Summary of Security Items from September 14 through September 20, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, therefore the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
Note: Even though a vulnerability may allow several malicious acts to be performed, only the highest level risk will be defined in the Risk column.
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Windows Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
AhnLab V3 prior to 6.0.0.457 | Multiple vulnerabilities have been reported in AhnLab V3 that could let local malicious users obtain elevated privileges, obtain arbitrary file access, or execute arbitrary code. Upgrade to version 6.0.0.457: Currently we are not aware of any exploits for this vulnerability. | AhnLab V3 DeviceIoControl Multiple Vulnerabilities | High | Security Tracker, Alert ID: 1014908, September 15, 2005 |
Cambridge Computer Corporation vxFtpSrv 0.9.7 | A buffer overflow vulnerability has been reported in vxFtpSrv that could let remote malicious users execute arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | vxFtpSrv Arbitrary Code Execution | High | Security Tracker, Alert ID: 1014911, September 15, 2005 |
Cambridge Computer Corporation vxTftpSrv 1.7.0 | A buffer overflow vulnerability has been reported in vxTftpSrv that could let remote malicious users execute arbitrary code. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | vxTftpSrv Arbitrary Code Execution | High | Security Tracker, Alert ID: 1014912, September 15, 2005 |
Cambridge Computer Corporation vxWeb 1.1.4 | A vulnerability has been reported in vxWeb that could let remote malicious users cause a Denial of Service. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | vxWeb Denial of Service | Low | Security Tracker, Alert ID: 1014910, September 15, 2005 |
DriverStudio 2.7 and 3.0 beta 2 | Multiple vulnerabilities have been reported in DriverStudio that could let local malicious users obtain elevated privileges or execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Compuware DriverStudio Privilege Elevation or Arbitrary Code Execution | Medium | Security Focus, ID: 14838, 14837, September 15, 2005 |
Intranet Open Source 2.7.2 | A vulnerability has been reported in Intranet Open Source that could let remote malicious users perform SQL injection. No workaround or patch available at time of publishing. There is no exploit code required. | Digger Solutions Intranet Open Source SQL Injection | Medium | Security Focus, ID: 14882, September 20, 2005 |
File Transfer Anywhere 3.01 | A vulnerability has been reported in File Transfer Anywhere that could let local malicious users disclose password information. A vendor fix is available, contact the vendor. There is no exploit code required. | File Transfer Anywhere Passwords Disclosure | Medium | Security Tracker, Alert ID: 1014919, September 16, 2005 |
Handy Address Book Server 1.1 | An input validation vulnerability has been reported in Handy Address Book Server that could let remote malicious users conduct Cross-Site Scripting. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Handy Address Book Server Cross-Site Scripting | Medium | Security Tracker, Alert ID: 1014901, September 15, 2005 |
Hosting Controller 6.1 with HF2.3 | A vulnerability has been reported in Hosting Controller that could let remote malicious users disclose information. A vendor hotfix (2.4) is available: Currently we are not aware of any exploits for this vulnerability. | Hosting Controller Information Disclosure | Medium | Secunia, Advisory: SA16824, September 15, 2005 |
Clearquest 2003.06.15, 2003.06.14, 2003.06.13, 2003.06.12, 2003.06.10, 2003.06.00, 2002.05.20, 2002.05.00 | Cross-Site Scripting vulnerabilities have been in XML Style Sheets due to insufficient sanitization of certain parameters, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: There is no exploit code required. | IBM Rational ClearQuest Multiple Cross-Site Scripting | Medium | IBM Security Advisory, September 20, 2005 |
Mall23 eCommerce | An input validation vulnerability has been reported Mall23 eCommerce ('infopage.asp') that could let remote malicious users perform SQL injection. A vendor patch is available, contact the vendor. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Mall23 SQL Injection | Medium | Security Tracker, Alert ID: 1014882, September 12, 2005 Security Focus, ID: 14803, September 19, 2005 |
Antigen for Exchange 8.0 SR2 | A vulnerability has been reported in Antigen for SMTP/ Exchange that could let remote malicious users bypass security restrictions. A vendor update is available: There is no exploit code required. | Sybari Antigen for Exchange Security Bypass | Medium | Security Tracker, Alert ID: 1014934, September 19, 2005 |
Vista 4.0 | An input validation vulnerability has been reported in Vista that could let remote malicious users traverse directories. Upgrade to version 4.3: There is no exploit code required; however, a Proof of Concept exploit script has been published. | TAC Vista Directory Traversal | Medium | Security Tracker, Alert ID: 1014923, September 16, 2005 |
Storage Exec 5.3 rev2190R StorageCentral 5.2 rev322 | A buffer overflow vulnerability has been reported in Storage Exec/ StorageCentral that could let remote malicious users execute arbitrary code. A vendor fix is available: Currently we are not aware of any exploits for this vulnerability. | Storage Exec/ StorageCentral Arbitrary Code Execution | High | Secunia Advisory: SA16871, September 20, 2005 |
Multi-Computer Control System 1.1 | A vulnerability has been reported in Multi-Computer Control System that could let remote malicious users cause a Denial of Service. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Multi-Computer Control System Denial of Service | Low | Secunia, Advisory: SA16865, September 19, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Apache 2.0.x | A vulnerability has been reported in 'modules/ssl/ssl_engine Patch available at: OpenPKG: RedHat: Ubuntu: SGI: Debian: Mandriva: Slackware: Trustix: Debian: Gentoo: There is no exploit code required. | Apache 'Mod_SSL SSLVerifyClient' Restriction Bypass | Medium | Security Tracker Alert ID: 1014833, September 1, 2005 OpenPKG Security Advisory, OpenPKG-SA-2005.017, September 3, 2005 RedHat Security Advisory, RHSA-2005:608-7, September 6, 2005 Ubuntu Security Notice, USN-177-1, September 07, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Debian Security Advisory, DSA 805-1, September 8, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:161, September 8, 2005 Slackware Security Advisory, SSA:2005-251-02, September 9, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0047, September 9, 2005 Debian Security Advisory DSA 807-1, September 12, 2005 Gentoo Linux Security Advisory, GLSA 200509-12, September 19, 2005 |
Safari 2.0.1, 2.0, 1.3, 1.2-1.2.3, 1.0, 1.1 | A vulnerability has been reported when the browser opens specific 'data:' URLs, which could lead to a Denial of Service. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Apple Safari Data URI Memory Corruption | Low | Security Focus, Bugtraq ID: 14868, September 17, 2005 |
ARC 5.21 j | A vulnerability was reported due to the insecure creation of temporary new archives by 'arc' and 'marc' before renamed to the user specified filename, which could let a malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required. | Arc Insecure Temporary File Creation | Medium | Secunia Advisory: SA16805, September 16, 2005 |
Bacula 1.36 .3 | Vulnerabilities have been reported in 'autoconf/randpass' and 'scripts/mtx-changer.in' due to the insecure creation of temporary files, which could let a remote malicious user create/overwrite arbitrary files. The vulnerabilities have been fixed in the CVS repositories. There is no exploit code required. | Bacula Insecure Temporary File Creation | Medium | Secunia Advisory: SA16866, September 20, 2005 |
ClamAV 0.80 -0.86.2, 0.70, 0.65-0.68, 0.60, 0.51-0.54 | Several vulnerabilities have been reported: a buffer overflow vulnerability was reported in 'libclamav/upx.c' due to a signedness error, which could let a malicious user execute arbitrary code; and a remote Denial of Service vulnerability was reported in 'libclamav/fsg.c' when handling a specially -crafted FSG-compressed executable file.
Upgrades available at: Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | ClamAV UPX Buffer Overflow & FSG Handling Denial of Service | High | Secunia Advisory: SA16848, September 19, 2005 Gentoo Linux Security Advisory, GLSA 200509-13, September 19, 2005 |
CUPS prior to 1.1.21rc1 | A vulnerability has been reported in incoming print jobs due to a failure to properly apply ACLs (Access Control List), which could let a remote malicious user bypass ACLs.
