Summary of Security Items from September 6 through September 13, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, therefore the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
Note: Even though a vulnerability may allow several malicious acts to be performed, only the highest level risk will be defined in the Risk column.
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Windows Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
AVIRA Desktop for Windows 1.00.00.68 with AVPACK32.DLL version 6.31.0.3 | A buffer overflow vulnerability has been reported in AVIRA Desktop for Windows, ACE archive processing, that could let remote malicious users execute arbitrary code. Update to AVPACK32.DLL version 6.31.1.7 using AVIRA's online update feature. Currently we are not aware of any exploits for this vulnerability. | AVIRA Antivirus Arbitrary Code Execution | High | Secunia, Advisory: SA16691, September 14, 2004 |
WebArchiveX 5.5.0.76 | A vulnerability has been reported in WebArchiveX that could let remote malicious users access arbitrary files. Upgrade to a release after September 6th, 2005. There is no exploit code required. | CSystems WebArchiveX Arbitrary File Access | Medium | Security Tracker, Alert ID: 1014867, September 7, 2005 |
NOD32 Antivirus for Windows NT, 2000, 2003, XP, trial version 2.5 with nod32.002 version 1.033 build 1127 | A buffer overflow vulnerability has been reported in NOD32, ARJ archive processing, that could let remote malicious users execute arbitrary code. Update to nod32.002 version 1.034 build 1132 using NOD32's online update feature. Currently we are not aware of any exploits for this vulnerability. | Eset NOD32 Arbitrary Code Execution | High | Secunia, Advisory: SA16604, September 8, 2005 |
WhatsUp Gold 8.0 4, Whatsup Small Business 2004 | Multiple vulnerabilities have been reported in WhatsUp that could let remote malicious users to disclose files, conduct Cross-Site Scripting, or arbitrary code execution. No workaround or patch available at time of publishing. There is no exploit code required. | Ipswitch WhatsUp Multiple Vulnerabilities | High | Security Focus, Bugtraq ID: 14792, 14797, 14799, September 9, 2005 |
Mall23 eCommerce | An input validation vulnerability has been reported Mall23 eCommerce ('infopage.asp') that could let remote malicious users perform SQL injection. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Mall23 SQL Injection | Medium | Security Tracker, Alert ID: 1014882, September 12, 2005 |
Exchange Server 2003 | A vulnerability has been reported in Exchange Server 2003, Microsoft Exchange Information Store service, that could let remote malicious users cause a Denial of Service. Vendor hotfix available: There is no exploit code required. | Microsoft Exchange Server 2003 Denial of Service | Low | Secunia, Advisory: SA16740, September 8, 2005 |
Outlook Express 5.5, 6 | A remote code execution vulnerability has been reported in Outlook Express when it is used as a newsgroup reader. A malicious user could exploit the vulnerability by constructing a malicious newsgroup server that could that potentially allow remote code execution if a user queried the server for news. Updates available: An exploit script has been published. | Microsoft Outlook Express Could Allow Remote Code Execution | High | Microsoft, MS05-030, June 14, 2004 Security Focus, Bugtraq ID: 13951, September 12, 2005 |
VE2 1.05.1008 | A vulnerability has been reported in VE2 that could let local malicious users bypass security restrictions. Upgrade to version 1.05.1009: A Proof of Concept exploit script has been published. | SecureOL VE2 Security Restriction Bypass | Medium | Secunia Advisory: SA16739, September 8, 2005 |
KillProcess prior to 2.20 | A buffer overflow vulnerability has been reported in KillProcess that could let local malicious users to execute arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | KillProcess Arbitrary Code Execution | High | Security Focus, Bugtraq ID: 14795, September 9, 2005 |
Sophos AntiVirus | A vulnerability has been reported in Sophos Anti-Virus 'Scan Mailboxes' feature that could let remote malicious users cause a Denial of Service. Vendor workaround available: There is no exploit code required. | Sophos Anti-Virus Denial of Service | Low | Security Tracker, Alert ID: 1014869, September 8, 2005 |
COOL! Remote Control 1.12 | A vulnerability has been reported in COOL! Remote Control that could let a local malicious users cause a Denial of Service. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Yaosoft COOL! Remote Control Denial of Service | Low | Secunia, Advisory: SA16742, September 12, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Apache 2.0.x | A vulnerability has been reported in 'modules/ssl/ssl_engine Patch available at: OpenPKG: RedHat: Ubuntu: SGI: Debian: Mandriva: Slackware: Trustix: Debian: There is no exploit code required. | Apache 'Mod_SSL SSLVerifyClient' Restriction Bypass | Medium | Security Tracker Alert ID: 1014833, September 1, 2005 OpenPKG Security Advisory, OpenPKG-SA-2005.017, September 3, 2005 RedHat Security Advisory, RHSA-2005:608-7, September 6, 2005 Ubuntu Security Notice, USN-177-1, September 07, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Debian Security Advisory, DSA 805-1, September 8, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:161, September 8, 2005 Slackware Security Advisory, SSA:2005-251-02, September 9, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0047, September 9, 2005 Debian Security Advisory DSA 807-1, September 12, 2005 |
Macintosh OS X | Multiple vulnerabilities have been reported: a vulnerability was reported due to the way temporary files are handled, which could let a remote malicious user corrupt/create arbitrary files; a vulnerability was reported in the privileged helper because temporary files are created insecurely, which could let a remote malicious user corrupt/create arbitrary files; a vulnerability was reported in the Java shared archives update utility, which could let a malicious user obtain elevated privileges; a vulnerability was reported when using Mac OS X specific extensions due to an unspecified error, which could let a malicious user obtain elevated privileges; and a vulnerability was reported in the Java ServerSocket object because it can be created for a port that is in use, which could let a malicious user intercept traffic. Patches available at: There is no exploit code required. | Apple Mac OS X Java Update CAN-2005-2527 | Medium | Apple Security Advisory, APPLE-SA-2005-09-13, September 13, 2005 |
Astaro Security Linux 6.0 01 | A vulnerability has been reported due to a weakness that may allow remote malicious user to connect to arbitrary ports which could lead to access control bypass.
