Summary of Security Items from August 17 through August 23, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, therefore the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
Note: Even though a vulnerability may allow several malicious acts to be performed, only the highest level risk will be defined in the Risk column.
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Windows Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
ACNews | A vulnerability has been reported in ACNews that could let remote malicious users disclose sensitive information. No workaround or patch available at time of publishing. There is no exploit code required. | ACNews Information Disclosure | Medium | Security Tracker, Alert ID: 1014749, August 22, 2005 |
CiscoWorks Monitoring Center for Security 1.2 to 2.1 CiscoWorks Management Center for IDS Sensors 2.0, 2.1 | A vulnerability has been reported in CiscoWorks Monitoring Center for Security and CiscoWorks Management Center for IDS Sensors that could let local malicious users spoof or disclose information. Vendor patch available: Currently we are not aware of any exploits for these vulnerabilities. | CiscoWorks Information Spoofing or Disclosure | Medium | Cisco Security Advisory, ID: 66142, August 22, 2005 |
Whisper 32 1.16 | A vulnerability has been reported in Whisper 32 that could let local malicious users disclose password information. No workaround or patch available at time of publishing. There is no exploit code required. | Whisper 32 Password Disclosure | Medium | Security Tracker, Alert ID: 1014730, August 18, 2005 |
Internet Explorer 5.5, 6 | A vulnerability has been reported in Internet Explorer ('msdds.dll' COM Object) that could let remote malicious users execute arbitrary code. Vendor workarounds available: An exploit script has been published. | High | Microsoft Security Advisory 906267, August 18, 2005 | |
Plug and Play | A vulnerability has been reported in Plug and Play that could let local or remote malicious users execute arbitrary code or obtain elevated privileges. Vendor fix available: Vendor has provided additional information: Exploit scripts have been published and worm, "Worm:Win32/Zotob.A", is circulating. | Microsoft Plug and Play Arbitrary Code Execution or Elevated Privileges | High | Microsoft Security Bulletin MS05-039, August 9, 2005 Microsoft Security Advisory, 899588, August 15, 2005 Microsoft Security Advisory, 906574, August 23, 3005 |
Chris Moneymaker's World Poker Championship V1.0 | A buffer overflow vulnerability has been reported in Chris Moneymaker's World Poker Championship that could let remote malicious users execute arbitrary code. Vendor will not be creating a bugfix for this issue. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Chris Moneymaker's World Poker Championship Arbitrary Code Execution | High | Security Tracker, Alert ID: 1014738, August 19, 2005 |
VPN Client 4.86_033, 4.91_021, 5.01_030 | A vulnerability has been reported in VPN Client that could let local malicious users obtain elevated privileges. Contact vendor for upgrade to version 5.01_103. There is no exploit code required. | Nortel VPN Client Privilege Elevation | Medium | Nortel Security Advisory 2005006143 V2, August 18, 2005 |
Process Explorer 9.23 | A buffer overflow vulnerability has been reported in Process Explorer that could let remote malicious users execute arbitrary code. Update available at: There is no exploit code required; however, Proof of Concept exploits have been published. | Process Explorer Arbitrary Code Execution | High | Security Tracker Alert ID: 1014742, August 19, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Adobe Version Cue 1.0.1, 1.0 | A vulnerability has been reported due to insecure file permissions on internal Version Cue application files, which could let a malicious user obtain elevated privileges. Patches available at: Currently we are not aware of any exploits for this vulnerability. | Adobe Version Cue for Mac OS X Elevated Privileges | Medium | Security Focus, Bugtraq ID: 14638, August 23, 2005 |
MacOS X 10.3.9, 10.4.2 | Multiple vulnerabilities have been reported: a buffer overflow vulnerability was reported in AppKit, which could let a remote malicious user execute arbitrary code via a crafted Rich Text Format (RTF) file; a buffer overflow vulnerability was reported in AppKit, which could let a remote malicious user execute arbitrary code via a crafted Microsoft Word file; a buffer overflow vulnerability has been reported in the Directory Service's authentication process, which could let a remote malicious user execute arbitrary code; a vulnerability was reported in Safari when rendering Rich Text Format (RTF) files, which could let a remote malicious user execute arbitrary code; a buffer overflow vulnerability was reported in 'servermgrd,' which could let a remote malicious user execute arbitrary code during authentication; and a vulnerability was reported in Safari WebKit when directly accessing URLs that are in PDF files without normal security checks, which could let a remote malicious user execute arbitrary code; Update information available at: Currently we are not aware of any exploits for these vulnerabilities. | Apple Mac OS X Multiple Arbitrary Code Execution Vulnerabilities CAN-2005-2501 | High | Apple Security Update 2005-007, |