Upgrades available at: http://www.cups.org/ RedHat: Fedora: Ubuntu: There is no exploit code required. | Easy Software Products CUPS Access Control | Medium | Security RedHat Fedora Legacy Update Advisory, FLSA:163274, September 14, 2005 Ubuntu Security Notice, USN-185-1, September 20, 2005 |
Gnome Workstation Command Center 0.9.8
| A vulnerability has been reported due to the insecure creation of the 'gwcc_out.txt' temporary file, which could let a malicious user create/overwrite arbitrary files. No workaround or patch available at time of publishing. There is no exploit code required. | GNOME Workstation Command Center Insecure Temporary File Creation | Medium | Security Focus, Bugtraq ID: 14857, September 16, 2005 |
Mailutils 0.6 | A format string vulnerability has been reported in 'search.c' when processing user-supplied IMAP SEARCH commands, which could let a remote malicious user execute arbitrary code. Patch available at: Gentoo: A Proof of Concept exploit script has been published. | GNU Mailutils Format String | High | Security Tracker Alert ID: 1014879, September 9, 2005 Gentoo Linux Security Advisory, GLSA 200509-10, September 17, 2005 |
Texinfo 4.7 | A vulnerability has been reported in 'textindex.c' due to insecure creation of temporary files by the 'sort_offline()' function, which could let a malicious user create/ overwrite arbitrary files. No workaround or patch available at time of publishing. There is no exploit code required. | GNU Texinfo Insecure Temporary File Creation | Medium | Security Focus, Bugtraq ID: 14854, September 15, 2005 |
Grip 3.1.2, 3.2 .0 | A buffer overflow vulnerability has been reported in the CDDB protocol due to a boundary error, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code. Fedora: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-21.xml"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-304.html"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Gentoo: SUSE: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Peachtree: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | High
| Fedora Update Notifications, Gentoo Linux RedHat Security Advisory, RHSA-2005:304-08, Mandrakelinux Security Update Advisory, Gentoo Linux Security Advisory, GLSA 200504-07, April 8, 2005 SUSE Security Summary Report, SUSE-SR:2005:010, April 8, 2005 Mandriva Linux Security Update Advisories, MDKSA-2005:074 & 075, April 21, 2005 Peachtree Linux Security Notice, PLSN-0007, April 22, 2005 Fedora Legacy Update Advisory, FLSA:152919, September 15, 2005 | |
GtkDiskFree 1.9.3 | A vulnerability has been reported in the 'src/mount.c' file due to the insecure creation of temporary files, which could let a malicious user cause a Denial of Service or overwrite files. No workaround or patch available at time of publishing. There is no exploit code required. | GTKDiskFree Insecure Temporary File Creation | Medium | ZATAZ Audits Advisory, September 15, 2005 |
Tru64 5.1 B-3, 5.1 B-2 PK4, 5.1 A PK, 4.0 G PK4, 4.0 F PK8 | A remote Denial of Service vulnerability has been reported caused due to an unspecified error in the FTP daemon. Upgrades available at: Currently we are not aware of any exploits for this vulnerability. | HP Tru64 FTP Server Remote Denial of Service | Low | HP Security Bulletin, HPSBTU01227, September 20, 2005 |
LibTIFF 3.4, 3.5.1-3.5.5, 3.5.7, 3.6 .0, 3.6.1, 3.7, 3.7.1 | A buffer overflow vulnerability has been reported in the 'TIFFOpen()' function when opening malformed TIFF files, which could let a remote malicious user execute arbitrary code. Patches available at: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200505-07.xml"> Ubuntu: SuSE: TurboLinux: Debian: SCO: Currently we are not aware of any exploits for this vulnerability. | High | Gentoo Linux Security Advisory, GLSA 200505-07, May 10, 2005 Ubuntu Security Notice, SUSE Security Summary Report, SUSE-SR:2005:014, Turbolinux Debian Security Advisory, DSA 755-1, July 13, 2005 SCO Security Advisory, | |
LineContol Java Client 0.8 | A vulnerability has been reported in 'AuthInfo.java' due to an error, which could let a malicious user obtain password information. Upgrade available at: There is no exploit code required. | LineControl Java Client Password Disclosure | Medium | Secunia Advisory: SA16817, September 14, 2005 |
lm_sensors 2.9.1 | A vulnerability has been reported in the 'pwmconfig' script due to the insecure creation of temporary files, which could result in a loss of data or a Denial of Service. Ubuntu: Mandriva: Gentoo: Debian: There is no exploit code required. | LM_sensors PWMConfig Insecure Temporary File Creation | Low | Security Focus, Bugtraq ID: 14624, August 22, 2005 Ubuntu Security Notice, USN-172-1, August 23, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:149, August 25, 2005 Gentoo Linux Security Advisory, GLSA 200508-19, August 30, 2005 Debian Security Advisory, DSA 814-1, September 15, 2005 |
MasqMail 0.2.18 | Several vulnerabilities have been reported: a vulnerability was reported in the email address due to a sanitization error when the message fails to be sent, which could let a malicious user execute arbitrary commands with privileges of the mail user; and a vulnerability was reported when handling log files due to an unspecified error, which could let a remote malicious user overwrite arbitrary files. Mandriva: There is no exploit code required. | MasqMail Elevated Privileges | Medium | Mandriva Linux Security Update Advisory, MDKSA-2005:168, September 20, 2005 |
Glyph and Cog Xpdf 3.0, pl2 & pl3; Ubuntu Linux 5.0 4 powerpc, i386, amd64; | A remote Denial of Service vulnerability has been reported when verifying malformed 'loca' table in PDF files. RedHat: http://rhn.redhat.com/ http://rhn.redhat.com/ Ubuntu: KDE: Mandriva: SGI: Gentoo: Fedora: Debian: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> TurboLinux: Conectiva: Mandriva: Currently we are not aware of any exploits for this vulnerability. | Low | RedHat Security Advisories, RHSA-2005:670-05 & RHSA-2005:671-03, & RHSA-2005:708-05, August 9, 2005 Ubuntu Security Notice, USN-163-1, August 09, 2005 KDE Security Advisory, 20050809-1, August 9, 2005 Mandriva Linux Security Update Advisories, MDKSA-2005:134, 135, 136 & 138, August 11, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Gentoo Linux Security Advisory GLSA, 200508-08, August 16, 2005 Fedora Update Notifications, Debian Security Advisory, DSA 780-1, August 22, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0043, September 2, 2005 Turbolinux Security Advisory, TLSA-2005-88, September 5, 2005 Conectiva Linux Announce-ment, CLSA-2005:1010, September 13, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:138-1, September 19, 2005 | |
Larry Wall Perl 5.0 05_003, 5.0 05, 5.0 04_05, 5.0 04_04, 5.0 04, 5.0 03, 5.6, 5.6.1, 5.8, 5.8.1, 5.8.3, 5.8.4 -5, 5.8.4 -4, 5.8.4 -3, 5.8.4 -2.3, 5.8.4 -2, 5.8.4 -1, 5.8.4, 5.8.5, 5.8.6 | A vulnerability has been reported in the 'rmtree()' function in the 'File::Path.pm' module when handling directory permissions while cleaning up directories, which could let a malicious user obtain elevated privileges. A fixed version (5.8.4 or later) is available at: Ubuntu: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200501-38.xml"> Debian:
href="http://security.debian.org/pool/updates/main/p/perl/"> TurboLinux: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Fedora: Avaya: Currently we are not aware of any exploits for this vulnerability. | Medium | Ubuntu Security Notice, USN-94-1 March 09, 2005 Gentoo Linux Security Advisory [UPDATE], GLSA 200501-38:03, March 15, 2005 Debian Security Advisory, DSA 696-1 , March 22, 2005 Turbolinux Security Advisory, TLSA-2005-45, April 19, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:079, April 29, 2005 HP Security Bulletin, HPSBUX01208, June 16, 2005 Secunia, Advisory: SA16193, July 25, 2005 Avaya Security Advisory, ASA-2005-196, September 13, 2005 | |