Upgrades available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Astaro Security Linux HTTP CONNECT Unauthorized Access | Medium | Security Focus Bugtraq ID: 14665, August 25, 2005 Security Focus Bugtraq ID: 14665, September 7, 2005 |
BlueZ 2.18 & prior | A vulnerability has been reported due to insufficient sanitization of input passed as a remote device name, which could let a remote malicious user execute arbitrary code. Upgrades available at: Gentoo: Debian: Mandriva: Conectiva: There is no exploit code required. | BlueZ Arbitrary Command Execution
| High | Security Focus 14572, August 16, 2005 Gentoo Linux Security Advisory, GLSA 200508-09, August 17, 2005 Debian Security Advisory, DSA 782-1, August 23, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:150, August 25, 2005 Conectiva Linux Announcement, CLSA-2005:1001, September 13, 2005 |
common-lisp-controller | A vulnerability has been reported when validating the ownership of the cache directory, which could let a remote malicious user obtain elevated privileges. Currently we are not aware of any exploits for this vulnerability. | Common-lisp-controller Elevated Privileges | Medium | Debian Security Advisory, DSA 811-1, September 14, 2005 |
CVS 1.12.7-1.12.12, 1.12.5, 1.12.2 , 1.12.1, 1.11.19, 1.11.17 | A vulnerability has been reported in the 'cvsbug.in' script due to the insecure creation of temporary files, which could let a malicious user cause data loss or a Denial of Service. Fedora: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> FreeBSD: SGI: Debian: http://security.debian.org/ FreeBSD: There is no exploit code required. | CVS 'Cvsbug.In' Script Insecure Temporary File Creation | Low | Fedora Update Notifications Trustix Secure Linux Security Advisory, TSLSA-2005-0045, August 26, 2005 RedHat Security Advisory, RHSA-2005:756-3, September 6, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 FreeBSD Security Advisory, FreeBSD-SA-05:20, September 7, 2005 Debian Security Advisories, DSA 802-1 & 806-1, September 7 & 9, 2005 FreeBSD Security Advisory, FreeBSD-SA-05:20, September 9, 2005 |
Fetchmail 6.2.5 | A remote buffer overflow vulnerability has been reported in the POP3 client due to insufficient boundary checks, which could let a malicious user obtain elevated privileges. Fedora: Redhat: Ubuntu: Gentoo: Debian: SGI: TurboLinux: Conectiva: Currently we are not aware of any exploits for this vulnerability. | Fetchmail POP3 Client Buffer Overflow | Medium | Fedora Update Notifications, Redhat Security Advisory, RHSA-2005:640-08, July 25, 2005 Ubuntu Security Notice, USN-153-1, July 26, 2005 Gentoo Security Advisory, GLSA 200507-21, July 25, 2005 Debian Security Advisory, DSA 774-1, August 12, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Turbolinux Security Advisory, TLSA-2005-84, August 18, 2005 Conectiva Linux Announce-ment, CLSA-2005:1005, September 13, 2005 |
cpio 1.0, 1.1, 1.2 | A vulnerability has been reported in 'cpio/main.c' due to a failure to create files securely, which could let a malicious user obtain sensitive information. Upgrades available at: SGI: TurboLinux: Conectiva: There is no exploit required. | CPIO Archiver Insecure File Creation | Medium | Security Tracker Alert, 1013041, January 30, 2005 SGI Security Advisory, 20050204-01-U, March 7, 2005 Turbolinux Security Advisory, TLSA-2005-30, March 10, 2005 Conectiva Linux Announcement, CLSA-2005:1002, September 13, 2005 |
cpio 1.0-1.3, 2.4.2, 2.5, 2.5.90, 2.6 | A vulnerability has been reported when an archive is extracted into a world or group writeable directory because non-atomic procedures are used, which could let a malicious user modify file permissions. Trustix: Mandriva: RedHat: SGI: SCO: Avaya: Conectiva: There is no exploit code required. | Medium | Bugtraq, 395703, Trustix Secure Linux Security Advisory, TSLSA-2005-0030, June 24, 2005 Mandriva RedHat Security Advisory, RHSA-2005:378-17, July 21, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 SCO Security Advisory, SCOSA-2005.32, August 18, 2005 Avaya Security Advisory, ASA-2005-191, September 6, 2005 Conectiva Linux Announcement, CLSA-2005:1002, September 13, 2005 | |
cpio 2.6 | A Directory Traversal vulnerability has been reported when invoking cpio on a malicious archive, which could let a remote malicious user obtain sensitive information. Gentoo: Trustix: Mandriva: SCO: Avaya: Conectiva: A Proof of Concept exploit has been published. | Medium | Bugtraq, Gentoo Linux Security Advisory, GLSA Trustix Secure Mandriva Linux Security Update Advisory, MDKSA2005: SCO Security Advisory, SCOSA-2005.32, August 18, 2005 Avaya Security Advisory, ASA-2005-191, September 6, 2005 Conectiva Linux Announcement, CLSA-2005:1002, September 13, 2005 | |
Mailutils 0.6 | A format string vulnerability has been reported in 'search.c' when processing user-supplied IMAP SEARCH commands, which could let a remote malicious user execute arbitrary code. Patch available at: A Proof of Concept exploit script has been published. | GNU Mailutils Format String | High | Security Tracker Alert ID: 1014879, September 9, 2005 |
AIX 5.3 | Buffer overflow vulnerabilities have been reported in the 'invscout,' 'paginit,' 'diagTasksWebSM,' 'getlvname,' and 'swcons' commands and multiple 'p' commands, which could let a malicious user execute arbitrary code, potentially with root privileges. IBM has released an advisory (IBM-06-10-2005) to address this and other issues. Updated APAR availability information. Removed interim fix information. Vendor fix available: There is no exploit code required; however, a Proof of Concept exploit has been published. | IBM AIX Multiple Buffer Overflows CAN-2005-2232 | High | Security Tracker Alert, 1014132, June 8, 2005 IBM Security Advisory, IBM-06-10-2005, June 10, 2005 Security Focus, 13909, July 7, 2005 IBM Security Advisory, September 13, 2005 |
AIX 5.3
| A vulnerability has been reported in the NIS client which could let a remote malicious user execute arbitrary code with root privileges. Updated APAR availability information. Removed interim fix information. Hotfix available at: Currently we are not aware of any exploits for this vulnerability. | IBM AIX NIS Client Remote Arbitrary Code Execution | High | Secunia Advisory, IBM Security Advisory, Updated September 13, 2005 |
UnZip 5.52 | A vulnerability has been reported due to a security weakness when extracting an archive to a world or group writable directory, which could let a malicious user modify file permissions. Fedora: There is no exploit code required. | Info-ZIP UnZip File Permission Modification | Medium | Security Focus, 14450, August 2, 2005 Fedora Update Notification, |
KDE 3.2.0 up to including 3.4.2 | A vulnerability has been reported in 'kcheckpass.c' due to the insecure creation of the lock file, which could let a malicious user obtain superuser privileges. Patches available at: Mandriva: Ubuntu: Slackware: There is no exploit code required. | KDE kcheckpass Superuser Privilege Escalation | High | KDE Security Advisory, September 5, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:160, September 6, 2005 Ubuntu Security Notice, USN-176-1 September 07, 2005 Slackware Security Advisory, SSA:2005-251-01, September 9, 2005 |
KDE 3.0 - 3.4.2 | A vulnerability was reported in 'langen2kvtml' due to the insecure creation of temporary files, which could let malicious user obtain elevated privileges.
Patches available at: Fedora: Fedora: Mandriva: Slackware: There is no exploit code required. | KDE langen2kvtml Insecure Temporary File Creation | Medium | KDE Security Advisory, August 15, 2005 Fedora Update Notification, Fedora Update Notifications, Mandriva Linux Security Update Advisory, MDKSA-2005:159, September 6, 2005 Slackware Security Advisory, SSA:2005-251-03, September 9, 2005 |
pam_per_user 0.1-0.3 | A vulnerability has been reported in the authentication function due to an error when checking if the user name has been changed between calls, which could let a remote malicious user bypass authentication. Upgrades available at: There is no exploit code required. | Mark D. Roth PAM_Per_User Authentication Bypass | Medium | Security Focus, Bugtraq ID: 14813, September 12, 2005 |
Kismet 2005-07-R1 | Multiple vulnerabilities have been reported: an integer underflow vulnerability was reported when handling pcap files; a vulnerability was reported due to an unspecified error when handling non-printable characters in SSID; and a integer underflow vulnerability was reported in the data frame dissection, which could possibly lead to the execution of arbitrary code. Upgrade available at: Gentoo: Debian: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | Kismet Multiple Remote Vulnerabilities | High | Security Focus, Bugtraq ID 14430, August 16, 2005 Gentoo Linux Security Advisory, GLSA 200508-10, August 19, 200 Debian Security Advisory, DSA 788-1, August 29, 2005 SUSE Security Summary Report, SUSE-SR:2005:020, September 12, 2005 |
OpenLDAP 2.1.25; Padl Software pam_ldap Builds 166, 85, 202, 199, 198, 194, 183-192, 181, 180, 173, 172, 122, 121, 113, 107, 105 | A vulnerability has been reported in OpenLDAP, 'pam_ldap,' and 'nss_ldap' when a connection to a slave is established using TLS and the client is referred to a master, which could let a remote malicious user obtain sensitive information. Trustix: Gentoo: Mandriva: Ubuntu: TurboLinux: SUSE: There is no exploit code required. | Multiple Vendors TLS Plaintext Password | Medium | Trustix Secure Gentoo Linux Security Mandriva Linux Security Update Advisory, Ubuntu Security Notice, USN-152-1, July 21, 2005 Turbolinux Security Advisory, TLSA-2005-86 & 87, August 29, 2006 SUSE Security Summary Report, SUSE-SR:2005:020, September 12, 2005 |
