'messageid,' 'shopper,' and 'shopfor' parameters and in 'item.php' due to insufficient sanitization of the 'itemid' parameter, which could let a remote malicious user execute arbitrary SQL commands. Upgrade available at: Proofs of Concept exploits have been published. | PHP Gift Registry Parameter Input Validation | High | Secunia Advisory, Security Focus, 12289, March 7, 2005 |
PHP 4.0-4.0.7, 4.0.7 RC1-RC3, 4.1 .0-4.1.2, 4.2 .0-4.2.3, 4.3-4.3.8, 5.0 candidate 1-3, 5.0 .0-5.0.2 | A vulnerability exists in the 'open_basedir' directory setting due to a failure of the cURL module to properly enforce restrictions, which could let a malicious user obtain sensitive information. Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/p/php4/"> FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org There is no exploit code required; however, a Proof of Concept exploit has been published. | Medium | Security Tracker Alert ID, 1011984, October 28, 2004 Ubuntu Security Notice, USN-66-1, January 20, 2005 Ubuntu Security Notice, USN-66-2, February 17, 2005 Fedora Legacy Update Advisory, FLSA:2344, March 7, 2005 | |
PHP 4.3.6-4.3.9, 5.0 candidate 1-canidate 3, 5.0 .0-5.0.2 | Multiple vulnerabilities exist: a buffer overflow vulnerability exists in the 'pack()' function, which could let a remote malicious user execute arbitrary code; an integer overflow vulnerability exists in the 'unpack()' function, which could let a remote malicious user obtain sensitive information; a vulnerability exists in 'safe_mode' when executing commands, which could let a remote malicious user bypass the security restrictions; a vulnerability exists in 'safe_mode' combined with certain implementations of 'realpath(),' which could let a remote malicious user bypass security restrictions; a vulnerability exists in 'realpath()' because filenames are truncated; a vulnerability exists in the 'unserialize()' function, which could let a remote malicious user obtain sensitive information or execute arbitrary code; a vulnerability exists in the 'shmop_write()' function, which may result in an attempt to write to an out-of-bounds memory location; a vulnerability exists in the 'addslashes()' function because '\0' if not escaped correctly; a vulnerability exists in the 'exif_read_data()' function when a long sectionname is used, which could let a remote malicious user obtain sensitive information; and a vulnerability exists in 'magic_quotes_gpc,' which could let a remote malicious user obtain sensitive information. Upgrades available at: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" Conectiva: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-031.html"> SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/p/php4/"> Apple:
href="http://www.apple.com/support/downloads/"> FedoraLegacy:
href="http://download.fedoralegacy.org/redhat/">http://download.fedoralegacy.org/ There is no exploit code required; however, a Proof of Concept exploit script has been published. | PHP Multiple Remote Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2004-1018">CAN-2004-1018 | Medium/ High (High if arbitrary code can be executed) | Bugtraq, December 16, 2004 Conectiva Linux Security Announcement, CLA-2005:915, January 13, 2005 Red Hat, Advisory: RHSA-2005:031-08, January 19, 2005 SUSE Security Announcement, SUSE-SA:2005:002, January 17, 2005 Ubuntu Security Notice, USN-66-1, January 20, 2005 Apple Security Update, APPLE-SA-2005-01-25, January 26, 2005 Fedora Legacy Update Advisory, FLSA:2344, March 7, 2005
|
phpBB 2.0.12 | A vulnerability exists that could let a remote malicious user determine the installation path. This is due to improper input validation in the 'highlight' parameter in 'viewtopic.php'. Update to version 2.0.13: http://www.phpbb.com/downloads.php A Proof of Concept exploit has been published. | phpBB 'viewtopic.php' Information Disclosure | Low | [N]eo [S]ecurity [T]eam [NST] - Advisory #06 - 25/02/05 |
phpBB 2.0.12 and prior | A vulnerability exists that could let a remote malicious user bypass certain security restrictions. This is due to errors in sessiondata['autologinid'], auto_login_key, and viewtopic.php. Update to version 2.0.13. Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-02.xml"> An exploit script has been published. | Medium | phpBB 2.0.13 Release Notes, February 27, 2005 Gentoo Linux Security Advisory, GLSA 200503-02, March 1, 2005 | |
phpBB 2.0.13 | A vulnerability exists that could let remote malicious users conduct script insertion attacks. This is because input passed in a signature is not properly validated before being used in 'privmsg.php' and 'viewtopic.php.' No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | phpBB Signature Script Insertion Vulnerability | High | Secunia SA14475, March 8, 2005 |