zlib 1.2.2, 1.2.1, 1.2 .0.7, 1.1-1.1.4, 1.0-1.0.9; Ubuntu Linux 5.0 4, powerpc, i386, amd64, 4.1 ppc, ia64, ia32; SuSE Open-Enterprise-Server 9.0, Novell Linux Desktop 9.0, Linux Professional 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Personal 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Enterprise Server 9; Gentoo Linux; | A buffer overflow vulnerability has been reported due to insufficient validation of input data prior to utilizing it in a memory copy operation, which could let a remote malicious user execute arbitrary code. Debian: FreeBSD: Gentoo: SUSE: Ubuntu: Mandriva: OpenBSD: OpenPKG: RedHat: Trustix: Slackware: TurboLinux: Fedora: zsync: Apple: SCO: IPCop: Debian: Trolltech: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | Zlib Compression Library Buffer Overflow | High | Debian Security Advisory FreeBSD Security Advisory, Gentoo Linux Security Advisory, GLSA 200507- SUSE Security Announcement, SUSE-SA:2005:039, Ubuntu Security Notice, RedHat Security Advisory, RHSA-2005:569-03, Fedora Update Notifications, Mandriva Linux Security Update Advisory, OpenPKG Trustix Secure Slackware Security Turbolinux Security Fedora Update Notification, FEDORA-2005-565, July 13, 2005 SUSE Security Summary Security Focus, 14162, July 21, 2005 USCERT Vulnerability Note VU#680620, July 22, 2005 Apple Security Update 2005-007, SCO Security Advisory, SCOSA-2005.33, August 19, 2005 Security Focus, Bugtraq ID: 14162, August 26, 2005 Debian Security Advisory, DSA 797-1, September 1, 2005 Security Focus, Bugtraq ID: 14162, September 12, 2005 Fedora Legacy Update Advisory, FLSA:162680, September 14, 2005 |
zlib 1.2.2, 1.2.1; Ubuntu Linux 5.04 powerpc, i386, amd64, | A remote Denial of Service vulnerability has been reported due to a failure of the library to properly handle unexpected compression routine input. Zlib: Debian: Ubuntu: OpenBSD: Mandriva: Fedora: Slackware: FreeBSD: SUSE: Gentoo: http://security.gentoo.org/ Trustix: Conectiva: Apple: TurboLinux: SCO: Debian: Trolltech: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendor Zlib Compression Library Decompression Remote Denial of Service | Low | Security Focus, Bugtraq ID 14340, July 21, 2005 Debian Security Advisory DSA 763-1, July 21, 2005 Ubuntu Security Notice, USN-151-1, July 21, 2005 OpenBSD, Release Errata 3.7, July 21, 2005 Mandriva Security Advisory, MDKSA-2005:124, July 22, 2005 Secunia, Advisory: SA16195, July 25, 2005 Slackware Security Advisory, SSA:2005- FreeBSD Security Advisory, SA-05:18, July 27, 2005 SUSE Security Announce- Gentoo Linux Security Advisory, GLSA 200507-28, July 30, 2005 Gentoo Linux Security Advisory, GLSA 200508-01, August 1, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0040, August 5, 2005 Conectiva Linux Announcement, CLSA-2005:997, August 11, 2005 Apple Security Update, APPLE-SA-2005-08-15, August 15, 2005 Turbolinux Security Advisory , TLSA-2005-83, August 18, 2005 SCO Security Advisory, SCOSA-2005.33, August 19, 2005 Debian Security Advisory, DSA 797-1, September 1, 2005 Security Focus, Bugtraq ID: 14340, September 12, 2005 Fedora Legacy Update Advisory, FLSA:162680, September 14, 2005 |
Gentoo Linux; | Multiple vulnerabilities have been reported due to integer overflows, memory access errors, input validation errors, and logic errors, which could let a remote malicious user execute arbitrary code, obtain sensitive information, or cause a Denial of Service. Fedora: Gentoo: SUSE: X.org: Fedora: RedHat: Mandrakesoft: http://www.mandrakesoft. Debian: SGI: TurboLinux: Avaya: http://support.avaya.com/| Gentoo: http://security.gentoo.org/ Ubuntu: FedoraLegacy: Ubuntu: HP: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendors LibXPM Multiple Vulnerabilities | High
| X.Org Foundation Security Advisory, November 17, 2004 Fedora Update Notifications, SUSE Security Announcement, SUSE-SA:2004:041, November 17, 2004 Gentoo Linux Security Advisory, GLSA 200411-28, November 19, 2004 Fedora Security Update Notifications RedHat Security Advisory, RHSA-2004:537-17, December 2, 2004 Mandrakesoft: MDKSA-2004:137: libxpm4; MDKSA-2004:138: XFree86, November 22, 2004 Debian Security Advisory Turbolinux Security Announcement, January 20, 2005 Avaya Security Advisories, ASA-2005-023 & 025, January 25, 2005 Gentoo Linux Security Advisories, GLSA 200502-06 & 07, February 7, 2005 Ubuntu Security Notice, USN-83-1 February 16, 2005 Fedora Legacy Update Advisory, FLSA:2314, March 2, 2005 Ubuntu Security Notice, USN-83-2, September 12, 2005 HP Security Bulletin, HPSBTU01228, September 20, 2005 |
Linux kernel 2.6.8-2.6.10, 2.4.21 | Several vulnerabilities have been reported: a buffer overflow vulnerability was reported in 'msg_control' when copying 32 bit contents, which could let a malicious user obtain root privileges and execute arbitrary code; and a vulnerability was reported in the 'raw_sendmsg()' function, which could let a malicious user obtain sensitive information or cause a Denial of Service. Ubuntu: Trustix: Currently we are not aware of any exploits for these vulnerabilities. | Linux Kernel Buffer Overflow, Information Disclosure, & Denial of Service | High | Secunia Advisory: SA16747, September 9, 2005 Ubuntu Security Notice, USN-178-1, September 09, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0049, September 16, 2005 |
Ubuntu Linux 5.0 4 powerpc, i386, amd64, 4.1 ppc, ia64, ia32;
| Multiple format string vulnerabilities have been reported: a vulnerability was reported when vCard information is attached to an email message, which could let a remote malicious user execute arbitrary code; a vulnerability was reported when specially crafted contact data that has been retrieved from an LDAP server is displayed, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported when specially crafted task list data that has been retrieved from remote servers and the data has been saved under the 'Calendars' tab is displayed, which could let a remote malicious user execute arbitrary code. Updates available at: Ubuntu: Mandriva: SUSE: Gentoo: RedHat: SGI: Conectiva: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | High | Secunia Advisory: SA16394, August 11, 2005 Ubuntu Security Notice, USN-166-1, August 11, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:141, August 18, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 Gentoo Linux Security Advisory, GLSA 200508-12, August 23, 200 RedHat Security Advisory, RHSA-2005:267-10, August 29, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Conectiva Linux Announce-ment, CLSA-2005:1004, September 13, 2005 SUSE Security Announcement, SUSE-SA:2005:054, September 16, 2005 | |
util-linux 2.8-2.13; | A vulnerability has been reported because mounted filesystem options are improperly cleared due to a design flaw, which could let a remote malicious user obtain elevated privileges. Updates available at: Slackware: Trustix: Ubuntu: Gentoo: Mandriva: There is no exploit code required. | Util-Linux UMount Remounting Filesystem Elevated Privileges | Medium | Security Focus, Bugtraq ID: 14816, September 12, 2005 Slackware Security Advisory, SSA:2005-255-02, September 13, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0049, September 16, 2005 Ubuntu Security Notice, USN-184-1, September 19, 2005 Gentoo Linux Security Advisory, GLSA 200509-15, September 20, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:167, September 20, 2005 |
XFree86 X11R6 4.3 .0, | A buffer overflow vulnerability has been reported in the pixmap processing code, which could let a malicious user execute arbitrary code and possibly obtain superuser privileges. Gentoo: RedHat: http://rhn.redhat.com/ Ubuntu: Mandriva: Sun: Currently we are not aware of any exploits for this vulnerability. | XFree86 Pixmap Allocation Buffer Overflow | High | Gentoo Linux Security Advisory, GLSA 200509-07, September 12, 2005 RedHat Security Advisory, RHSA-2005:329-12 & RHSA-2005:396-9, September 12 & 13, 2005 Ubuntu Security Notice, USN-182-1, September 12, 2005 Mandriva Security Advisory, MDKSA-2005:164, September 13, 2005 Sun(sm) Alert Notification |