BlueZ 2.18 & prior | A vulnerability has been reported due to insufficient sanitization of input passed as a remote device name, which could let a remote malicious user execute arbitrary code. Upgrades available at: Gentoo: Debian: There is no exploit code required. | BlueZ Arbitrary Command Execution
| High | Security Focus 14572, August 16, 2005 Gentoo Linux Security Advisory, GLSA 200508-09, August 17, 2005 Debian Security Advisory, DSA 782-1, August 23, 2005 |
Clam AntiVirus 0.86.1 | Multiple vulnerabilities have been reported in Clam AntiVirus that could let remote malicious users cause a Denial of Service. Upgrade to version 0.86.2: Conectiva: Mandriva: Gentoo: SUSE: Debian: Currently we are not aware of any exploits for these vulnerabilities. | Clam AntiVirus Multiple Vulnerabilities | Low | Secunia, Advisory: SA16180, July 25, 2005 Gentoo Linux Security Advisory GLSA 200507-25, July 26, 2005 Mandriva Security Advisory, MDKSA-2005:125, July 27, 2005 SUSE Security Summary Report, SUSE-SR:2005:018, July 28, 2005 Conectiva Linux Announce- Debian Security Advisory, DSA 776-1, August 16, 2005 |
ELM 2.5.5-2.5.7
| A buffer overflow vulnerability has been reported due to insufficient parsing of SMTP 'Expires' header lines, which could let a remote malicious user execute arbitrary code. Update to Elm 2.5 PL8 available at: An exploit script has been published. | Elm 'Expires' Header Remote Buffer Overflow | High | Security Tracker Alert ID: 1014745, August 20, 2005 |
Fetchmail 6.2.5 | A remote buffer overflow vulnerability has been reported in the POP3 client due to insufficient boundary checks, which could let a malicious user obtain elevated privileges. Fedora: Redhat: Ubuntu: Gentoo: Debian: SGI: TurboLinux: Currently we are not aware of any exploits for this vulnerability. | Fetchmail POP3 Client Buffer Overflow | Medium | Fedora Update Notifications, Redhat Security Advisory, RHSA-2005:640-08, July 25, 2005 Ubuntu Security Notice, USN-153-1, July 26, 2005 Gentoo Security Advisory, GLSA 200507-21, July 25, 2005 Debian Security Advisory, DSA 774-1, August 12, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Turbolinux Security Advisory, TLSA-2005-84, August 18, 2005 |
cpio 1.0-1.3, 2.4.2, 2.5, 2.5.90, 2.6 | A vulnerability has been reported when an archive is extracted into a world or group writeable directory because non-atomic procedures are used, which could let a malicious user modify file permissions. Trustix: Mandriva: RedHat: SGI: SCO: There is no exploit code required. | Medium | Bugtraq, 395703, Trustix Secure Linux Security Advisory, TSLSA-2005-0030, June 24, 2005 Mandriva RedHat Security Advisory, RHSA-2005:378-17, July 21, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 SCO Security Advisory, SCOSA-2005.32, August 18, 2005 | |
cpio 2.6 | A Directory Traversal vulnerability has been reported when invoking cpio on a malicious archive, which could let a remote malicious user obtain sensitive information. Gentoo: Trustix: Mandriva: SCO: A Proof of Concept exploit has been published. | Medium | Bugtraq, Gentoo Linux Security Advisory, GLSA Trustix Secure Mandriva Linux Security Update Advisory, MDKSA2005: SCO Security Advisory, SCOSA-2005.32, August 18, 2005 | |
shtool 2.0.1 & prior | A vulnerability has been reported that could let a local malicious user gain escalated privileges. The vulnerability is caused due to temporary files being created insecurely. Gentoo: OpenPKG: RedHat: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> SGI: Ubuntu: There is no exploit code required. | GNU shtool Insecure | Medium | Secunia Advisory, SA15496, Gentoo Linux Security Advisory, GLSA 200506 OpenPKG Trustix Secure Linux Security Advisory, SGI Security Advisory, 20050703-01-U, July 15, 2005 Ubuntu Security Notice, USN-171-1, August 20, 2005 |
ViRobot Linux Server 2.0, ViRobot Expert 4.0 , ViRobot Advanced Server, | Several vulnerabilities have been reported: a Directory Traversal vulnerability was reported due to insufficient validation of filenames in compressed archives before extracting into a temporary directory, which could let a remote malicious user write files to arbitrary directories on the target system; and a buffer overflow vulnerability Upgrades available at: There is no exploit code required. | HAURI Anti-Virus Compressed Files Directory Traversal & Buffer Overflow | High | Security Tracker Alert ID: 1014740, August 20, 2005 |
KDE 3.0 - 3.4.2 | A vulnerability was reported in 'langen2kvtml' due to the insecure creation of temporary files, which could let malicious user obtain elevated privileges.