phpBB 2.0.13 and prior | A vulnerability exists in 'oracle.php' that could let a remote user determine the installation path. A remote user can access 'phpBB/db/oracle.php'. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | phpBB Group phpBB 'oracle.php' Information Disclosure | Low | [N]eo [S]ecurity [T]eam [NST] - Advisory #09 - 03/03/05 |
phpBB 2.0.13 and prior | A vulnerability in the 'usercp_register.php' script could let a remote malicious user conduct Cross-Site Scripting attacks. This is due to input validation errors in 'usercp_register.php.' No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | phpBB Group phpBB 'usercp_register.php' Cross-Site Scripting Vulnerability | High | [N]eo [S]ecurity [T]eam [NST] - Advisory #08 - February 29, 2005 |
phpMyAdmin 2.6.1 | Multiple vulnerabilities exist that could let remote malicious users conduct Cross-Site Scripting attacks and disclose sensitive information. This is due to input validation errors in "select_server.lib.php", "display_tbl_links.lib.php", "theme_left.css.php", "theme_right.css.php", "phpmyadmin.css.php", and "database_interface.lib.php." Update to version 2.6.1-pl1:
href="http://sourceforge.net/project/showfiles.php?group_id=23067"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-07.xml"> SUSE: A Proof of Concept exploit script has been published. | phpMyAdmin Cross-Site Scripting and Information Disclosure Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0543">CAN-2005-0543 | Medium/ High (High if arbitrary code can be executed) | Sourceforge.net, phpMyAdmin Project Tracker 1149383 and 1149381, February 22, 2005 Gentoo Linux Security Advisory, GLSA 200503-07, March 3, 2005 SUSE Security Summary Report, SUSE-SR:2005:007, March 4, 2005 |
phpMyFAQ 1.4 and 1.5 | A vulnerability exists that could let remote malicious users conduct SQL injection attacks. This is because input passed to the "username" field in forum messages isn't properly validated before being used in a SQL query. Update to version 1.4.7: http://www.phpmyfaq.de/download.php Currently we are not aware of any exploits for this vulnerability. | phpMyFaq SQL Injection Vulnerability | High | phpMyFAQ Security Advisory, March 6, 2005 |
An include file vulnerability exists that could let a remote malicious user execute arbitrary commands on the target system. This is due to an input validation error in the 'auth.php' script. Update to version 1.2.5: http://newsphp.sourceforge.net/downloads.php Currently we are not aware of any exploits for this vulnerability. | PHPNews 'auth.php' Flaw Permits Remote Code Execution | High | Security Tracker Alert ID: 1013345 March 2, 2005 | |
Zorum 3.5 | A vulnerability exists that could let a remote malicious user conduct Cross-Site Scripting attacks or gain elevated privileges. This is due to input validation errors in the 'list', 'method', and 'frommethod' parameters. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | PhpOutsourcing Zorum Cross-Site Scripting Vulnerability | High | Security Tracker Alert ID: 1013365, March 4, 2005 |
SafeHTML prior to 1.3.0 | A vulnerability exists because the software may not properly filter decimal HTML entities and code containing the \x00 symbol. As a result, remote malicious user could execute arbitrary code. Update to version 1.3.0: Currently we are not aware of any exploits for this vulnerability. | PixelApes SafeHTML Remote Code Execution Vulnerability | High | Security Tracker Alert ID: 1013315, February 28, 2005 |
RealPlayer prior to 6.0.12.1059 | A vulnerability in the processing of SMIL files could let a remote malicious user execute arbitrary code. A special Synchronized Multimedia Integration Language (smil) file could trigger to trigger a buffer overflow in the player's SMIL parser. The vulnerability is in 'datatype/smil/renderer/smil1/smlparse.cpp' when processing the screen size attribute. Updates available at: http://service.real.com/help/faq/security Currently we are not aware of any exploits for this vulnerability. | RealNetworks RealPlayer SMIL Error Permits Remote Code Execution | High | iDEFENSE Security Advisory 03.01.05 |
RealPlayer prior to 6.0.12.1059 | A vulnerability in the processing of WAV files could let a remote malicious user execute arbitrary code. A special WAV file could trigger a buffer overflow and execute arbitrary code. Updates available at: http://service.real.com/help/faq/security/ Currently we are not aware of any exploits for this vulnerability. | RealNetworks RealPlayer WAV File Error Permits Remote Code Execution | High | RealPlayer Release Notes March 1, 2005 |
The Includer | A vulnerability exists that could let a remote malicious user execute arbitrary commands on the target system. This is due to input validation errors in the 'includer.cgi' script. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Smarter Scripts The Includer Remote Code Execution Vulnerability | High | Security Focus, Bugtraq ID 12738, March 7, 2005 |