ncompress 4.2.4 | A vulnerability has been reported in the 'build,' 'zcmp,' and 'zdiff' scripts due to the insecure creation of temporary files, which could let a malicious user obtain elevated privileges No workaround or patch available at time of publishing. There is no exploit code required. | Ncompress Insecure Temporary File Creation | Medium | Secunia Advisory: SA16827, September 16, 2005 |
netpbm 10.0 | A vulnerability has been reported in netpbm ('-dSAFER') that could let malicious users execute arbitrary postscript code. Trustix: Gentoo: Mandriva: Ubuntu: Fedora: SUSE: RedHat: SGI: Conectiva: TurboLinux: There is no exploit code required. | netpbm Arbitrary Code Execution | High | Secunia Advisory: SA16184, July 25, 2005 Trustix Secure Linux Security Advisory, #2005-0038, July 29, 2005 Gentoo Linux Security Advisory, GLSA 200508-04, August 5, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:133, August 10, 2005 Ubuntu Security Notice, USN-164-1, August 11, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 RedHat Security Advisory, RHSA-2005:743-08, August 22, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Conectiva Linux Announcement, CLSA-2005:1007, September 13, 2005 Turbolinux Security Advisory, TLSA-2005-90, September 20, 2005 |
PCRE 6.1, 6.0, 5.0 | A vulnerability has been reported in 'pcre_compile.c' due to an integer overflow, which could let a remote/local malicious user potentially execute arbitrary code. Updates available at: Ubuntu: Ubuntu: Fedora: Gentoo: Mandriva: SUSE: Slackware: Ubuntu: Debian: SUSE: Gentoo: Conectiva: Gentoo: Currently we are not aware of any exploits for this vulnerability. | PCRE Regular Expression Heap Overflow | High | Secunia Advisory: SA16502, August 22, 2005 Ubuntu Security Notice, USN-173-1, August 23, 2005 Ubuntu Security Notices, USN-173-1 & 173-2, August 24, 2005 Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200508-17, August 25, 2005 Mandriva Linux Security Update Advisories, MDKSA-2005:151-155, August 25, 26, & 29, 2005 SUSE Security Announcements, SUSE-SA:2005:048 & 049, August 30, 2005 Slackware Security Advisories, SSA:2005-242-01 & 242-02 , August 31, 2005 Ubuntu Security Notices, USN-173-3, 173-4 August 30 & 31, 2005 Debian Security Advisory, DSA 800-1, September 2, 2005 SUSE Security Announcement, SUSE-SA:2005:051, September 5, 2005 Slackware Security Advisory, SSA:2005-251-04, September 9, 2005 Gentoo Linux Security Advisory, GLSA 200509-08, September 12, 2005 Conectiva Linux Announce-ment, CLSA-2005:1009, September 13, 2005 Gentoo Linux Security Advisory, GLSA 200509-12, September 19, 2005 |
PHP 4.4.0, 4.3-4.3.11, 4.2-4.2.3, 4.1.0-4.1.2, 4.0 0-4.0.7, 3.0 0 -3.0.18 | A vulnerability has been reported due to the way session variables are stored, which could let a malicious user hijack sessions variables. No workaround or patch available at time of publishing. There is no exploit code required. | PHP Session Hijacking | Medium | Security Focus, Bugtraq ID: 14858, September 16, 2005 |
PostgreSQL 7.3 through 8.0.2 | Two vulnerabilities have been reported: a vulnerability was reported because a remote authenticated malicious user can invoke some client-to-server character set conversion functions and supply specially crafted argument values to potentially execute arbitrary commands; and a remote Denial of Service vulnerability was reported because the 'contrib/tsearch2' module incorrectly declares several functions as returning type 'internal.' Fix available at: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Gentoo: Trustix: TurboLinux: RedHat: SGI: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | High
| Security Tracker Alert, 1013868, May 3, 2005 Ubuntu Security Notice, USN-118-1, May 04, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0018, May 6, 2005 Gentoo Linux Security Advisory, GLSA 200505-12, May 16, 2005 Trustix Secure Linux Bugfix Advisory, TSL-2005-0023, May 16, 2005 Turbolinux Security Advisory , TLSA-2005-62, June 1, 2005 RedHat Security Advisory, RHSA-2005:433-17, June 1, 2005 SGI Security Advisory, 20050602-01-U, June 23, 2005 Conectiva Linux Announcement, CLSA-2005:1008, September 13, 2005 | |
PostgreSQL 7.4.5; Avaya CVLAN, Integrated Management, Intuity LX, MN100, Modular Messaging (MSS) 1.1, 2.0 | A vulnerability was reported due to the insecure creation of temporary files, which could possibly let a malicious user overwrite arbitrary files. Trustix:
href="ftp://ftp.trustix.org/pub/trustix/updates/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-16.xml"> Debian:
href="http://security.debian.org/pool/updates/main/p/postgresql/"> OpenPKG:
href="ftp://ftp.openpkg.org/release/"> Mandrakesoft: Red Hat: Avaya: TurboLinux: Conectiva: There is no exploit code required. | Medium | Trustix Secure Linux Bugfix Advisory, TSL-2004-0050, September 30, 2004 Gentoo Linux Security Advisory, GLSA 200410-16, October 18, 2004 Debian Security Advisory, DSA 577-1, October 29, 2004 OpenPKG Security Advisory, OpenPKG-SA-2004.046, October 29, 2004 Mandrakesoft Security Advisory, MDKSA-2004:149, December 13, 2004 Red Hat Advisory RHSA-2004:489-17, December 20, 2004 Avaya Security Advisory, ASA-2005-024, January 25, 2005 Turbolinux Security Announcement, February 17, 2005 Conectiva Linux Announcement, CLSA-2005:1008, September 13, 2005 | |
Gaim prior to 1.3.1 | Several vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported when using the Yahoo! protocol to download a file; and a remote Denial of Service vulnerability was reported in the MSN Messenger service when a malicious user submits a specially crafted MSN message. Updates available at: Ubuntu: Gentoo: Mandriva: Fedora: RedHat: Debian: SUSE: Debian: Conectiva: There is no exploit code required. | Gaim Multiple Remote Denial of Services | Low | Secunia Advisory, SA15648, Ubuntu Security Notice USN-139-1, June 10, 2005 Gentoo Linux Security Advisory, GLSA 200506- Mandriva Linux Security Update Advisory, MDKSA-2005:099, Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:518-03, Debian Security Advisory, SUSE Security Summary Report, SUSE-SR:2005:017, Debian Security Advisory, DSA 773-1, August 11, 2005 Conectiva Linux Announcement, CLSA-2005:1006, September 13, 2005 |
Shorewall 2.0.x, 2.2.x, 2.4.x | A vulnerability has been reported due to a failure to properly implement expected firewall rules for MAC address-based filtering, which could let a remote malicious user bypass firewall rules. Hotfixes available at: Mandriva: Gentoo: There is no exploit code required. | Shorewall MACLIST Firewall Rules Bypass | Medium | Secunia Advisory: SA16087, Mandriva Linux Security Update Advisory, MDKSA-2005:123, July 21, 2005 Gentoo Linux Security Advisory [ERRATA UPDATE], GLSA 200507-20:02, September 17, 2005 |
SimpleCDR-X 1.3.3 | A vulnerability has been reported due to the insecure creation of a temporary copy of the ISO image, which could let a malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required. | SimpleCDR-X Insecure Temporary File Creation | Medium | Secunia Advisory: SA16835, September 16, 2005 |
slocate 2.7 | A Denial of Service vulnerability has been reported when a specially crafted directory structure that contains long paths is submitted. Mandriva: TurboLinux: There is no exploit code required. | slocate Long Path Denial of Service | Low | Mandriva Linux Security Update Advisory, MDKSA-2005:147, August 22, 2005 Turbolinux Security Advisory, TLSA-2005-91, September 20, 2005 |
Squid Web Proxy Cache 2.5 & prior | A remote Denial of Service vulnerability has been reported in the 'storeBuffer()' function when handling aborted requests. Patches available at: Gentoo: OpenPKG: Mandriva: Debian: Ubuntu: RedHat: SUSE: Currently we are not aware of any exploits for this vulnerability. | Squid Aborted Requests Remote Denial of Service | Low | Security Tracker Alert ID: 1014864, September 7, 2005 Gentoo Linux Security Advisory GLSA 200509-06, September 7, 2005 OpenPKG Security Advisory, OpenPKG-SA-2005.021, September 10, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:162, September 12, 2004 Debian Security Advisory, DSA 809-1, September 13, 2005 Ubuntu Security Notice, USN-183-1, September 13, 2005 RedHat Security Advisory, RHSA-2005:766-7, September 15, 2005 SUSE Security Announcement, SUSE-SA:2005:053, September 16, 2005 |