zlib 1.2.2, 1.2.1, 1.2 .0.7, 1.1-1.1.4, 1.0-1.0.9; Ubuntu Linux 5.0 4, powerpc, i386, amd64, 4.1 ppc, ia64, ia32; SuSE Open-Enterprise-Server 9.0, Novell Linux Desktop 9.0, Linux Professional 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Personal 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Enterprise Server 9; Gentoo Linux; | A buffer overflow vulnerability has been reported due to insufficient validation of input data prior to utilizing it in a memory copy operation, which could let a remote malicious user execute arbitrary code. Debian: FreeBSD: Gentoo: SUSE: Ubuntu: Mandriva: OpenBSD: OpenPKG: RedHat: Trustix: Slackware: TurboLinux: Fedora: zsync: Apple: SCO: IPCop: Debian: Trolltech: Currently we are not aware of any exploits for this vulnerability. | Zlib Compression Library Buffer Overflow | High | Debian Security Advisory FreeBSD Security Advisory, Gentoo Linux Security Advisory, GLSA 200507- SUSE Security Announcement, SUSE-SA:2005:039, Ubuntu Security Notice, RedHat Security Advisory, RHSA-2005:569-03, Fedora Update Notifications, Mandriva Linux Security Update Advisory, OpenPKG Trustix Secure Slackware Security Turbolinux Security Fedora Update Notification, FEDORA-2005-565, July 13, 2005 SUSE Security Summary Security Focus, 14162, July 21, 2005 USCERT Vulnerability Note VU#680620, July 22, 2005 Apple Security Update 2005-007, SCO Security Advisory, SCOSA-2005.33, August 19, 2005 Security Focus, Bugtraq ID: 14162, August 26, 2005 Debian Security Advisory, DSA 797-1, September 1, 2005 Security Focus, Bugtraq ID: 14162, September 12, 2005 |
zlib 1.2.2, 1.2.1; Ubuntu Linux 5.04 powerpc, i386, amd64, | A remote Denial of Service vulnerability has been reported due to a failure of the library to properly handle unexpected compression routine input. Zlib: Debian: Ubuntu: OpenBSD: Mandriva: Fedora: Slackware: FreeBSD: SUSE: Gentoo: http://security.gentoo.org/ Trustix: Conectiva: Apple: TurboLinux: SCO: Debian: Trolltech: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendor Zlib Compression Library Decompression Remote Denial of Service | Low | Security Focus, Bugtraq ID 14340, July 21, 2005 Debian Security Advisory DSA 763-1, July 21, 2005 Ubuntu Security Notice, USN-151-1, July 21, 2005 OpenBSD, Release Errata 3.7, July 21, 2005 Mandriva Security Advisory, MDKSA-2005:124, July 22, 2005 Secunia, Advisory: SA16195, July 25, 2005 Slackware Security Advisory, SSA:2005- FreeBSD Security Advisory, SA-05:18, July 27, 2005 SUSE Security Announce- Gentoo Linux Security Advisory, GLSA 200507-28, July 30, 2005 Gentoo Linux Security Advisory, GLSA 200508-01, August 1, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0040, August 5, 2005 Conectiva Linux Announcement, CLSA-2005:997, August 11, 2005 Apple Security Update, APPLE-SA-2005-08-15, August 15, 2005 Turbolinux Security Advisory , TLSA-2005-83, August 18, 2005 SCO Security Advisory, SCOSA-2005.33, August 19, 2005 Debian Security Advisory, DSA 797-1, September 1, 2005 Security Focus, Bugtraq ID: 14340, September 12, 2005 |
dhcpcd 1.3.22 | A vulnerability has been reported in dhcpcd that could let a remote user perform a Denial of Service. Debian: Mandriva: Gentoo: Conectiva: RedHat: Debian:
href=" http://security.debian.org/pool/updates/main/q/qpopper/"> IPCop: Slackware: Currently we are not aware of any exploits for this vulnerability. | dhcpcd Denial of Service | Low | Secunia, Advisory: SA15982, July 11, 2005 Debian Security Advisory, DSA 750-1, July 11, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:117, July 13, 2005 Gentoo Linux Security Advisory, GLSA 200507-16, July 15, 2005 Conectiva, CLSA-2005:983, July 25, 2005 RedHat Security Advisory, RHSA-2005:603-07, July 27, 2005 Debian Security Advisor, DSA 773-1, August 11, 2005 Security Focus, Bugtraq ID: 14206 , August 26, 2005 Slackware Security Advisory, SSA:2005-255-01, September 12, 2005 |
Gentoo Linux; | Multiple vulnerabilities exist due to integer overflows, memory access errors, input validation errors, and logic errors, which could let a remote malicious user execute arbitrary code, obtain sensitive information, or cause a Denial of Service. Fedora: Gentoo: SUSE: X.org: Fedora: RedHat: Mandrakesoft: http://www.mandrakesoft. Debian: SGI: TurboLinux: Avaya: http://support.avaya.com/| Gentoo: http://security.gentoo.org/ Ubuntu: FedoraLegacy: Ubuntu: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors LibXPM Multiple Vulnerabilities | High
| X.Org Foundation Security Advisory, November 17, 2004 Fedora Update Notifications, SUSE Security Announcement, SUSE-SA:2004:041, November 17, 2004 Gentoo Linux Security Advisory, GLSA 200411-28, November 19, 2004 Fedora Security Update Notifications RedHat Security Advisory, RHSA-2004:537-17, December 2, 2004 Mandrakesoft: MDKSA-2004:137: libxpm4; MDKSA-2004:138: XFree86, November 22, 2004 Debian Security Advisory Turbolinux Security Announcement, January 20, 2005 Avaya Security Advisories, ASA-2005-023 & 025, January 25, 2005 Gentoo Linux Security Advisories, GLSA 200502-06 & 07, February 7, 2005 Ubuntu Security Notice, USN-83-1 February 16, 2005 Fedora Legacy Update Advisory, FLSA:2314, March 2, 2005 Ubuntu Security Notice, USN-83-2, September 12, 2005 |
IPsec-Tools IPsec-Tools 0.5; KAME Racoon prior to 20050307 | A remote Denial of Service vulnerability has been reported when parsing ISAKMP headers. Upgrades available at: Fedora: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-232.html"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-30.xml"> ALTLinux: SUSE: Ubuntu: SCO: Currently we are not aware of any exploits for this vulnerability. | Low | Fedora Update Notifications, RedHat Security Advisory, Gentoo Linux ALTLinux Security Advisory, SUSE Security Announcement, SUSE-SA:2005:020, March 31, 2005 Ubuntu Security Notice, USN-107-1, April 05, 2005 SCO Security Advisory, SCOSA-2005.37, September 9, 2005 | |
Linux kernel 2.6 prior to 2.6.12.1 | A Denial of Service vulnerability has been reported in the subthread exec signal processing that has a timer pending. Updates available at: Fedora: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel Subthread Exec Denial of Service | Low | Security Tracker Alert ID: 1014274, June 23, 2005 Ubuntu Security Notice, USN-178-1, September 09, 2005 |
Linux kernel 2.6.8, 2.6.10 | A vulnerability has been reported in the EXT2/EXT3 file systems, which could let a remote malicious user bypass access controls.
Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel EXT2/EXT3 File Access Bypass | Medium | Security Focus, Bugtraq ID: 14792, September 9, 2005 Ubuntu Security Notice, USN-178-1, September 09, 2005 |
Linux kernel 2.6.8, 2.6.10 | A remote Denial of Service vulnerability has been reported in the 'ipt_recent' module when specially crafted packets are sent. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel 'Ipt_recent' Remote Denial of Service | Low | Security Focus, Bugtraq ID: 14791, September 9, 2005 Ubuntu Security Notice, USN-178-1, September 09, 2005 |
Linux kernel 2.6.8-2.6.10, 2.4.21 | Several vulnerabilities have been reported: a buffer overflow vulnerability was reported in 'msg_control' when copying 32 bit contents, which could let a malicious user obtain root privileges and execute arbitrary code; and a vulnerability was reported in the 'raw_sendmsg()' function, which could let a malicious user obtain sensitive information or cause a Denial of Service. Ubuntu: Currently we are not aware of any exploits for these vulnerabilities. | Linux Kernel Buffer Overflow, Information Disclosure, & Denial of Service | High | Secunia Advisory: SA16747, September 9, 2005 Ubuntu Security Notice, USN-178-1, September 09, 2005 |
RedHat Fedora Core3, Enterprise Linux ES 4, ES 3, AS 4, AS 3; FreeRADIUS 1.0.4 | Multiple vulnerabilities have been reported: a buffer overflow vulnerability was reported in 'exec.c' due to a boundary error when handling 'radius_exec_program()' function environment variables, which could let a remote malicious user cause a Denial of Service; a vulnerability was reported in 'token.c' and 'sql_unixodbc.c' due to off-by-one errors, which could let a remote malicious user cause a Denial of Service; a vulnerability was reported in 'xlat.c' due to a boundary error when handling server replies; and a vulnerability was reported in 'rlm_ldap.c' due to an error when escaping ldap data, which could let a remote malicious user obtain sensitive information. Upgrades available at: Currently we are not aware of any exploits for these vulnerabilities. | FreeRADIUS Multiple Remote Vulnerabilities | Medium | Secunia Advisory: SA16712, September 8, 2005 |
SuSE Linux Professional 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, 9.0, x86_64, Linux Personal 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, 9.0, x86_64; KAudioCreator | A vulnerability has been reported in the CDDB entry title due to insufficient sanitization of user-supplied input, which could let a remote malicious user overwrite arbitrary files.