Patches available at: Fedora: Fedora: There is no exploit code required. | KDE langen2kvtml Insecure Temporary File Creation | Medium | KDE Security Advisory, August 15, 2005 Fedora Update Notification, Fedora Update Notifications, |
lm_sensors 2.9.1 | A vulnerability has been reported in the 'pwmconfig' script due to the insecure creation of temporary files, which could result in a loss of data or a Denial of Service. Ubuntu: There is no exploit code required. | LM_sensors PWMConfig Insecure Temporary File Creation | Low | Security Focus, Bugtraq ID: 14624, August 22, 2005 Ubuntu Security Notice, USN-172-1, August 23, 2005 |
MediaWiki 1.4.5 | A vulnerability has been reported in MediaWiki that could let remote malicious users perform Cross-Site Scripting attacks. Update to version 1.4.6: SUSE: There is no exploit code required. | MediaWiki Cross Site Scripting | Medium | Security Focus, 14181, July 7, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 |
Kismet 2005-07-R1 | Multiple vulnerabilities have been reported: an integer underflow vulnerability was reported when handling pcap files; a vulnerability was reported due to an unspecified error when handling non-printable characters in SSID; and a integer underflow vulnerability was reported in the data frame dissection, which could possibly lead to the execution of arbitrary code. Upgrade available at: Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | Kismet Multiple Remote Vulnerabilities | High | Security Focus, Bugtraq ID 14430, August 16, 2005 Gentoo Linux Security Advisory, GLSA 200508-10, August 19, 2005 |
Glyph and Cog Xpdf 3.0, pl2 & pl3; Ubuntu Linux 5.0 4 powerpc, i386, amd64; | A remote Denial of Service vulnerability has been reported when verifying malformed 'loca' table in PDF files. RedHat: http://rhn.redhat.com/ http://rhn.redhat.com/ Ubuntu: KDE: Mandriva: SGI: Gentoo: Fedora: Debian: Currently we are not aware of any exploits for this vulnerability. | Low | RedHat Security Advisories, RHSA-2005:670-05 & RHSA-2005:671-03, & RHSA-2005:708-05, August 9, 2005 Ubuntu Security Notice, USN-163-1, August 09, 2005 KDE Security Advisory, 20050809-1, August 9, 2005 Mandriva Linux Security Update Advisories, MDKSA-2005:134, 135, 136 & 138, August 11, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Gentoo Linux Security Advisory GLSA, 200508-08, August 16, 2005 Fedora Update Notifications, Debian Security Advisory, DSA 780-1, August 22, 2005 | |
SuSE Linux Professional | A buffer overflow vulnerability has been reported in the XFRM network architecture code due to insufficient validation of user-supplied input, which could let a malicious user execute arbitrary code. Patches available at: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel XFRM Array Index Buffer Overflow | High | Security Focus, 14477, August 5, 2005 Ubuntu Security Notice, USN-169-1, August 19, 2005 |
zlib 1.2.2, 1.2.1, 1.2 .0.7, 1.1-1.1.4, 1.0-1.0.9; Ubuntu Linux 5.0 4, powerpc, i386, amd64, 4.1 ppc, ia64, ia32; SuSE Open-Enterprise-Server 9.0, Novell Linux Desktop 9.0, Linux Professional 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Personal 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Enterprise Server 9; Gentoo Linux; | A buffer overflow vulnerability has been reported due to insufficient validation of input data prior to utilizing it in a memory copy operation, which could let a remote malicious user execute arbitrary code. Debian: FreeBSD: Gentoo: SUSE: Ubuntu: Mandriva: OpenBSD: OpenPKG: RedHat: Trustix: Slackware: TurboLinux: Fedora: zsync: Apple: SCO: Currently we are not aware of any exploits for this vulnerability. | Zlib Compression Library Buffer Overflow | High | Debian Security Advisory FreeBSD Security Advisory, Gentoo Linux Security Advisory, GLSA 200507- SUSE Security Announcement, SUSE-SA:2005:039, Ubuntu Security Notice, RedHat Security Advisory, RHSA-2005:569-03, Fedora Update Notifications, Mandriva Linux Security Update Advisory, OpenPKG Trustix Secure Slackware Security Turbolinux Security Fedora Update Notification, FEDORA-2005-565, July 13, 2005 SUSE Security Summary Security Focus, 14162, July 21, 2005 USCERT Vulnerability Note VU#680620, July 22, 2005 Apple Security Update 2005-007, SCO Security Advisory, SCOSA-2005.33, August 19, 2005 |