Squid Web Proxy Cache 2.5 .STABLE1-STABLE 10, 2.4 .STABLE6 & 7, STABLE 2, 2.4, 2.3 STABLE 4&5, 2.1 Patch 2, 2.0 Patch 2 | A remote Denial of Service vulnerability has been reported in '/squid/src/ssl.c' when a malicious user triggers a segmentation fault in the 'sslConnectTimeout()' function. Patches available at: Trustix: OpenPKG: Mandriva: Ubuntu: Debian: RedHat: SUSE: There is no exploit code required. | Squid 'sslConnect | Low | Security Tracker Alert ID: 1014846, September 2, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0047, September 9, 2005 OpenPKG Security Advisory, OpenPKG-SA-2005.021, September 10, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:162, September 12, 2005 Ubuntu Security Notice, USN-183-1, September 13, 2005 Debian Security Advisory, DSA 809-1, September 13, 2005 RedHat Security Advisory, RHSA-2005:766-7, September 15, 2005 SUSE Security Announcement, SUSE-SA:2005:053, September 16, 2005 |
Solaris 10.0, _x86 | A Denial of Service vulnerability has been reported in the 'ti' driver due to an unspecified error. Patches available at: Currently we are not aware of any exploits for this vulnerability. | Sun Solaris 'Ti' Driver Denial of Service | Low | Sun(sm) Alert Notification Sun Alert ID: 101899, September 19, 2005 |
Linux Professional 9.3 x86_64, 9.3, Linux Personal 9.3 x86_64, 9.3 | A buffer overflow vulnerability has been reported in Yast, which could let a malicious user execute arbitrary code with superuser privileges. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | SuSE YaST Buffer Overflow | High | Security Focus, Bugtraq ID: 14861, September 16, 2005 |
Turquoise SuperStat 202-2.2.3 | A buffer overflow has been reported in the date parser due to a boundary error, which could let a remote malicious user execute arbitrary code.
Upgrades available at: Debian: Currently we are not aware of any exploits for this vulnerability. | Turquoise SuperStat Date Parser Remote Buffer Overflow | High | Debian Security Advisory DSA 812-1, September 15, 2005 |
University of California (BSD License) PostgreSQL 7.x, 8.x; Peachtree Linux release 1 | Multiple vulnerabilities exist that could permit malicious users to gain escalated privileges or execute arbitrary code. These vulnerabilities are due to an error in the 'LOAD' option, a missing permissions check, an error in 'contrib/intagg,' and a boundary error in the plpgsql cursor declaration. Update to version 8.0.1, 7.4.7, 7.3.9, or 7.2.7:
href="http://wwwmaster.postgresql.org/download/mirrors-ftp"> Ubuntu:
href="http://www.ubuntulinux.org/support/documentation/usn/usn-71-1"> Debian:
href="http://www.debian.org/security/2005/dsa-668"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200502-08.xml"> Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/p/postgresql/"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-141.html"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200502-19.xml"> Debian:
href="http://security.debian.org/pool/updates/main/p/postgresql/"> Mandrakesoft:
href="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:040"> SUSE: Peachtree: Trustix: Conectiva: Currently we are not aware of any exploits for these vulnerabilities. | University of
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0227">CAN-2005-0227 | High
| PostgreSQL Security Release, February 1, 2005 Ubuntu Security Notice USN-71-1 February 01, 2005 Debian Security Advisory Gentoo GLSA 200502-08, February 7, 2005 Fedora Update Notifications, Ubuntu Security Notice,e USN-79-1 , February 10, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0003, February 11, 2005 Gentoo Linux Security Advisory, GLSA 200502-19, February 14, 2005 RedHat Security Advisory, RHSA-2005:141-06, February 14, 2005 Debian Security Advisory, DSA 683-1, February 15, 2005 Mandrakesoft, MDKSA-2005:040, February 17, 2005 SUSE Security Summary Report, SUSE-SR:2005:005, February 18, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:006, February 25, 2005 SUSE Security Announcement, SUSE-SA:2005:027, April 20, 2005 Peachtree Linux Security Notice, PLSN-0004, April 21, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0015, April 25, 2005 Conectiva Linux Announcement, CLSA-2005:1008, September 13, 2005 |
Webmin 1.220, 1.210, 1.200; Usermin 1.150, 1.140, 1.130 | A vulnerability has been reported in 'miniserv.pl' due to an input validation error in the authentication process, which could let a remote malicious user bypass certain security restrictions. Webmin: Usermin: Currently we are not aware of any exploits for this vulnerability. | Webmin / Usermin Remote PAM Authentication Bypass | Medium | SNS Advisory No.83, September 20, 2005 |
Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
aeDating 4.0, 3.2 | An SQL injection vulnerability has been reported in 'search_result.php' due to insufficient sanitization of the 'Country[]' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | AEwebworks aeDating SQL Injection | Medium | Secunia Advisory: SA16831, September 16, 2005 |
EPay Pro 2.0 | A Directory Traversal vulnerability has been reported in 'index.php' due to insufficient validation of the 'read' parameter, which could let a remote malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | EPay Pro Directory Traversal | Medium | Security Focus, Bugtraq ID: 14871, September 19, 2005 |
PHP Advanced Transfer Manager 1.30 | Several vulnerabilities have been reported: a Directory Traversal vulnerability was reported in 'txt.php,' 'htm.php,' 'html.php,' and 'zip.php' due to insufficient sanitization of input passed to the 'current_dir' and 'filename' parameters, which could let a remote malicious user obtain sensitive information; a vulnerability was reported in the 'test.php' script when accessed directly, which could let a remote malicious user obtain sensitive information; a vulnerability was reported because a default administrator password exists, which could let a remote malicious user upload and No workaround or patch available at time of publishing. There is no exploit code required; however, Proof of Concept exploits have been published. | PHP Advanced Transfer Manager Multiple Vulnerabilities | High | Security Tracker Alert ID: 1014930, September 19, 2005 |
Apache | A vulnerability has been reported in Apache which can be exploited by remote malicious users to smuggle http requests. Conectiva: Fedora: Mandriva: http://security.ubuntu.com/ TurboLinux: SGI: SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Debian: Ubuntu: SGI: IBM has released fixes for Hardware Management Console addressing this issue. Users should contact IBM for further information. Currently we are not aware of any exploits for this vulnerability. | Apache HTTP Request Smuggling Vulnerability CAN-2005-1268 | Medium | Secunia, Advisory: SA14530, July 26, 2005 Conectiva, CLSA-2005:982, July 25, 2005 Fedora Update Notification Mandriva Linux Security Update Advisory, MDKSA-2005:129, August 3, 2005 Ubuntu Security Notice, USN-160-1, August 04, 2005 Turbolinux Security Advisory, TLSA-2005-81, August 9, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 SUSE Security Announcement, SUSE-SA:2005:046, August 16, 2005 Debian Security Advisory DSA 803-1, September 8, 2005 Ubuntu Security Notice, USN-160-2, September 07, 2005 SGI Security Advisory, 20050901-01-U, September 7, 2005 Security Focus, Bugtraq ID: 14106, September 21, 2005 |
SecurePlatform NGX R60 Build 244 | A vulnerability has been reported due to improper implementation of expected firewall rules, which could let a remote malicious user bypass firewall rules.
