U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.

TLP:WHITE

Bulletin (SB04-049)

Summary of Security Items from February 4 through February 17, 2004

Original release date: February 17, 2004

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

  • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

  • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

Publications by US-CERT | Publications by Vendors | Publications by Third Parties


Publications by US-CERT

Vulnerabilities in Microsoft ASN.1 Library

Multiple integer overflow vulnerabilities in the Microsoft Windows ASN.1 parser library could allow an unauthenticated, remote attacker to execute arbitrary code with SYSTEM privileges.

Vulnerabilities in Check Point Firewall-1

Both the AI and HTTP Security Server features of Firewall-1 contain an HTTP parsing vulnerability that is triggered by sending an invalid HTTP request through the firewall. This vulnerability allows remote attackers to execute arbitrary code on affected firewalls with administrative privileges, typically "SYSTEM" or "root".

VU#277396: GNU Radius accounting service fails to properly handle exceptional Acct-Status-Type and Acct-Session-Id attributes
The GNU Radius accounting service fails to properly handle packets with exceptional Acct-Status-Type and Acct-Session-Id attributes.

VU#473814: Multiple Real media players vulnerable to buffer overflow when parsing crafted media files
Multiple Real media players vulnerable to buffer overflow when parsing certain media files which may permit an attacker to execute arbitrary code on the user's system.

VU#473902: Multiple Real media players fail to properly validate SMIL files
Multiple Real media players fail to properly validate synchronized multimedia integration language (SMIL) files which may permit a remote attacker to gain sensitive information.

VU#514734: Multiple Real media players fail to properly validate RMP files
Multiple Real media players fail to properly validate RealJukebox Metadata Package (RMP) files which may permit an attacker to download and execute arbitrary code on the user's system.

VU#873334: Check Point ISAKMP vulnerable to buffer overflow via Certificate Request
A buffer overflow vulnerability exists in the Internet Security Association and Key Management Protocol (ISAKMP) implementation used in Check Point VPN-1, SecuRemote, and SecureClient products. An unauthenticated, remote attacker could execute arbitrary code with the privileges of the ISAKMP process, typically root or SYSTEM.

Back to top



Publications by Vendors

Conectiva

Debian

Fedora

FreeBSD

Gentoo

Hewlett Packard

Mandrake

Microsoft

Novell

OpenBSD

Red Hat

SGI

Slackware

Sun Microsystems

Trustix

Turbolinux

Back to top



Publications by Third Parties

AusCERT

F-Secure

ISS

Network Associates

SANS

Sophos

Symantec

Trend Micro

UNIRAS


Copyright 2004 Carnegie Mellon University. Terms of use
Last updated
Publications by US-CERT | Publications by Vendors | Publications by Third Parties


Publications by US-CERT

Vulnerabilities in Microsoft ASN.1 Library

Multiple integer overflow vulnerabilities in the Microsoft Windows ASN.1 parser library could allow an unauthenticated, remote attacker to execute arbitrary code with SYSTEM privileges.

Vulnerabilities in Check Point Firewall-1

Both the AI and HTTP Security Server features of Firewall-1 contain an HTTP parsing vulnerability that is triggered by sending an invalid HTTP request through the firewall. This vulnerability allows remote attackers to execute arbitrary code on affected firewalls with administrative privileges, typically "SYSTEM" or "root".

VU#277396: GNU Radius accounting service fails to properly handle exceptional Acct-Status-Type and Acct-Session-Id attributes
The GNU Radius accounting service fails to properly handle packets with exceptional Acct-Status-Type and Acct-Session-Id attributes.

VU#473814: Multiple Real media players vulnerable to buffer overflow when parsing crafted media files
Multiple Real media players vulnerable to buffer overflow when parsing certain media files which may permit an attacker to execute arbitrary code on the user's system.

VU#473902: Multiple Real media players fail to properly validate SMIL files
Multiple Real media players fail to properly validate synchronized multimedia integration language (SMIL) files which may permit a remote attacker to gain sensitive information.

VU#514734: Multiple Real media players fail to properly validate RMP files
Multiple Real media players fail to properly validate RealJukebox Metadata Package (RMP) files which may permit an attacker to download and execute arbitrary code on the user's system.

VU#873334: Check Point ISAKMP vulnerable to buffer overflow via Certificate Request
A buffer overflow vulnerability exists in the Internet Security Association and Key Management Protocol (ISAKMP) implementation used in Check Point VPN-1, SecuRemote, and SecureClient products. An unauthenticated, remote attacker could execute arbitrary code with the privileges of the ISAKMP process, typically root or SYSTEM.

Back to top



Publications by Vendors

Conectiva

Debian

Fedora

FreeBSD

Gentoo

Hewlett Packard

Mandrake

Microsoft

Novell

OpenBSD

Red Hat

SGI

Slackware

Sun Microsystems

Trustix

Turbolinux

Back to top



Publications by Third Parties

AusCERT

F-Secure

ISS

Network Associates

SANS

Sophos

Symantec

Trend Micro

UNIRAS


Copyright 2004 Carnegie Mellon University. Terms of use
Last updated

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top