SUSE: There is no exploit code required. | KAudioCreator CDDB Arbitrary File Overwrite | Medium | SUSE Security Summary Report, SUSE-SR:2005:020, September 12, 2005 |
Ubuntu Linux 5.0 4 powerpc, i386, amd64, | Several vulnerabilities have been reported: a buffer overflow vulnerability was reported due to the way away messages are handled, which could let a remote malicious user execute arbitrary code; and a remote Denial of Service vulnerability has been reported due to an error when handling file transfers. Updates available at: http://gaim.sourceforge. RedHat: http://rhn.redhat.com/ Ubuntu: Gentoo: SGI: Mandriva: Fedora: SUSE: Slackware: Conectiva: A Proof of Concept exploit has been published for the buffer overflow vulnerability. | Gaim AIM/ICQ Protocols Buffer Overflow & Denial of Service | High | RedHat Security Advisories, RHSA-2005:589-16 & RHSA-2005:627-11, August 9, 2005 Ubuntu Security Notice, USN-168-1, August 12, 2005 Gentoo Linux Security Advisory, GLSA 200508-06, August 15, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:139, August 16, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 Slackware Security Advisory, SSA:2005-242-03, August 31, 2005 Slackware Security Advisory, SSA:2005-251-03, September 9, 2005 SUSE Security Summary Report, SUSE-SR:2005:020, September 12, 2005 Conectiva Linux Announcement, CLSA-2005:1006, |
Glyph and Cog Xpdf 3.0, pl2 & pl3; Ubuntu Linux 5.0 4 powerpc, i386, amd64; | A remote Denial of Service vulnerability has been reported when verifying malformed 'loca' table in PDF files. RedHat: http://rhn.redhat.com/ http://rhn.redhat.com/ Ubuntu: KDE: Mandriva: SGI: Gentoo: Fedora: Debian: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> TurboLinux: Conectiva: Currently we are not aware of any exploits for this vulnerability. | Low | RedHat Security Advisories, RHSA-2005:670-05 & RHSA-2005:671-03, & RHSA-2005:708-05, August 9, 2005 Ubuntu Security Notice, USN-163-1, August 09, 2005 KDE Security Advisory, 20050809-1, August 9, 2005 Mandriva Linux Security Update Advisories, MDKSA-2005:134, 135, 136 & 138, August 11, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Gentoo Linux Security Advisory GLSA, 200508-08, August 16, 2005 Fedora Update Notifications, Debian Security Advisory, DSA 780-1, August 22, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0043, September 2, 2005 Turbolinux Security Advisory, TLSA-2005-88, September 5, 2005 Conectiva Linux Announce-ment, CLSA-2005:1010, September 13, 2005 | |
Ubuntu Linux 5.0 4 powerpc, i386, amd64, 4.1 ppc, ia64, ia32;
| Multiple format string vulnerabilities have been reported: a vulnerability was reported when vCard information is attached to an email message, which could let a remote malicious user execute arbitrary code; a vulnerability was reported when specially crafted contact data that has been retrieved from an LDAP server is displayed, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported when specially crafted task list data that has been retrieved from remote servers and the data has been saved under the 'Calendars' tab is displayed, which could let a remote malicious user execute arbitrary code. Updates available at: Ubuntu: Mandriva: SUSE: Gentoo: RedHat: SGI: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | High | Secunia Advisory: SA16394, August 11, 2005 Ubuntu Security Notice, USN-166-1, August 11, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:141, August 18, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 Gentoo Linux Security Advisory, GLSA 200508-12, August 23, 200 RedHat Security Advisory, RHSA-2005:267-10, August 29, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Conectiva Linux Announce-ment, CLSA-2005:1004, September 13, 2005 | |
Ubuntu Linux 5.0 4, i386, amd64, 4.1 ppc, ia64, ia32; | A Denial of Service vulnerability has been reported in the '/proc/scsi/sg/devices' file due to a memory leak. Ubuntu: A Proof of Concept exploit has been published. | Linux Kernel SCSI ProcFS Denial of Service | Low | Security Focus, Bugtraq ID: 14790, September 9, 2005 Ubuntu Security Notice, USN-178-1, September 09, 2005 |
util-linux 2.8-2.13; | A vulnerability has been because mounted filesystem options are improperly cleared due to a design flaw, which could let a remote malicious user obtain elevated privileges. Updates available at: Slackware: There is no exploit code required. | Util-Linux UMount Remounting Filesystem Elevated Privileges | Medium | Security Focus, Bugtraq ID: 14816, September 12, 2005 Slackware Security Advisory, SSA:2005-255-02, September 13, 2005 |
XFree86 X11R6 4.3 .0, | A buffer overflow vulnerability has been reported in the pixmap processing code, which could let a malicious user execute arbitrary code and possibly obtain superuser privileges. Gentoo: RedHat: http://rhn.redhat.com/ Ubuntu: Mandriva: Currently we are not aware of any exploits for this vulnerability. | XFree86 Pixmap Allocation Buffer Overflow | High | Gentoo Linux Security Advisory, GLSA 200509-07, September 12, 2005 RedHat Security Advisory, RHSA-2005:329-12 & RHSA-2005:396-9, September 12 & 13, 2005 Ubuntu Security Notice, USN-182-1, September 12, 2005 Mandriva Security Advisory, MDKSA-2005:164, September 13, 2005 |
netpbm 10.0 | A vulnerability has been reported in netpbm ('-dSAFER') that could let malicious users execute arbitrary postscript code. Trustix: Gentoo: Mandriva: Ubuntu: Fedora: SUSE: RedHat: SGI: There is no exploit code required. | netpbm Arbitrary Code Execution | High | Secunia Advisory: SA16184, July 25, 2005 Trustix Secure Linux Security Advisory, #2005-0038, July 29, 2005 Gentoo Linux Security Advisory, GLSA 200508-04, August 5, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:133, August 10, 2005 Ubuntu Security Notice, USN-164-1, August 11, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 RedHat Security Advisory, RHSA-2005:743-08, August 22, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 |
Open Webmail 2.41 | A Cross-Site Scripting vulnerability has been reported in 'openwebmail-main.pl' due to insufficient sanitization of the 'sessionid' parameter, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required. | Open WebMail Cross-Site Scripting | Medium | Security Focus, Bugtraq ID: 14771, September 7, 2005 |
PCRE 6.1, 6.0, 5.0 | A vulnerability has been reported in 'pcre_compile.c' due to an integer overflow, which could let a remote/local malicious user potentially execute arbitrary code. Updates available at: Ubuntu: Ubuntu: Fedora: Gentoo: Mandriva: SUSE: Slackware: Ubuntu: Debian: SUSE: Gentoo: Conectiva: Currently we are not aware of any exploits for this vulnerability. | PCRE Regular Expression Heap Overflow | High | Secunia Advisory: SA16502, August 22, 2005 Ubuntu Security Notice, USN-173-1, August 23, 2005 Ubuntu Security Notices, USN-173-1 & 173-2, August 24, 2005 Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200508-17, August 25, 2005 Mandriva Linux Security Update Advisories, MDKSA-2005:151-155, August 25, 26, & 29, 2005 SUSE Security Announcements, SUSE-SA:2005:048 & 049, August 30, 2005 Slackware Security Advisories, SSA:2005-242-01 & 242-02 , August 31, 2005 Ubuntu Security Notices, USN-173-3, 173-4 August 30 & 31, 2005 Debian Security Advisory, DSA 800-1, September 2, 2005 SUSE Security Announcement, SUSE-SA:2005:051, September 5, 2005 Slackware Security Advisory, SSA:2005-251-04, September 9, 2005 Gentoo Linux Security Advisory, GLSA 200509-08, September 12, 2005 Conectiva Linux Announce-ment, CLSA-2005:1009, September 13, 2005 |
Snort 2.4 .0, 2.3.0-2.3.3, 2.2, 2.1.3, 2.1.1 RC1, 2.1 .0, 2.0.6, 2.0.4, 2.0 rc2, 2.0 .0rc1, 2.0 | A remote Denial of Service vulnerability has been reported in 'log.c' in the 'PrintTcpOptions()' function due to a failure to handle malicious TCP packets. No workaround or patch available at time of publishing. An exploit script has been published. | Snort 'PrintTcpOptions' Remote Denial of Service | Low | Snort Advisory, September 12, 2005 |
Squid Web Proxy Cache 2.5 & prior | A remote Denial of Service vulnerability has been reported in the 'storeBuffer()' function when handling aborted requests. Patches available at: Gentoo: OpenPKG: Mandriva: Debian: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Squid Aborted Requests Remote Denial of Service | Low | Security Tracker Alert ID: 1014864, September 7, 2005 Gentoo Linux Security Advisory GLSA 200509-06, September 7, 2005 OpenPKG Security Advisory, OpenPKG-SA-2005.021, September 10, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:162, September 12, 2004 Debian Security Advisory, DSA 809-1, September 13, 2005 Ubuntu Security Notice, USN-183-1, September 13, 2005 |
Squid Web Proxy Cache 2.5 .STABLE1-STABLE 10, 2.4 .STABLE6 & 7, STABLE 2, 2.4, 2.3 STABLE 4&5, 2.1 Patch 2, 2.0 Patch 2 | A remote Denial of Service vulnerability has been reported in '/squid/src/ssl.c' when a malicious user triggers a segmentation fault in the 'sslConnectTimeout()' function. Patches available at: Trustix: OpenPKG: Mandriva: Ubuntu: Debian: There is no exploit code required. | Squid 'sslConnect | Low | Security Tracker Alert ID: 1014846, September 2, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0047, September 9, 2005 OpenPKG Security Advisory, OpenPKG-SA-2005.021, September 10, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:162, September 12, 2005 Ubuntu Security Notice, USN-183-1, September 13, 2005 Debian Security Advisory, DSA 809-1, September 13, 2005 |