Squid 2.5 | A vulnerability exists that could permit a remote malicious user to send multiple Content-length headers with special HTTP requests to corrupt the cache on the Squid server. A patch (squid-2.5.STABLE7-header_parsing.patch) is available at:
href="http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-header_parsing.patch"> Conectiva:
href="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000923"> Gentoo: Debian:
href="http://www.debian.org/security/2005/dsa-667"> Ubuntu:
href="http://www.ubuntulinux.org/support/documentation/usn/usn-77-1"> SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Trustix:
href="http://www.trustix.org/errata/2005/0003/"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-061.html"> SuSE: Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/s/squid/"> TurboLinux:
href="ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/"> Astaro:
href="http://www.astaro.org/showflat.php?Cat=&Number=56136&page=0&view=collapsed&sb=5&o=&fpart=1#56136"> Conectiva: ftp://atualizacoes.conectiva.com.br/ Currently we are not aware of any exploits for this vulnerability. | Squid Error in Parsing HTTP Headers
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174">CAN-2005-0174 | Medium | Security Tracker Alert ID, 1012992, January 25, 2005 Gentoo GLSA 200502-04, February 2, 2005 Debian DSA-667-1, February 4, 2005 SUSE, SUSE-SR:2005:003, February 4, 2005 US-CERT Vulnerability Note, VU#924198 US-CERT Vulnerability Note, VU#625878 Trustix #2005-0003, February 11, 2005 Ubuntu Security Notice, USN-77-1, February 7, 2005 SUSE Security Announcement, SUSE-SA:2005:006, February 10, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:034, February 11, 2005 RedHat Security Advisory, RHSA-2005:061-19, February 11, 2005 Turbolinux Security Announcement, February 17, 2005 Security Focus, 12412, March 7, 2005 Conectiva Linux Security Announcement, CLA-2005:931, March 8, 2005 |
Download Center Lite 1.5 and prior | A vulnerability exists that could let remote malicious users include arbitrary files to compromise a vulnerable system. This is due to improper input validation in the "script_root" parameter in "inc/download_center_lite.inc.php". Update to version 1.6: http://www.stadtaus.com/en/php_scripts/ Currently we are not aware of any exploits for this vulnerability. | Stadtaus Download Center Lite Arbitrary File Inclusion Vulnerability | Medium | Secunia SA14513, March 7, 2005 |
Tell a Friend Script prior to 2.7 | An include file vulnerability was reported in the STADTAUS.com 'Tell a Friend Script' software. A remote user can execute arbitrary commands on the target system. This is because 'inc/tell_a_friend.inc.php' does not properly validate user-supplied input. Update to version 2.7: http://www.stadtaus.com/en/php_scripts/ Currently we are not aware of any exploits for this vulnerability. | Stadtaus Tell a Friend Script Remote Code Execution Vulnerability | High | SecurityTracker Alert ID: 1013390, March 7, 2005 |
Form Mail Script 2.3 and prior | A vulnerability exists that could let a remote malicious user execute arbitrary commands on the target system. This is because the 'inc/formmail.inc.php' script does not properly validate user-supplied input in the 'script_root' parameter. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Stadtaus Form Mail Script Lets Remote Users Include and Execute Arbitrary PHP Code | High | Security Focus, Bugtraq ID 12735, March 7, 2005 |
TYPO3 | An input validation vulnerability was reported in TYPO3. A remote malicious user can inject SQL commands. This is due to input validation errors in the 'category_uid' variable. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | TYPO3 SQL Injection Vulnerability | High | SecurityTracker Alert ID: 1013364, March 3, 2005 |
Burning Board 2.0.3, 2.1.5, 2.2.1, and 2.3.0 | A vulnerability exists that could let a remote malicious user inject SQL commands and gain administrative privileges. This is due to input validation errors in the getwbbuserdata() function in the '/acp/lib/session.php' script. Fixed versions (2.0.3pl1, 2.1.5pl1, 2.2.1pl1 and 2.3.0pl1) are available at: http://www.woltlab.info/products/ A Proof of Concept exploit has been published. | Woltlab Burning Board Input Validation Vulnerabilities | High | SecurityTracker Alert ID: 1013351, March 2, 2005 |
WorkCentre M35, M45, M55, M165, M175 and WorkCentre Pro 32 Color, 35, 40 Color, 45, 55, 65, 75, 90, 165, 175, C2128, C2636, C3545 | A vulnerability exists that could let a remote malicious user gain access to the embedded web server and make changes to the system configuration. This is due to an error in the Web Server component of Xerox WorkCentre printers.