No workaround or patch available at time of publishing. There is no exploit code required. | Check Point SecurePlatform NGX Firewall Rules Bypass | Medium | Security Focus, Bugtraq ID: 14781, September r8, 2005 |
Content2Web 1.0.1 | Multiple vulnerabilities have been reported: a vulnerability was reported due to insufficient validation of the 'show' parameter, which could let a remote malicious user execute arbitrary PHP code; a vulnerability was reported which could let a remote malicious user execute SQL commands; a vulnerability was reported because a remote malicious user create a specially crafted URL that will cause arbitrary scripting code to be executed by the target user's browser; and a vulnerability was reported because a remote malicious user can obtain the installation path. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | Content2Web Multiple Input Validation Vulnerabilities | Medium | Security Tracker Alert ID: 1014900, September 14, 2005 |
CuteNews 1.4 .0 | A Cross-Site Scripting vulnerability has been reported in 'data/flood.db.php' due to insufficient sanitization, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | CuteNews Cross-Site Scripting | Medium | Security Tracker Alert ID: 1014929, September 19, 2005 |
CuteNews 1.4 .0 & prior | A vulnerability has been reported in 'inc/shows.inc.php' flood protection feature, which could let a remote malicious user execute arbitrary PHP code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | CuteNews Arbitrary PHP | High | Security Focus, Bugtraq ID: 14869, September 17, 2005 |
Avocent CCM4850 2.1 (Firmware) | A vulnerability has been reported in the 'connect' command due to an error when restricting access to certain serial ports, which could let a remote malicious user obtain unauthorized access. Update available at: There is no exploit code required. | Data Center Resources Avocent CCM Unauthorized Access | Medium | Secunia Advisory: SA16836, September 16, 2005 |
DeluxeBB 1.0 5, 1.0 | Several SQL injection vulnerabilities have been reported due to insufficient sanitization of user-supplied input before using in SQL queries, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | DeluxeBB Multiple SQL Injection | Medium | Security Focus, Bugtraq ID: 14851, September 15, 2005 |
Digital Scribe 1.4 | An SQL injection vulnerability has been reported in 'login.php' due to insufficient sanitization of the 'username' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Digital Scribe SQL Injection | Medium | Security Focus, Bugtraq ID: 14843, September 15, 2005 |
Webppliance 3.1.1, 3.1, 3.0 | An HTML injection vulnerability has been reported in 'OCW_login_username' due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required. | Ensim Webppliance 'OCW_login_ | Medium | Security Focus, Bugtraq ID: 14836, September 14, 2005 |
PHP-Nuke 7.6-7.8, 7.0-7.3, 6.9, 6.5-6.7, 6.0, 5.0-5.6, 4.4.1 a, 4.3, 4.0 , 3.0, 2.5, 1.0, 0.726 -3, 0.75 -RC3 | Several potential vulnerabilities have been reported in the wysiwyg editor. The impact was not specified. Updates available at: There is no exploit code required. | PHP-Nuke WYSIWYG Editor | Not Specified | Secunia Advisory: SA16843, September 16, 2005 |
Hesk 0.93, 0.92 | A vulnerability has been reported in the 'PHPSESSID' parameter when accessing 'admin.php' and 'admin_main.php' because it is possible to bypass the authentication process, which could let a remote malicious user obtain sensitive information Upgrades available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Hesk Authentication Bypass | Medium | Security Focus, Bugtraq ID: 14879, September 20, 2005 |
OpenView Network Node Manager 7.50 Solaris, 7.50, 6.41 Solaris, 6.41 | A vulnerability has been reported in the 'node' URI parameter of the 'OvCgi/connected Revision 3: Revision 4: Workaround available at: There is no exploit code required; however, a Proof of Concept exploit script has been published. | HP OpenView Network Node Manager Remote Arbitrary Code Execution | High | Portcullis Security Advisory, 05-014, August 25, 2005 HP Security Advisory, HPSBMA01224, August 26, 2005 HP Security Advisory, HPSBMA01224 REVISION: 3, September 13, 2005 HP Security Advisory, HPSBMA01224 REVISION: 4, September 19, 2005 |
Lotus Domino Enterprise Server 6.5.2, Lotus Domino 6.5.2 | Two Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of the 'BaseTarget' and 'Src' parameters before returned to the user, which could let a remote malicious user execute arbitrary HTML and script code. Updates available at: http://www-1.ibm.com/ Proofs of Concept exploits have been published. | IBM Lotus Domino Cross-Site Scripting | Medium | IBM Security Advisories, September 15, 2005 |
Online MX Shop 3.2 .0 | An SQL injection vulnerability has been reported in the 'pages' module due to insufficient validation of input submitted to the 'idp', 'id_ctg', and 'id_prd' parameters, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | MX Shop SQL Injection | Medium | SYSTEM SECURE.ORG Advisory, September 17, 2005 |
Py2Play 0.1.7 | A vulnerability has been reported due to insufficient validation/ restriction of serialized Python objects (pickles) used when receiving objects over a peer-to-peer game network, which could let a remote malicious user execute arbitrary code. Gentoo: There is no exploit code required. | Py2Play Object Remote Python Code Execution | High | Gentoo Linux Security Advisory GLSA 200509-09, September |
vBulletin 3.0.6 and prior | An input validation vulnerability was reported that could let remote malicious users inject and execute arbitrary PHP code. Nested input passed to the 'template' parameter in 'misc.php' is not properly verified. Update to version 3.0.7: http://www.vbulletin.com/ An exploit script has been published. | Jelsoft Enterprises vBulletin PHP Code Injection Vulnerability | High | Secunia Security Focus, Bugtraq ID: 12622, September 17, 2005 |
VBulletin 3.0-3.0.8, 2.3.0-2.3.4, 2.2.0-2.2.9, 2.0.3, 2.0, rc 2 & rc 3, 1.0.1 lite | Multiple vulnerabilities have been reported: a Cross-Site Scripting vulnerability was reported due to insufficient sanitization of some input passed in the administration section, which could let a remote malicious user execute arbitrary HTML and script code; an SQL injection vulnerability was reported due to insufficient sanitization of some input passed in the administration section before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a vulnerability was reported in 'avatars/icons/smileys upload functionality because it is possible to upload arbitrary files inside the web root and execute arbitrary PHP scripts. Upgrades available at: There is no exploit code required; however, Proof of Concept exploits have been published. | vBulletin Multiple Vulnerabilities CAN-2005-3020 | High | BuHa Security-Advisory #2 & 3, September 17, 2005 |
Tofu 0.2 | A vulnerability has been reported due to insufficient validation/ restriction of serialized Python objects (pickles) used when receiving objects over a peer-to-peer game network, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required. | Tofu Game Engine Arbitrary Python Code Execution | High | Security Focus, Bugtraq ID: 14865, September 17, 20005 |
Firefox 1.0.6; | A vulnerability has been reported which could let a remote malicious user execute arbitrary commands via shell metacharacters in a URL. Upgrades available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Mozilla Browser/Firefox Arbitrary Command Execution | High | Security Focus Bugtraq ID: 14888, September 21, 2005 |
Firefox 0.x, 1.x | Multiple vulnerabilities have been reported: a vulnerability was reported due to an error because untrusted events generated by web content are delivered to the browser user interface; a vulnerability was reported because scripts in XBL controls can be executed even when JavaScript has been disabled; a vulnerability was reported because remote malicious users can execute arbitrary code by tricking the user into using the 'Set As Wallpaper' context menu on an image URL that is really a javascript; a vulnerability was reported in the 'InstallTrigger.install()' function due to an error in the callback function, which could let a remote malicious user execute arbitrary code; a vulnerability was reported due to an error when handling 'data:' URL that originates from the sidebar, which could let a remote malicious user execute arbitrary code; an input validation vulnerability was reported in the 'InstallVersion.compareTo()' function when handling unexpected JavaScript objects, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because it is possible for remote malicious user to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL; a vulnerability was reported due to an error when handling DOM node names with different namespaces, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported due to insecure cloning of base objects, which could let a remote malicious user execute arbitrary code.