TMSNC 0.2.4 | A format string vulnerability has been reported in 'ur.c' when the 'wprintw()' function is used, which could let a remote malicious user execute arbitrary code. Upgrade available at: Currently we are not aware of any exploits for this vulnerability. | TMSNC Format String | High | Security Focus Bugtraq ID: 14810, September 12, 2005 |
Vim V6.3.082 | A vulnerability has been reported in Vim that could let remote malicious users execute arbitrary code. Vendor patch available: Ubuntu: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Fedora: Conectiva: Mandriva: RedHat: Avaya: SGI: There is no exploit code required; however, Proof of Concept exploits have been published. | Vim Arbitrary Code Execution | High | Security Focus, 14374, July 25, 2005 Ubuntu Security Notice, USN-154-1, July 26, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0038, July 29, 2005 Fedora Update Notifications, Conectiva Security Advisory, CLSA-2005:995, Mandriva Linux Security Update Advisory, MDKSA-2005:148, August 22, 2005 RedHat Security, Advisory, RHSA-2005:745-10, August 22, 2005 Avaya Security Advisory, ASA-2005-189-, August 31, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 |
Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Apache | A vulnerability has been reported in Apache which can be exploited by remote malicious users to smuggle http requests. Conectiva: Fedora: Mandriva: http://security.ubuntu.com/ TurboLinux: SGI: SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Debian: Ubuntu: SGI: Currently we are not aware of any exploits for this vulnerability. | Apache HTTP Request Smuggling Vulnerability CAN-2005-1268 | Medium | Secunia, Advisory: SA14530, July 26, 2005 Conectiva, CLSA-2005:982, July 25, 2005 Fedora Update Notification Mandriva Linux Security Update Advisory, MDKSA-2005:129, August 3, 2005 Ubuntu Security Notice, USN-160-1, August 04, 2005 Turbolinux Security Advisory, TLSA-2005-81, August 9, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 SUSE Security Announcement, SUSE-SA:2005:046, August 16, 2005 Debian Security Advisory DSA 803-1, September 8, 2005 Ubuntu Security Notice, USN-160-2, September 07, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 |
ATutor 1.5.1 | Several vulnerabilities have been reported: an SQL injection vulnerability was reported in 'Password_Reminder.php' due to insufficient sanitation before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a vulnerability was reported due to insufficient access validation before granting access to privileged information, which could let a remote malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | ATutor 'Password_ Reminder.PHP' SQL Injection & Information Disclosure | Medium | Security Focus, Bugtraq IDs: 14831 & 14832, September 14, 2005 |
AzDGDatingLite 2.1.3 | A Directory Traversal vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user include arbitrary files. No workaround or patch available at time of publishing. There is no exploit code required; however, an exploit script has been published. | Azerbaijan Development Group AZDGDatingLite Directory Traversal | Medium | Security Focus, Bugtraq ID: 14819, September 13, 2005 |
aMember Pro 2.3.4 | A vulnerability has been reported due to insufficient sanitization of various scripts, which could let a remote malicious user execute arbitrary server-side script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | AMember Remote File Include | Medium | Security Focus, Bugtraq ID: 14777, September 8, 2005 |
SecurePlatform NGX R60 Build 244 | A vulnerability has been reported due to improper implementation of expected firewall rules, which could let a remote malicious user bypass firewall rules.
No workaround or patch available at time of publishing. There is no exploit code required. | Check Point SecurePlatform NGX Firewall Rules Bypass | Medium | Security Focus, Bugtraq ID: 14781, September r8, 2005 |
CSS11501 Content Services Switch, CSS11500 Content Services Switch | A vulnerability has been reported when SSL encryption is enabled and client authentication using SSL certificates is enabled due to a failure to properly renegotiate the SSL session, which could let a remote malicious user bypass security restrictions. Patch information available at: Currently we are not aware of any exploits for this vulnerability. | Cisco CSS 11500 Series SSL Authentication Bypass | Medium | Cisco Security Notice: Document ID: 66280, September 8, 2005 |
class-1 forum 0.24.4 | An SQL injection vulnerability has been reported which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Class-1 Forum SQL Injection | Medium | Security Focus, Bugtraq ID: 14774, September 8, 2005 |
PhpTagCool 1.0.3
| An SQL injection vulnerability was reported in the 'X-Forwarded-For' HTTP header due to insufficient validation of user-supplied input, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, an exploit script has been published. | PhpTagCool SQL Injection | Medium | Security Tracker Alert ID: 1014878, September 9, 2005 |
Distributed Checksum ClearingHouse DCC 1.3-1.3.15 | A remote Denial of Service vulnerability has been reported in 'dccifd' when an email message is received that doesn't contain a message body. Upgrades available at: There is no exploit code required. | Distributed Checksum ClearingHouse DCCIFD Denial of Service | Low | Security Focus Bugtraq ID: 14769, September 7, 2005 |
Ethereal | Multiple dissector and zlib vulnerabilities have been reported in Ethereal that could let remote malicious users cause a Denial of Service or execute arbitrary code. Upgrade to version 0.10.12: Fedora: Mandriva: RedHat: SUSE: Avaya: SGI: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | Ethereal Denial of Service or Arbitrary Code Execution CAN-2005-2361 | High | Secunia, Advisory: SA16225, July 27, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:131, August 4, 2005 RedHat Security Advisory, RHSA-2005:687-03, August 10, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 Avaya Security Advisory, ASA-2005-185, August 30, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Conectiva Linux Announce-ment, CLSA-2005:1003, September 13, 2005
|
Sawmill 7.1.13 | A Cross-Site Scripting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. Updates available at: There is no exploit code required. | Sawmill Cross-Site Scripting | Medium | Secunia Advisory: SA16744, September 9, 2005 |
OpenView Network Node Manager 7.50 Solaris, 7.50, 6.41 Solaris, 6.41 | A vulnerability has been reported in the 'node' URI parameter of the 'OvCgi/connectedNodes.ovpl' script, which could let a remote malicious user execute arbitrary code. Revision 3: Workaround available at: There is no exploit code required; however, a Proof of Concept exploit script has been published. | HP OpenView Network Node Manager Remote Arbitrary Code Execution | High | Portcullis Security Advisory, 05-014, August 25, 2005 HP Security Advisory, HPSBMA01224, August 26, 2005 HP Security Advisory, HPSBMA01224 REVISION: 3, September 13, 2005 |
OS/400 V5R1M0 | Several vulnerabilities have been reported: a vulnerability was reported because the local CA (Certificate Authority) certificates do not contain the X509 basic constraints extension, which could lead to incorrect verification of certification chains; a vulnerability was reported due to an error in the certificate store because an old certificate associated with an application identifier can be returned even when it has been renewed; and a vulnerability was reported in ASN.1 parsing due to an unspecified error. PTFs are reportedly available, which fix these security issues. Currently we are not aware of any exploits for these vulnerabilities. | IBM OS/400 Multiple OSP-CERT Vulnerabilities | Medium | Secunia Advisory: SA16751, September 9, 2005 |
OS/400 V5R1M0 | A remote Denial of Service vulnerability has been reported due to an error when handling certain malformed SNMP messages. A PTF is reportedly available, which fixes the vulnerability. There is no exploit code required. | IBM OS/400 Malformed SNMP Requests Remote Denial of Service | Low | Secunia Advisory: SA16735, September 9, 2005 |
Ingate SIParator 4.2.1-4.2.3 , Firewall 4.2.1-4.2.3 | A Cross-Site Scripting vulnerability has been reported in the administrative interface due to insufficient sanitization, which could let a remote malicious user execute arbitrary HTML and script code. The vendor has reported that this vulnerability will be fixed in an upcoming release. There is no exploit code required. | Ingate Administrative Interface Cross-Site Scripting | Medium | Secunia Advisory: SA16776, September 12, 2005 |
KDE 3.4, | A vulnerability has been reported in KDE Kate and KWrite because backup files are created with default permissions even if the original file had more restrictive permissions set, which could let a local/remote malicious user obtain sensitive information.