zlib 1.2.2, 1.2.1; Ubuntu Linux 5.04 powerpc, i386, amd64, | A remote Denial of Service vulnerability has been reported due to a failure of the library to properly handle unexpected compression routine input. Zlib: Debian: Ubuntu: OpenBSD: Mandriva: Fedora: Slackware: FreeBSD: SUSE: Gentoo: http://security.gentoo.org/ Trustix: Conectiva: Apple: TurboLinux: SCO: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendor Zlib Compression Library Decompression Remote Denial of Service | Low | Security Focus, Bugtraq ID 14340, July 21, 2005 Debian Security Advisory DSA 763-1, July 21, 2005 Ubuntu Security Notice, USN-151-1, July 21, 2005 OpenBSD, Release Errata 3.7, July 21, 2005 Mandriva Security Advisory, MDKSA-2005:124, July 22, 2005 Secunia, Advisory: SA16195, July 25, 2005 Slackware Security Advisory, SSA:2005- FreeBSD Security Advisory, SA-05:18, July 27, 2005 SUSE Security Announce- Gentoo Linux Security Advisory, GLSA 200507-28, July 30, 2005 Gentoo Linux Security Advisory, GLSA 200508-01, August 1, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0040, August 5, 2005 Conectiva Linux Announcement, CLSA-2005:997, August 11, 2005 Apple Security Update, APPLE-SA-2005-08-15, August 15, 2005 Turbolinux Security Advisory , TLSA-2005-83, August 18, 2005 SCO Security Advisory, SCOSA-2005.33, August 19, 2005 |
FileZilla Server 0.7, 0.7.1; OpenBSD -current, 3.5; | A remote Denial of Service vulnerability exists during the decompression process due to a failure to handle malformed input. Gentoo:
href="http://security.gentoo.org/glsa/glsa-200408-26.xml"> FileZilla:
href="http://sourceforge.net/project/showfiles.php?group_id=21558"> OpenBSD: OpenPKG: Trustix:
href="ftp://ftp.trustix.org/pub/trustix/updates/ "> SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Mandrake: Conectiva: SCO:
href="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.17"> Fedora: FedoraLegacy: SCO: We are not aware of any exploits for this vulnerability. | Low | Security Focus, August 25, 2004 SUSE Security Announcement, SUSE-SA:2004:029, September 2, 2004 Mandrakelinux Security Update Advisory, MDKSA-2004:090, September 8, 2004 Conectiva Linux Security Announcement, CLA-2004:865, September 13, 2004 US-CERT VU#238678, October 1, 2004 SCO Security Advisory, SCOSA-2004.17, October 19, 2004 Conectiva Linux Security Announcement, CLA-2004:878, October 25, 2004 Fedora Update Notification, Fedora Legacy Update Advisory, FLSA:2043, February 24, 2005 SCO Security Advisory, SCOSA-2005.33, August 19, 2005 | |
Linux Kernel | Several vulnerabilities have been reported: a vulnerability was reported in raw character devices (raw.c) because the wrong function is called before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space; and a vulnerability was reported in the 'pkt_ioctl' function in the 'pktcdvd' block device ioctl handler Update available at:
href="http://kernel.org/"> Ubuntu: Mandriva: RedHat: Conectiva: A Proof of Concept Denial of Service exploit script has been published. | High | Secunia Advisory, SA15392, May 17, 2005 Ubuntu Security Notice, USN-131-1, May 23, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:110, July 1, 2005 RedHat Security Advisory, Conectiva Linux Announcement, CLSA-2005:999, August 17, 2005 | |
Linux kernel 2.2.x, 2.4.x, 2.6.x | A buffer overflow vulnerability has been reported in the 'elf_core_dump()' function due to a signedness error, which could let a malicious user execute arbitrary code with ROOT privileges. Update available at:
href="http://kernel.org/"> Trustix: Ubuntu: RedHat: Avaya:
href="http://support.avaya.com/elmodocs2/security/ASA-2005-120_RHSA-2005-283_RHSA-2005-284_RHSA-2005-293_RHSA-2005-472.pdf"> SUSE: Trustix: Mandriva: Conectiva: An exploit script has been published. | High | Secunia Advisory, SA15341, May 12, 2005 Trustix Secure Linux Security Advisory, 2005-0022, May 13, 2005 Ubuntu Security Notice, USN-131-1, May 23, 2005 RedHat Security Advisory, RHSA-2005:472-05, May 25, 2005 Avaya Security Advisory, ASA-2005-120, June 3, 2005 Trustix Secure Linux Bugfix Advisory, TSLSA-2005-0029, June 24, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:110 & 111, June 30 & July 1, 3005 Conectiva Linux Announcement, CLSA-2005:999, August 17, 2005 | |
Linux kernel 2.6-2.6.12 .1 | A vulnerability has been reported due to insufficient authorization before accessing a privileged function, which could let a malicious user bypass IPSEC policies.
Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel IPSec Policies Authorization Bypass | Medium | Ubuntu Security Notice, USN-169-1, August 19, 2005 Security Focus, Bugtraq ID 14609, August 19, 2005 |
Linux kernel | Several vulnerabilities have been reported: a Denial of Service vulnerability was reported due to an error when handling key rings; and a Denial of Service vulnerability was reported in the 'KE YCTL_JOIN_SESSION Patches available at: Outhunt: There is no exploit code required. | Linux Kernel Management Denials of Service | Low | Secunia Advisory: SA16355, August 9, 2005 Ubuntu Security Notice, USN-169-1, August 19, 2005 |
ncpfs 2.2.1 - 2.2.4 | A buffer overflow exists that could lead to local execution of arbitrary code with elevated privileges. The vulnerability is in the handling of the '-T' option in the ncplogin and ncpmap utilities, which are both installed as SUID root by default. Gentoo: Update to 'net-fs/ncpfs-2.2.5' or later SUSE: Apply updated packages. Updated packages are available via YaST Online Update or the SUSE FTP site. Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" Fedora: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors ncpfs: ncplogin and ncpmap Buffer Overflow | High | Gentoo Linux Security Advisory, GLSA 200412-09 / ncpfs, December 15, 2004 Secunia SA13617, December 22, 2004 Mandrakelinux Security Update Advisory, MDKSA-2005:028, February 2, 2005 Fedora Update Notification |
Novell Evolution 2.0.2-2.0.4; LibTIFF 3.6.1; sy Software Products CUPS 1.1.12-1.1.23, 1.1.10, 1.1.7, 1.1.6, 1.1.4 -5, 1.1.4-3, 1.1.4 -2, 1.1.4, 1.1.1, 1.0.4 -8, 1.0.4; Ubuntu 4.10, 5.04 | A remote Denial of Service vulnerability has been reported due to insufficient validation of specific header values. Libtiff: Ubuntu: Mandriva: A Proof of Concept exploit has been published. | LibTiff Tiff Image Header Remote Denial of Service
| Low | Security Focus Bugtraq ID 14417, July 29, 2005 Ubuntu Security Notice, USN-156-1, July 29, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:142, August 18, 2005 |
Ubuntu Linux 4.1 ppc, ia64, ia32; | A remote Denial of Service vulnerability has been reported when handling UDP packets received by SNMPD due to a NULL pointer dereference. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel SNMP Handler Remote Denial of Service | Low | Ubuntu Security Notice, USN-169-1, August 19, 2005 |
Ubuntu Linux 5.0 4 powerpc, i386, amd64, 4.1 ppc, ia64, ia32; | A remote Denial of Service vulnerability has been reported in the kernel driver for compressed ISO file systems when attempting to mount a malicious compressed ISO image. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel ISO File System Remote Denial of Service | Low | Ubuntu Security Notice, USN-169-1, August 19, 2005 |
Ubuntu Linux 5.0 4 powerpc, i386, amd64, | Several vulnerabilities have been reported: a buffer overflow vulnerability was reported due to the way away messages are handled, which could let a remote malicious user execute arbitrary code; and a remote Denial of Service vulnerability has been reported due to an error when handling file transfers. Updates available at: http://gaim.sourceforge.net/ RedHat: http://rhn.redhat.com/errata/ Ubuntu: Gentoo: SGI: Mandriva: Fedora: SUSE: A Proof of Concept exploit has been published for the buffer overflow vulnerability. | Gaim AIM/ICQ Protocols Buffer Overflow & Denial of Service | High | RedHat Security Advisories, RHSA-2005:589-16 & RHSA-2005:627-11, August 9, 2005 Ubuntu Security Notice, USN-168-1, August 12, 2005 Gentoo Linux Security Advisory, GLSA 200508-06, August 15, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:139, August 16, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 |