Updates available at: Gentoo: Mandriva: Fedora: RedHat: Ubuntu: http://security.ubuntu.com/ http://security.ubuntu.com/ SUSE: Debian: http://security.debian. SGI: Gentoo: Slackware: Debian: Debian: Fedora: HP: Exploits have been published. | Firefox Multiple Vulnerabilities CAN-2005-2260 | High | Secunia Advisory: SA16043, July 13, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:120, July 13, 2005 Gentoo Linux Security Advisory, GLSA 200507-14, July 15, 2005 Gentoo Linux Security Advisory, GLSA 200507-17, July 18, 2005 Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:586-11, July 21, 2005 Slackware Security Advisory, SSA:2005-203-01, July 22, 2005 Ubuntu Security Notices, USN-155-1 & 155-2 July 26 & 28, 2005 Ubuntu Security Notices, USN-157-1 & 157-2 August 1& 2, 2005 SUSE Security Announcement, SUSE-SA:2005:045, August 11, 2005 Debian Security Advisory, DSA 775-1, August 15, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Debian Security Advisory, DSA 777-1, August 17, 2005 Debian Security Advisory, DSA 779-1, August 20, 2005 Debian Security Advisory, DSA 781-1, August 23, 2005 Gentoo Linux Security Advisory, GLSA 200507-24, August 26, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:127-1, August 26, 2005 Slackware Security Advisory, SSA:2005-085-01, August 28, 2005 Debian Security Advisory, DSA 779-2, September 1, 2005 Debian Security Advisory, DSA 810-1, September 13, 2005 Fedora Legacy Update Advisory, FLSA:160202, September 14, 2005 HP Security Bulletin, HPSBOV01229, September 19, 2005 |
Netscape 8.0.3.3, 7.2;
| A buffer overflow vulnerability has been reported due to an error when handling IDN URLs that contain the 0xAD character in the domain name, which could let a remote malicious user execute arbitrary code. Patches available at: RedHat: http://rhn.redhat.com/ Fedora: Ubuntu: Gentoo: A Proof of Concept exploit script has been published. | Mozilla/Netscape/ | High | Security Focus, Bugtraq ID: 14784, September 10, 2005 RedHat Security Advisories, 769-8 & RHSA-2005:768-6, September 9, 2005 Fedora Update Notifications, Ubuntu Security Notice, USN-181-1, September 12, 2005 Gentoo Linux Security Advisory GLSA 200509-11, September 18, 2005 |
NooTopList 1.0 .0.17 | An SQL injection vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'o' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | NooToplist SQL Injection | Medium | Security Tracker Alert ID: 1014931, September 19, 2005 |
Opera Web Browser 8.0-8.02 | An unspecified drag and drop and file upload vulnerability has been reported, which could possibly lead to the execution of arbitrary code in the context of the user running the browser.
Upgrades available at: Currently we are not aware of any exploits for this vulnerability. | Opera Web Browser Unspecified Drag & Drop File Upload | Medium | Security Focus, Bugtraq ID: 14884, September 20, 2005 |
Opera Web Browser 8.0 2 | Several vulnerabilities have been reported: a vulnerability was reported because attached files are opened without warnings, which could let a remote malicious user execute arbitrary JavaScript code; and a vulnerability was reported because filenames can be appended with an additional '.' which could let a remote malicious user spoof attachment names. Upgrade available at: There is no exploit code required. | Opera Mail Client Attachment Spoofing & Arbitrary JavaScript Execution | Medium | Secunia Advisory: SA16645, September 20, 2005 |
PHPNuke 7.8 | Multiple SQL injection vulnerabilities have been reported in the 'modules.php' due to insufficient sanitization of the 'name,' 'sid,' and 'pid' parameters, which could let a remote malicious user execute arbitrary SQL code. Upgrade available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPNuke Multiple SQL Injection | Medium | NewAngels Advisory #7, September 12, 2005 Security Focus, Bugtraq ID: 14815, September 14, 2005 |
Noah's Classifieds 1.3, 1.2 | Several vulnerabilities have been reported: an SQL injection vulnerability was reported in 'index.php' due to insufficient sanitization of the 'rollid'' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a Cross-Site Scripting vulnerability was reported in 'index.php' due to insufficient sanitization of the 'rollid' parameter, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | Noah's Classifieds SQL Injection & Cross-Site Scripting | Medium | Secunia Advisory: SA16826, September 15, 2005 |
Autolinks 2.1 | A vulnerability has been reported in 'al_initialize.php' due to insufficient verification of the 'alpath' parameter before used to include files, which could let a remote malicious user execute arbitrary code. The vendor has released Autolinks 2.1.1 to address this issue. A patch is available for prior releases as well. Please contact the vendor to obtain the upgrade or patch. There is no exploit code required; however, a Proof of Concept exploit has been published. | AutoLinks Pro Include File Remote Arbitrary Code Execution | High | NewAngels Advisory #1, August 28, 2005 Security Focus, Bugtraq ID: 14686, September 17, 2005 |
SquirrelMail 1.4.0-1.4.5-RC1. | A vulnerability has been reported in 'options_identities.php' because parameters are insecurely extracted, which could let a remote malicious user execute arbitrary HTML and script code, or obtain/manipulate sensitive information. Upgrades available at: Debian: RedHat: Apple: Fedora: Fedora: There is no exploit code required. | SquirrelMail Variable Handling | Medium | GulfTech Security Research Debian Security Advisory, RedHat Security Advisory, RHSA-2005:595-12, August 3, 2005 Apple Security Update 2005-007, Fedora Update Notifications, Fedora Legacy Update Advisory, FLSA:163047, September 15, 2005 |
SquirrelMail 1.4.0 through 1.4.4 | Multiple vulnerabilities have been reported that could let remote malicious users conduct Cross-Site Scripting attacks. Upgrade to 1.4.4 and apply patch: Gentoo: Mandriva: Debian: RedHat: Apple: Fedora: Fedora: There is no exploit code required. | SquirrelMail Cross-Site Scripting Vulnerabilities | Medium | SquirrelMail Advisory, June 15, 2005 Gentoo Linux Security Advisory, GLSA 200506-19, June 21, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:108, July 1, 2005 Debian Security Advisory , DSA 756-1, July 13, 2005 RedHat Security Advisory, RHSA-2005:595-12, August 3, 2005 Apple Security Update 2005-007, Fedora Update Notifications, Fedora Legacy Update Advisory, FLSA:163047, September 15, 2005 |
TWiki TWiki 20040902, 20040901, 20030201, 01-Dec-2001 | A vulnerability has been reported in '/cgi-bin/view/Main/ Patch available at: There is no exploit code required; however, a Proof of Concept exploit script has been published. | TWiki Remote Arbitrary Command Execution | High | Security Focus, Bugtraq ID: 14834, September 14, 2005 |
WordPress 1.5.3 & prior | A vulnerability has been reported in the 'cache_lastpostdata' parameter due to insufficient sanitization, which could let a remote malicious user execute arbitrary PHP script code. No workaround or patch available at time of publishing. An exploit script has been published. | WordPress PHP Code Execution | High | Secunia Advisory: SA16386, August 10, 2005 Security Focus, Bugtraq ID: 14533, September 17, 2005 |
Zebedee 2.4.1 | A remote Denial of Service vulnerability has been reported due to a failure to handle exceptional network requests. Upgrades available at: Gentoo: There is no exploit code required; however, an exploit script has been published. | Zebedee Remote Denial of Service | Low | Secunia Advisory: SA16788, September 12, 2005 Gentoo Linux Security Advisory, GLSA 200509-14, September 20, 2005 |
[back to top] Wireless
The section below contains wireless vulnerabilities, articles, and viruses/trojans identified during this reporting period.