A fix is available at: http://www.xerox.com/downloads/ Currently we are not aware of any exploits for this vulnerability. | Xerox WorkCentre Access Vulnerability | Medium | Xerox Security Bulletin XRX05-005, March 1, 2005 |
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script | Script name | Workaround or Patch Available | Script Description |
March 8, 2005 | ethereal3GA11OverflowExploit.c | No | Exploit for the Ethereal RADIUS Authentication Dissection Buffer Overflow vulnerability. |
March 7, 2005 | aztek.c | No | Proof of Concept exploit for the Aztek Forum Unauthorized Access Vulnerability. |
March 7, 2005 | browserDisclose.txt | N/A | Proof of Concept exploit for an information disclosure vulnerability in multiple browsers. |
March 7, 2005 | chaserfp.zip | No | Exploit for the JoWood Chaser Remote Buffer Overflow vulnerability. |
March 7, 2005 | FormMailScript_poc.pl | No | Perl script that exploits the Stadtaus.Com PHP Form Mail Script Remote File Include vulnerability. |
March 7, 2005 | nessuswc-v1.1-02.tar.gz | N/A | NessusWC provides a simple HTTP Web interface to the Nessus Security Scanner. |
March 7, 2005 | nokia_bt_rr.pl | No | Perl script that exploits the Nokia Series 60 BlueTooth Remote Denial of Service vulnerability. |
March 7, 2005 | realPlayerSMILFileOverflowPoC.c | Yes | Exploit for the RealPlayer SMIL Error Permits Remote Code Execution vulnerability. |
March 7, 2005 | weplab-0.1.4.tar.gz | N/A | A tool for reviewing the security of WEP encryption in wireless networks that contains several attacks. |
March 7, 2005 | Y!PoC.zip | No | A Proof of Concept exploit for the Yahoo! Messenger Offline Mode Status Remote Buffer Overflow vulnerability. |
March 5, 2005 | calicclnt_getconfig.pm calicserv_getconfig.pm | Yes | Exploits for the Computer Associates License Remote Code Execution Vulnerability. |
March 5, 2005 | trackercam_phparg_overflow.pm | No | Exploit for the TrackerCam Multiple Remote Vulnerabilities. |
March 5, 2005 | typo3sql.txt | No | Proof of Concept exploit for the TYPO3 SQL Injection Vulnerability |
March 4, 2005 | ca3dex.zip | Yes | Exploit for the Ca3DE Multiple Remote Vulnerabilities. |
March 4, 2005 | phpBBphuket.pl | Yes | Script that exploits the phpBB "autologinid" Security Bypass vulnerability. |
March 3, 2005 | awstats_shell.c | Yes | Script that exploits the GNU AWStats Multiple Vulnerabilities. |
March 3, 2005 | CProxyRemote.txt | No | Detailed exploitation for the Computalynx CProxy Directory Traversal & Remote Denial of Service vulnerabilities. |
March 3, 2005 | ida_sync.zip | N/A | DA Sync was written to allow multiple analysts to synchronize their reverse engineering efforts with IDA Pro in real time. |
March 3, 2005 | p_wu.c | No | Script that exploits the Wu-FTPD Globbing Denial of Service vulnerability. |
March 3, 2005 | sb26-2.6.11.tar.gz | N/A | KSB26, Kernel Socks Bouncer for 2.6.x, is a Linux 2.6.x-kernel patch that redirects full tcp connections through a socks5 proxy. |
March 2, 2005 | foxmail_poc.py foxmail_bof.c foxmail.txt | No | Exploits for the Foxmail USER Command Multiple Remote Vulnerabilities. |
March 2, 2005 | golden.java | No | Exploit for the Golden FTP Server 'USER" Remote Buffer Overflow vulnerability. |
March 2, 2005 | trillianPNGOverflow.py trillian.py | No | Exploit for the Cerulean Studios Trillian Insecure Image Data Remote Buffer Overflow vulnerability. |
March 1, 2005 | cutenews.txt | No | Detailed exploitation for the GNU CuteNews Input Validation Vulnerabilities. |
name=trends>Trends
- On Monday, February 28th, the National Institute of Standards and Technology released the final version of security guidelines designed to protect federal computer systems and the information they hold. The guidelines will serve as a road map for federal agencies in meeting mandates set by the Federal Information Security Management Act (FISA). For more information, see "NIST releases final security guidelines" located at: http://news.com.com/NIST+releases+final+security+guidelines/2100-7348_3-5593256.html?tag=nefd.top