Patches available at: Fedora: Mandriva: RedHat: Conectiva: Debian: There is no exploit code required. | KDE Kate, KWrite Local Backup File Information Disclosure | Medium | Security Tracker Alert ID: 1014512, July 18, 2005 Fedora Update Notification, Mandriva Linux Security Update Advisory, MDKSA-2005:122, July 20, 2005 RedHat Security Advisory, RHSA-2005:612-07, July 27, 2005 Conectiva Linux Announcement, CLSA-2005:988, August 4, 2005 Debian Security Advisory, DSA 804-1, September 8, 2005 |
WRT54G v4.0 4.20.6 (Firmware), v4.0 4.0.7 (Firmware), v3.0 3.3.6 (Firmware), v3.0 3.1.3 (Firmware), v2.0 2.4.4 (Firmware) | Multiple vulnerabilities have been reported: a vulnerability was reported in the 'POST' method handlers when handling a negative 'Content-Length' value, which could let a remote malicious user cause a Denial of Service; a vulnerability was reported in 'upgrade.cgi' due to a design error, which could let a remote unauthenticated malicious user upload arbitrary firmware; a vulnerability was reported in 'restore.cgi' due to a design error, which could let a remote unauthenticated malicious user upload arbitrary configuration settings; a vulnerability was reported in 'apply.cgi' due to a boundary error when a POST request is submitted that contains a content length longer than 10000 bytes, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code with ROOT privileges; and a vulnerability was reported in 'ezconfig.asp' due to an authentication error, which could let a remote unauthenticated malicious user upload configuration settings to a vulnerable device if the fixed 256-byte XOR key used to encrypt the settings is known.
No workaround or patch available at time of publishing. There is no exploit code required for most of these vulnerabilities. | Linksys WRT54G Wireless Router Multiple Remote Vulnerabilities CAN-2005-2912 | High | iDEFENSE Security Advisory, September 13, 2005 |
Mimicboard2 086 | Multiple HTML injection vulnerabilities have been reported due to insufficient sanitization of user-supplied input before using in dynamically generated content, which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability was reported in 'mimic2.dat' due to insufficient user authentication, which could let a remote malicious user obtain unauthorized access. No workaround or patch available at time of publishing. There is no exploit code required. | Mimicboard2 Multiple HTML Injection & Unauthorized Access | Medium | Exploit Labs Advisory, EXPL-A-2005-013, September 8, 2005 |
Miva Merchant 5.0 | A Cross-Site Scripting vulnerability has been reported in 'Merchant.MVC' due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. Update available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | MIVA Merchant 5 Cross-Site Scripting | Medium | Security Focus, Bugtraq ID: 14828, September 14, 2005 |
Firefox 0.x, 1.x | Multiple vulnerabilities have been reported: a vulnerability was reported due to an error because untrusted events generated by web content are delivered to the browser user interface; a vulnerability was reported because scripts in XBL controls can be executed even when JavaScript has been disabled; a vulnerability was reported because remote malicious users can execute arbitrary code by tricking the user into using the 'Set As Wallpaper' context menu on an image URL that is really a javascript; a vulnerability was reported in the 'InstallTrigger.install()' function due to an error in the callback function, which could let a remote malicious user execute arbitrary code; a vulnerability was reported due to an error when handling 'data:' URL that originates from the sidebar, which could let a remote malicious user execute arbitrary code; an input validation vulnerability was reported in the 'InstallVersion.compareTo()' function when handling unexpected JavaScript objects, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because it is possible for remote malicious user to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL; a vulnerability was reported due to an error when handling DOM node names with different namespaces, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported due to insecure cloning of base objects, which could let a remote malicious user execute arbitrary code.
Updates available at: Gentoo: Mandriva: Fedora: RedHat: Ubuntu: http://security.ubuntu.com/ http://security.ubuntu.com/ SUSE: Debian: http://security.debian. SGI: Gentoo: Slackware: Debian: Debian: Exploits have been published. | Firefox Multiple Vulnerabilities CAN-2005-2260 | High | Secunia Advisory: SA16043, July 13, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:120, July 13, 2005 Gentoo Linux Security Advisory, GLSA 200507-14, July 15, 2005 Gentoo Linux Security Advisory, GLSA 200507-17, July 18, 2005 Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:586-11, July 21, 2005 Slackware Security Advisory, SSA:2005-203-01, July 22, 2005 Ubuntu Security Notices, USN-155-1 & 155-2 July 26 & 28, 2005 Ubuntu Security Notices, USN-157-1 & 157-2 August 1& 2, 2005 SUSE Security Announcement, SUSE-SA:2005:045, August 11, 2005 Debian Security Advisory, DSA 775-1, August 15, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Debian Security Advisory, DSA 777-1, August 17, 2005 Debian Security Advisory, DSA 779-1, August 20, 2005 Debian Security Advisory, DSA 781-1, August 23, 2005 Gentoo Linux Security Advisory, GLSA 200507-24, August 26, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:127-1, August 26, 2005 Slackware Security Advisory, SSA:2005-085-01, August 28, 2005 Debian Security Advisory, DSA 779-2, September 1, 2005 Debian Security Advisory, DSA 810-1, September 13, 2005 |
Netscape 8.0.3.3, 7.2;
| A buffer overflow vulnerability has been reported due to an error when handling IDN URLs that contain the 0xAD character in the domain name, which could let a remote malicious user execute arbitrary code. Patches available at: RedHat: http://rhn.redhat.com/ Fedora: Ubuntu: A Proof of Concept exploit script has been published. | Mozilla/Netscape/ | High | Security Focus, Bugtraq ID: 14784, September 10, 2005 RedHat Security Advisories, 769-8 & RHSA-2005:768-6, September 9,2005 Fedora Update Notifications, Ubuntu Security Notice, USN-181-1, September 12, 2005 |
Gentoo Linux; | A remote Denial of Service vulnerability has been reported in the HTTP 'Range' header due to an error in the byte-range filter. Patches available at: Gentoo: RedHat: Ubuntu: Fedora: SGI: Debian: Trustix: Mandriva: SUSE: There is no exploit code required. | Apache Remote Denial of Service | Low | Secunia Advisory: SA16559, August 25, 2005 Security Advisory, GLSA 200508-15, August 25, 2005 RedHat Security Advisory, RHSA-2005:608-7, September 6, 2005 Ubuntu Security Notice, USN-177-1, September 07, 2005 Fedora Update Notifications, Mandriva Linux Security Update Advisory, MDKSA-2005:161, September 8, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Debian Security Advisory, DSA 805-1, September 8, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0047, September 9, 2005 SUSE Security Summary Report, SUSE-SR:2005:020, September 12, 2005 |
PHPXMLRPC 1.1.1; | A vulnerability has been reported in XML-RPC due to insufficient sanitization of certain XML tags that are nested in parsed documents being used in an 'eval()' call, which could let a remote malicious user execute arbitrary PHP code.