- Hotspot Usage To Keep Growing: Study: According to a study released by the market research firm, In-Stat, the usage and number of wireless hotspots will continue to grow at a rapid rate.
The study predicted that the number of hotspots will nearly double, with almost 200,000 being available by the end of 2009. Source: http://www.mobilepipeline.com/showArticle.jhtml?articleID=171000071.
Wireless Vulnerabilities
- Cambridge Computer Corporation vxTftpSrv, a trivial ftp server for Windows CE devices, can reportedly be crashed or allow arbitrary code execution with an overly long filename.
- Cambridge Computer Corporation vxFtpSrv, an ftp server for Windows CE devices, can reportedly be crashed or allow arbitrary code execution with a special USER command triggering a buffer overflow.
- Cambridge Computer Corporation vxWeb, a web server for Windows CE devices, can reportedly be crashed with a special HTTP GET command triggering a buffer overflow.
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script | Script name | Workaround or Patch Available | Script Description |
September 20, 2005 | myspace-dyn0.txt | No | Exploitation details for the Myspace.com Cross-Site Scripting vulnerability. |
September 20, 2005 | twikivuln.txt | Yes | Detailed exploitation for the TWiki Remote Arbitrary Command Execution vulnerability. |
September 20, 2005 | yersinia-0.5.5.1.tgz | N/A | Yersinia implements several attacks for the following protocols: Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking (DTP), 802.1q and VLAN Trunking (VTP), helping a pen-tester with different tasks. |
September 19, 2005 | cutenxpl.php | No | Proof of Concept exploit for the CuteNews PHP Code Injection vulnerability. |
September 17, 2005 | php_vbulletin_template.pm | Yes | Exploit for the Jelsoft Enterprises vBulletin PHP Code Injection Vulnerability. |
September 17, 2005 | php_wordpress_lastpost.pm | No | Exploit for the WordPress PHP Code Execution vulnerability. |
[back to
top]
name=trends>Trends
- Keystrokes Reveal Passwords to Researchers: According to researchers at the University of California, Berkeley, a way to eavesdrop on your computer has been figured out simply by listening to the clicks and clacks of the keyboard. When processed by a computer, those seemingly random noises were translated with up to 96 percent accuracy. Source: http://abcnews.go.com/
Technology/wireStory?id=1143289. - Banks face customer exodus if hacked: According to a new survey by EDS, more than half of US banking customers would stop using their bank if it suffered a successful hacking attack. Source:
http://www.vnunet.com/vnunet/news/2142582/banks-face-consumer-exodus . - Serial typo-squatters target security firms: The computer security industry appears to have been targeted by a serial typo-squatter by registering domain names which are similar in all but one or two characters to the domains of companies such as Computer Associates, F-Secure, McAfee, MessageLabs and Symantec.
Symantec's Norton AntiVirus products appear to be the main target, with more than 100 variations registered, such as Nortonaantivirus.com.
Source: http://news.zdnet.com/2100-1009_22-5873001.html. - Mass-mailed email greeting card leads to malware infection, Sophos reports: SophosLabs experts are warning users of an electronic greeting card that has been spammed out to email addresses around the world, but really attempts to install a Trojan horse onto recipients' computers. Source: http://www.sophos.com/virusinfo/articles/ecard.html.
- Bagle variant floods inboxes worldwide: Businesses are being urged to update their antivirus protection after the author of a new Bagle variant, BagleDL-U Trojan, launched two mass spamming campaigns to spread the malware.
The Trojan is enclosed in an email that contains no header and the message reads 'new price' and contains a zipped attachment. Source: http://www.vnunet.com/vnunet/
news/2142560/bagle-author-tries-again. - Tremendous growth of cybercrime, report says: According to a survey conducted by Symantec. Corp. online criminal activity of nearly every variety surged in the first half of 2005. This was due to an increase in software security flaws and in the number of home computers being used against their owners' wishes to distribute spam, spyware and viruses. Source: http://www.crime-research.org/news/20.09.2005/1500/.
- Worm spoofs Google on infected PCs: A worm, P2Load-A, has been developed by virus writers that spoofs the behavior of internet search engine Google. The HOSTS file on infected PCs is replaced with a file downloaded from a remote website that is under the control of hackers. Source: http://www.securityfocus.com/news/11322.
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trend | Date |
face="Arial, Helvetica, sans-serif">Description |
1 | Netsky-P | Win32 Worm | Stable | March 2004 | A mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. The worm also tries to spread through various file-sharing programs by copying itself into various shared folders. |
2 | Zafi-D | Win32 Worm | Stable | December 2004 | A mass-mailing worm that sends itself to email addresses gathered from the infected computer. The worm may also attempt to lower security settings, terminate processes, and open a back door on the compromised computer. |
3 | Lovgate.w | Win32 Worm | Stable | April 2004 | A mass-mailing worm that propagates via by using MAPI as a reply to messages, by using an internal SMTP, by dropping copies of itself on network shares, and through peer-to-peer networks. Attempts to access all machines in the local area network. |
4 | Zafi-B | Win32 Worm | Stable | June 2004 | A mass-mailing worm that spreads via e-mail using several different languages, including English, Hungarian and Russian. When executed, the worm makes two copies of itself in the %System% directory with randomly generated file names. |
5 | Netsky-Q | Win32 Worm | Stable | March 2004 | A mass-mailing worm that attempts to launch Denial of Service attacks against several web pages, deletes the entries belonging to several worms, and emits a sound through the internal speaker. |
6 | Mytob.C | Win32 Worm | Stable | March 2004 | A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the Windows LSASS (MS04-011) exploit. The worm will attempt to harvest email addresses from the local hard disk by scanning files. |
7 | Mytob-AS | Win32 Worm | Stable | June 2005 | A slight variant of the mass-mailing worm that disables security related programs and processes, redirection various sites, and changing registry values. This version downloads code from the net and utilizes its own email engine. |
8 | Netsky-D | Win32 Worm | Stable | March 2004 | A simplified variant of the Netsky mass-mailing worm in that it does not contain many of the text strings that were present in NetSky.C and it does not copy itself to shared folders. Netsky.D spreads itself in e-mails as an executable attachment only. |
9 | Netsky-Z | Win32 Worm | Stable | April 2004 | A mass-mailing worm that is very close to previous variants. The worm spreads in e-mails, but does not spread to local network and P2P and does not uninstall Bagle worm. The worm has a backdoor that listens on port 665. |
10 | Mytob-BE | Win32 Worm | Stable | June 2005 | A slight variant of the mass-mailing worm that utilizes an IRC backdoor, LSASS vulnerability, and email to propagate. Harvesting addresses from the Windows address book, disabling antivirus, and modifying data. |
Table Updated September 21, 2005
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.