- In a survey conducted by CDW Government, Inc. at the 2005 IPIC conference, federal information technology executives say that cybersecurity is their chief concern. Forty-three percent of federal executives surveyed at a conference this week in Orlando, Fla., said information technology security was their highest priority for 2005. For more information, see " IT executives say cybersecurity is top concern" located at: http://www.govexec.com/dailyfed/0305/030205p1.htm
- When phishing emerged as a serious problem in 2003, many law enforcement agencies were caught off guard. As a result, the FBI and the Secret Service have relied on the private sector for a great deal of help in tracking down phishing sites and taking them offline. For more information, see "Private Sector, Feds Team Up Against Phishing" located at: http://www.eweek.com/article2/0,1759,1772524,00.asp
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trends |
face="Arial, Helvetica, sans-serif">Date |
1 | Bagle.BJ | Win32 Worm | Stable | January 2005 |
2 | Netsky-P | Win32 Worm | Stable | March 2004 |
3 | Zafi-D | Win32 Worm | Stable | December 2004 |
4 | Netsky-Q | Win32 Worm | Stable | March 2004 |
5 | Zafi-B | Win32 Worm | Stable | June 2004 |
6 | Netsky-D | Win32 Worm | Stable | March 2004 |
7 | Netsky-Z | Win32 Worm | Return to Table | April 2004 |
8 | Netsky-B | Win32 Worm | Slight Decrease | February 2004 |
9 | Bagle-AU | Win32 Worm | Slight Decrease | October 2004 |
10 | Bagle.BB | Win32 Worm | Stable | September 2004 |
Table Updated March 8, 2005
Viruses or Trojans Considered to be a High Level of Threat
- Kelvir.B: Security watchers have warned that the Kelvir.B worm has begun spreading around the world, dropping a payload in the form of another worm, known as Spybot, on infected PCs. The worm spreads using MSN Messenger when unwitting recipients click on a URL in a message reading: "lol! see it! u'll like it" Once clicked the link downloads a variant of the Spybot worm and sends a message to everyone else on the user's contact list. For more information see: http://www.vnunet.com/news/1161784
- Commwarrior-A: The first mobile phone virus capable of replicating via MMS messages has been discovered. Commwarrior-A, which targets Symbian Series 60 phones, is not spreading, but its ability to propagate via Multimedia Messaging Service messages (MMS) worries some experts. For more information see: http://www.theregister.co.uk/2005/03/08/mms_virus/
- Dampig: Virus writers have created a new Trojan capable of infecting Symbian Series 60 smartphones. Dampig-A attempts to trick users into downloading it by posing as the cracked version of the FSCaller application, developed by SymbianWare of Germany. Dampig corrupts the system uninstallation information so it cannot be removed without disinfecting the phone with anti-virus. For more information see: http://www.theregister.co.uk/2005/03/07/dampig_symbian_trojan/
The following table provides, in alphabetical order, a list of new viruses, variations of previously encountered viruses, and Trojans that have been discovered during the period covered by this bulletin. This information has been compiled from the following anti-virus vendors: Sophos, Trend Micro, Symantec, McAfee, Network Associates, Central Command, F-Secure, Kaspersky Labs, MessageLabs, Panda Software, Computer Associates, and The WildList Organization International. Users should keep anti-virus software up to date and should contact their anti-virus vendors to obtain specific information on the Trojans and Trojan variants that anti-virus software detects.
NOTE: At times, viruses and Trojans may contain names or content that may be considered offensive.
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.