PHPXMLRPC : Pear: Drupal: eGroupWare: MailWatch: Nucleus: RedHat: Ubuntu: Mandriva: Gentoo: http://security.gentoo.org/ http://security.gentoo.org/ Fedora: Debian: SUSE: Gentoo: http://security.gentoo.org/ Slackware: Debian: SGI: Slackware: There is no exploit code required. | PHPXMLRPC and PEAR XML_RPC Remote Arbitrary Code Execution | High | Security Focus, Bugtraq ID 14560, August 15, 2995 Security Focus, Bugtraq ID 14560, August 18, 2995 RedHat Security Advisory, RHSA-2005:748-05, August 19, 2005 Ubuntu Security Notice, USN-171-1, August 20, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:146, August 22, 2005 Gentoo Linux Security Advisory, GLSA 200508-13 & 14, & 200508-18, Fedora Update Notifications, Debian Security Advisory, DSA 789-1, August 29, 2005 SUSE Security Announcement, SUSE-SA:2005:049, August 30, 2005 Gentoo Linux Security Advisory, GLSA GLSA 200508-20& 200508-21, August 30 & 31, 2005 Slackware Security Advisory, SSA:2005-242-02, August 31, 2005 Debian Security Advisory, DSA 798-1, September 2, 2005 SUSE Security Announcement, SUSE-SA:2005:051, September 5, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Slackware Security Advisories, SSA:2005-251-03 & 251-04, September 9,2005 |
MyBulletinBoard 1.0 PR2 | SQL injection vulnerabilities have been reported in 'misc.php' due to insufficient sanitization of the 'fid' parameter, in 'newreply.php' due to insufficient sanitization of the 'icon' parameter, and in 'ratethread.php' due to insufficient sanitization of the 'rating' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | MyBulletinBoard SQL Injection Vulnerabilities | Medium | Secunia Advisory: SA16738, September 12, 2005 |
MySQL 5.0 .0-0-5.0.4, 4.1 .0-0-4.1.5, 4.0.24, 4.0.21, 4.0.20 , 4.0.18, 4.0 .0-4.0.15 | A buffer overflow vulnerability has been reported due to insufficient bounds checking of data that is supplied as an argument in a user-defined function, which could let a remote malicious user execute arbitrary code. This issue is reportedly addressed in MySQL versions 4.0.25, 4.1.13, and 5.0.7-beta available at: Ubuntu: Mandriva: Currently we are not aware of any exploits for this vulnerability. | MySQL User-Defined Function Buffer Overflow | High | Security Focus 14509 , August 8, 2005 Ubuntu Security Notice, USN-180-1, September 12, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:163, September 13, 2005 |
OpenSSH 4.1, 4.0, p1 | Several vulnerabilities have been reported: a vulnerability was reported due to an error when handling dynamic port forwarding when no listen address is specified, which could let a remote malicious user cause "GatewayPorts" to be incorrectly activated; and a vulnerability was reported due to an error when handling GSSAPI credential delegation, which could let a remote malicious user be delegated with GSSAPI credentials. Upgrades available at: Fedora: Trustix: Slackware: Fedora: There is no exploit code required. | OpenSSH DynamicForward Inadvertent GatewayPorts Activation & GSSAPI Credentials | Medium | Secunia Advisory: SA16686, September 2, 2005 Fedora Update Notification, Trustix Secure Linux Security Advisory, TSLSA-2005-0047, September 9, 2005 Slackware Security Advisory, SSA:2005-251-03, September 9, 2005 Fedora Update Notification, |
OpenVPN 2.0 , 1.6 .0, 1.5 .0, 1.4.0-1.4.3, 1.3.2 , 1.2.1 | Multiple remote Denial of Service vulnerabilities have been reported: a Denial of Service vulnerability was reported when flushing the OpenSSL error due to a failed client certificate authentication; a Denial of Service vulnerability was reported when flushing the OpenSSL error when a received packet fails to decrypt; a Denial of Service vulnerability was reported when configured in the 'dev tap' ethernet bridging mode; and a Denial of Service vulnerability was reported when two or more clients connect to the server at the same time using the same client certificate.
Upgrades available at: Mandriva: SUSE: There is no exploit code required. | OpenVPN Multiple Remote Denials of Service | Low | Secunia Advisory: SA16463, August 19, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:145, August 22, 2005 SUSE Security Summary Report, SUSE-SR:2005:020, September 12, 2005 |
phpCommunity | Several vulnerabilities have been reported: an SQL injection vulnerability was reported in 'webadmin/login.php' due to insufficient sanitization of the 'Username' parameter and in 'week.php' due to insufficient sanitization of the 'LocationID' parameter, which could let a remote malicious user execute arbitrary SQL code; a Cross-Site Scripting vulnerability was reported due to insufficient sanitization of input passed to certain fields when adding an event, which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability was reported due to insufficient sanitization of the 'LocationID' and 'font' parameters in various scripts and in 'event.php' due to insufficient sanitization of the 'CeTi,' 'Contact,' 'Description,' and 'ShowAddress' parameters, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPCommunity | Medium | Secunia Advisory: SA16721, September 7, 2005 |
phpldapadmin 0.9.6 - 0.9.7/alpha5 | Multiple vulnerabilities have been reported: a Cross-Site Scripting vulnerability was reported due to insufficient user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code; a Directory Traversal vulnerability was reported which could let a remote malicious user obtain sensitive information; and a file include vulnerability was reported, which could let a remote malicious user execute arbitrary PHP script code. No workaround or patch available at time of publishing. An exploit script has been published. | phpLDAPadmin Multiple Vulnerabilities | Medium | Security Focus, Bugtraq ID: 14695, August 30, 2005 Security Focus, Bugtraq ID: 14695, September 7, 2005 |
PHPNuke 7.8 | Multiple SQL injection vulnerabilities have been reported in the 'modules.php' due to insufficient sanitization of the 'name,' 'sid,' and 'pid' parameters, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPNuke Multiple SQL Injection | Medium | NewAngels Advisory #7, September 12, 2005 |
PunBB 1.2.1-1.2.6, 1.1-1.1.5, 1.0.1, 1.0, RC1 & RC2, beta1 - beta3, alpha | Multiple vulnerabilities have been reported: an SQL injection vulnerability was reported in the administration interface due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; a vulnerability was reported due to insufficient sanitization of the BBcode 'url' tag , which could let a remote malicious user inject arbitrary script code; and an SQL injection vulnerability was reported due to insufficient sanitization of certain unspecified input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. Upgrades available at: There is no exploit code required. | PunBB Multiple Vulnerabilities | Medium | Secunia Advisory: SA16775, September 12, 2005 |
rdiff-backup 1.0 | A vulnerability has been reported when using the '-restrict,' '--restrict-read-only,' and '--restrict-update-only' options due to insufficient restriction of directory access, which could let a remote malicious user obtain sensitive information. Upgrade available at: There is no exploit code required. | Rdiff-backup Directory Access Insufficient Restrictions | Medium | Security Focus, Bugtraq ID: 14804, September 12, 2005 |
Mail-it Now! Upload2Server 1.5
| A vulnerability has been reported in the attachment posting function because a remote malicious user can upload a file that contains arbitrary PHP code to the 'upload' directory. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Mail-it Now! Upload2Server Arbitrary File Upload | High | Security Tracker Alert ID: 1014884, September 12, 2005 |
SMC7904WBRA | A remote Denial of Service vulnerability has been reported due to a failure to handle anomalous network traffic. No workaround or patch available at time of publishing. There is no exploit code required. | SMC SMC7904WBRA Wireless Router Remote Denial of Service | Low | Security Focus, Bugtraq ID: 14809, September 12, 2005 |
Spymac Web OS 4.0 | A Cross-Site Scripting vulnerability has been reported in the 'index.php' script due to insufficient filtering of HTML code in the 'category' parameter, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Spymac Web OS Cross-Site Scripting | Medium | Security Tracker Alert ID: 1014883, September 12,2005 |
WEB//NEWS 1.4 | SQL injection vulnerabilities have been reported in 'modules/startup.php' due to insufficient sanitization of the 'wn_userpw' parameter, in 'include_this/news.php' due to insufficient sanitization of the 'cat,' 'id,' and 'stof' parameters, and in 'print.php' due to insufficient sanitization of the 'id' parameter, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Stylemotion WEB//NEWS Multiple SQL Injection | Medium | NewAngels Advisory #5, September 7, 2005 |
Subscribe Me Pro 2.44 .09P | A Directory Traversal vulnerability has been reported in 's.pl' due to insufficient sanitization, which could let a remote malicious user obtain sensitive information. Upgrade available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Subscribe Me Pro S.PL Remote Directory Traversal | Medium | Security Focus, Bugtraq ID: 14817, September 13, 2005 |
Sun Java System Application Server Platform Edition 8.1 2005 Q1, UR1, | A vulnerability has been reported because the contents of a JAR file can be exposed, which could let a remote malicious user obtain sensitive information. Upgrades available at: There is no exploit code required. | Sun Java System Application Server JAR File Information Disclosure | Medium | Sun(sm) Alert Notification Sun Alert ID: 101905, September 13, 2005 |
Sun Java Web Proxy Server 3.6, SP1-SP7 | Three remote Denial of Service vulnerabilities have been reported when an unprivileged malicious user submits a specially crafted request. Updates available at: Currently we are not aware of any exploits for these vulnerabilities. | Sun Java Web Proxy Server Remote Denials of Service | Low | Sun(sm) Alert Notification Sun Alert ID: 101913, September 8, 2005 |
Brightmail Anti-Spam 6.0.2 | Several remote Denial of Service vulnerabilities have reported due to an error when scanning or cleaning certain messages and due to an error in the decomposer when processing messages that contain 'winmail.dat' objects that are embedded in a MIME file. Patch available at: Currently we are not aware of any exploits for these vulnerabilities. | Symantec Brightmail Remote Denials of Service | Low | Secunia Advisory: SA16733, September 7, 2005 |
tDiary 2.1.1, 2.0.1 | A vulnerability has been reported due to a failure to perform validity checks on user's requests, which could let a remote malicious user edit/delete entries or configurations. Upgrades available at: Debian: There is no exploit code required. | TDiary Cross-Site Request Forgery | Medium | Security Focus, 14500, August 8, 2005 Debian Security Advisory, DSA 808-1, September 12, 2005 |
Unclassified NewsBoard 1.5.3 | A vulnerability has been reported in the Description field due to insufficient sanitization of user-supplied input before using in dynamically generated content, which could let a remote malicious user execute arbitrary HTML and script code. Patch available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Unclassified NewsBoard Description Field HTML Injection | Medium | Security Focus, Bugtraq ID: 14748, September 6, 2005 Security Focus, Bugtraq ID: 14748, September 14, 2005 |
Zebedee 2.4.1 | A remote Denial of Service vulnerability has been reported due to a failure to handle exceptional network requests. Upgrades available at: There is no exploit code required; however, an exploit script has been published. | Zebedee Remote Denial of Service | Low | Secunia Advisory: SA16788, September 12, 2005 |
[back to top] Wireless
The section below contains wireless vulnerabilities, articles, and viruses/trojans identified during this reporting period.