Ubuntu Linux 5.0 4 powerpc, i386, amd64, 4.1 ppc, ia64, ia32;
| Multiple format string vulnerabilities have been reported: a vulnerability was reported when vCard information is attached to an email message, which could let a remote malicious user execute arbitrary code; a vulnerability was reported when specially crafted contact data that has been retrieved from an LDAP server is displayed, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported when specially crafted task list data that has been retrieved from remote servers and the data has been saved under the 'Calendars' tab is displayed, which could let a remote malicious user execute arbitrary code. Updates available at: Ubuntu: Mandriva: SUSE: Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | High | Secunia Advisory: SA16394, August 11, 2005 Ubuntu Security Notice, USN-166-1, August 11, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:141, August 18, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 Gentoo Linux Security Advisory, GLSA 200508-12, August 23, 2005 | |
Mutt 1.5.10 | A buffer overflow vulnerability has been reported in 'Handler.c' in the 'mutt_decode_xbit() function,' which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Mutt Handler.c Buffer Overflow | High | Security Tracker Alert ID: 1014729, August 18, 2005 |
netpbm 10.0 | A vulnerability has been reported in netpbm ('-dSAFER') that could let malicious users execute arbitrary postscript code. Trustix: Gentoo: Mandriva: Ubuntu: Fedora: SUSE: RedHat: There is no exploit code required. | netpbm Arbitrary Code Execution | High | Secunia Advisory: SA16184, July 25, 2005 Trustix Secure Linux Security Advisory, #2005-0038, July 29, 2005 Gentoo Linux Security Advisory, GLSA 200508-04, August 5, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:133, August 10, 2005 Ubuntu Security Notice, USN-164-1, August 11, 2005 Fedora Update Notifications, SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 RedHat Security Advisory, RHSA-2005:743-08, August 22, 2005 |
PCRE 6.1, 6.0 , 5.0 | A vulnerability has been reported in 'pcre_compile.c' due to an integer overflow, which could let a remote/local malicious user potentially execute arbitrary code. Updates available at: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | PCRE Regular Expression Heap Overflow | High | Secunia Advisory: SA16502, August 22, 2005 Ubuntu Security Notice, USN-173-1, August 23, 2005 |
ncpfs prior to 2.2.6 | Two vulnerabilities exist: a vulnerability exists in 'ncpfs-2.2.0.18/lib/ncplib.c' due to improper access control in the 'ncp_fopen_nwc()' function, which could let a malicious user obtain unauthorized access; and a buffer overflow vulnerability exists in 'ncpfs-2.2.5/sutil/ncplogin.c' due to insufficient validation of the 'opt_set_volume_after_ Update available at:
href=" ftp://platan.vc.cvut.cz/pub/linux/ncpfs/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200501-44.xml"> Debian:
href="http://www.debian.org/security/2005/dsa-665"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php" SUSE: RedHat: Fedora: An exploit script has been published. | High
| Security Tracker Alert ID: 1013019, January 28, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:028, February 2, 2005 Debian Security Advisory, DSA-665-1, February 4, 2005 SUSE Security Summary Report, SUSE-SR:2005:003, February 4, 2005 RedHat Security Advisory, RHSA-2005:371-06, May 17, 2005 Fedora Update Notification | |