- Users beware: pirates nearby: In recent months law enforcement authorities nationwide have noticed a problem with Wi-Fi networks, Wi-Fi pirates.
Without proper security, it is possible for malicious users to tap your wireless Internet signal. If you are vulnerable, Wi-Fi pirates can use your wireless signal to surf the Net on your dime. In the worst cases, strangers outside your home or just down the street may monitor where you go on the Net, read your e-mails or access your personal information.
Source: http://www.crime-research.org/news/13.09.2005/1489/
Wireless Vulnerabilities
- SMC SMC7904WBRA Wireless Router Remote Denial of Service: A remote Denial of Service vulnerability has been reported due to a failure to handle anomalous network traffic.
- Linksys WRT54G Wireless Router Multiple Remote Vulnerabilities: Multiple vulnerabilities have been reported which could let a remote malicious user bypass security restrictions, cause a Denial of Service or potentially compromise a vulnerable system.
- BlueZ Arbitrary Command Execution: A vulnerability has been reported due to insufficient sanitization of input passed as a remote device name, which could let a remote malicious user execute arbitrary code. Updated information regarding Conectiva patch.
- btscanner-2.0.tar.bz2: A tool that extracts as much information as possible from a Bluetooth device without the requirement to pair.
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
[back to
top]
name=trends>Trends
- One In Six Spyware Apps Tries To Steal Identities: According to a security firm, a significant portion of spyware is designed to steal identities. This indicates a trend toward more malicious use of such software by criminals.
Fifteen percent of the 2,000 known spyware threats analyzed by Aladdin Knowledge Systems over a two-month span send private information gathered from the infected PC by logging keystrokes, capturing usernames and passwords, and hijacking e-mail address and contact lists.
Source: http://www.techweb.com/wire/security/170703179 - Bot herder websites in internet take-down: According to anti-virus firm, F-Secure high profile bot sites such as ryan1918.com and 0x90-team.com have disappeared. Source:
http://www.theregister.co.uk/2005/09/13/bot_herder_takedown/. - Businesses And Networks Are Unprepared For Disasters: AT&T Survey: According to a new report done by AT&T and the International Association of Emergency Managers (IAEM) suggests that many enterprise networks are not prepared for disasters and a large proportion of companies have made continuity planning a low priority.
The study, "Disaster Planning in the Private Sector: A Look at the State of Business Continuity in the U.S.," found that almost one third of U.S. businesses do not have continuity plans, and that nearly 40% of the 1200 companies surveyed reported that continuity planning was not a priority. More than 40% of the companies surveyed do not have off-site back-up or redundant servers and almost a third have failed to implement basic network security measures.
Source: http://nwc.networkingpipeline.com/news/170702684. - Research: E-Mail Remains A Point Of Vulnerability: Messaging Security Market Trends 2005-2008 study finds that businesses face a large number of messaging problems.
Of the 115 companies surveyed, two-thirds struggle to provide adequate storage for E-messages and archiving. Nearly all surveyed companies have had their networks successfully penetrated by a virus, worm, or other form of malware through E-mail.
Source: http://www.messagingpipeline.com/170702394. - Katrina victims at risk for ID theft, experts say: According to experts, important and sensitive document left behind in the waterlogged debris of Hurricane Katrina could put the storm's victims at a risk for identify theft. U.S. officials and consumer advocates said they had not yet heard of any cases of identity theft related to the disaster because the crime usually takes months to unfold. Source: http://today.reuters.com/news/newsArticle.aspx?type=technologyNews&storyID=2005-09-08T210539Z_01_BAU875711_RTRIDST_0_TECH-IDTHEFT-DC.XML&archived=False .
- Nigerian Scams Spin Katrina Disaster: According to Kaspersky Labs, Nigerian-style scams are beginning to appear that use the Katrina disaster. Source: http://www.techweb.com/wire/
security/170701190 . - US losing battle against identity theft: According to the Identity Theft Resource Center (ITRC) there have been at least 104 serious "data incidents" in the US since 1 January. The incidents potentially affect more than 56.2 million individuals. Source: http://www.vnunet.com/vnunet/news/
2141968/losing-battle-against-theft.
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trend | Date |
face="Arial, Helvetica, sans-serif">Description |
1 | Netsky-P | Win32 Worm | Stable | March 2004 | A mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. The worm also tries to spread through various file-sharing programs by copying itself into various shared folders. |
2 | Zafi-D | Win32 Worm | Stable | December 2004 | A mass-mailing worm that sends itself to email addresses gathered from the infected computer. The worm may also attempt to lower security settings, terminate processes, and open a back door on the compromised computer. |
3 | Lovgate.w | Win32 Worm | Stable | April 2004 | A mass-mailing worm that propagates via by using MAPI as a reply to messages, by using an internal SMTP, by dropping copies of itself on network shares, and through peer-to-peer networks. Attempts to access all machines in the local area network. |
4 | Zafi-B | Win32 Worm | Stable | June 2004 | A mass-mailing worm that spreads via e-mail using several different languages, including English, Hungarian and Russian. When executed, the worm makes two copies of itself in the %System% directory with randomly generated file names. |
5 | Netsky-Q | Win32 Worm | Stable | March 2004 | A mass-mailing worm that attempts to launch Denial of Service attacks against several web pages, deletes the entries belonging to several worms, and emits a sound through the internal speaker. |
6 | Mytob.C | Win32 Worm | Stable | March 2004 | A mass-mailing worm with IRC backdoor functionality that can also infect computers vulnerable to the Windows LSASS (MS04-011) exploit. The worm will attempt to harvest email addresses from the local hard disk by scanning files. |
7 | Mytob-AS | Win32 Worm | Stable | June 2005 | A slight variant of the mass-mailing worm that disables security related programs and processes, redirection various sites, and changing registry values. This version downloads code from the net and utilizes its own email engine. |
8 | Netsky-D | Win32 Worm | Stable | March 2004 | A simplified variant of the Netsky mass-mailing worm in that it does not contain many of the text strings that were present in NetSky.C and it does not copy itself to shared folders. Netsky.D spreads itself in e-mails as an executable attachment only. |
9 | Netsky-Z | Win32 Worm | Stable | April 2004 | A mass-mailing worm that is very close to previous variants. The worm spreads in e-mails, but does not spread to local network and P2P and does not uninstall Bagle worm. The worm has a backdoor that listens on port 665. |
10 | Mytob-BE | Win32 Worm | Stable | June 2005 | A slight variant of the mass-mailing worm that utilizes an IRC backdoor, LSASS vulnerability, and email to propagate. Harvesting addresses from the Windows address book, disabling antivirus, and modifying data. |
Table updated September 12, 2005
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.