ProFTPd | Multiple format string vulnerabilities have been reported in ProFTPd that could let remote malicious users cause a Denial of Service or disclose information. Upgrade to version 1.3.0rc2: Gentoo: Trustix: TurboLinux: Mandriva: Currently we are not aware of any exploits for these vulnerabilities. | ProFTPD Denial of Service or Information Disclosure | Medium | Secunia, Advisory: SA16181, July 26, 2005 Gentoo Linux Security Advisory, GLSA 200508-02, August 1, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0040, August 5, 2005 Turbolinux Security Advisory, TLSA-2005-82, August 9, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:140, August 16, 2005 |
Tor 0.1.0.13 & prior | A vulnerability has been reported when performing a Diffie-Hellman handshake due to a failure to reject certain weak keys, which could let a remote malicious user obtain sensitive information. Update available at: Currently we are not aware of any exploits for this vulnerability. | Tor Weak Diffie-Hellman Handshake | Medium | Secunia Advisory: SA16424, August 19, 2005 |
Vim V6.3.082 | A vulnerability has been reported in Vim that could let remote malicious users execute arbitrary code. Vendor patch available: Ubuntu: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Fedora: Conectiva: Mandriva: RedHat: There is no exploit code required; however, Proof of Concept exploits have been published. | Vim Arbitrary Code Execution | High | Security Focus, 14374, July 25, 2005 Ubuntu Security Notice, USN-154-1, July 26, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0038, July 29, 2005 Fedora Update Notifications, Conectiva Security Advisory, CLSA-2005:995, Mandriva Linux Security Update Advisory, MDKSA-2005:148, August 22, 2005 RedHat Security, Advisory, RHSA-2005:745-10, August 22, 2005 |
Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Acrobat 5.x, 6.x, 7.x, Acrobat Reader 5.x, 6.x, 7.x | A buffer overflow vulnerability has been reported in the core application plug-in due to an unspecified boundary error, which could let a remote malicious user execute arbitrary code. Update information available at: Gentoo: SUSE: There is no exploit code required. | Adobe Acrobat / Reader Plug-in Buffer Overflow | High | Adobe Security Advisory, August 16, 2005 Gentoo Linux Security Advisory, GLSA 200508-11, August 19, 2005 SUSE Security Announcement, SUSE-SA:2005:047, August 22, 2005 |
Apache | A vulnerability has been reported in Apache which can be exploited by remote malicious user to smuggle http requests. Conectiva: Fedora: Mandriva: http://security.ubuntu.com/ TurboLinux: SGI: SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Currently we are not aware of any exploits for these vulnerabilities. | Apache HTTP Request Smuggling Vulnerability CAN-2005-1268 | Medium | Secunia, Advisory: SA14530, July 26, 2005 Conectiva, CLSA-2005:982, July 25, 2005 Fedora Update Notification Mandriva Linux Security Update Advisory, MDKSA-2005:129, August 3, 2005 Ubuntu Security Notice, USN-160-1, August 04, 2005 Turbolinux Security Advisory, TLSA-2005-81, August 9, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 SUSE Security Announcement, SUSE-SA:2005:046, August 16, 2005 |
ATutor 1.5.1 | A Cross-Site Scripting vulnerability has been reported in 'login.php' due to insufficient sanitization of the 'course' parameter and in 'search.php' due to insufficient sanitization of the 'words' parameter, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | ATutor Cross-Site Scripting | Medium | Secunia Advisory: SA16496, August 19, 2005 |
BBCaffe 2.0 | A Cross-Site Scripting vulnerability has been reported in several scripts due to insufficient filtering of HTML code, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required. | BBCaffe Cross-Site Scripting | Medium | Security Focus, Bugtraq ID 14602, August 18, 2005 |
WebLogic Portal 8.1, SP1-SP4 | A vulnerability has been reported when enforcing user entitlements, which could let an unauthorized remote malicious user access entitled pages. Patches available at: There is no exploit code required. | BEA WebLogic Portal Access Validation | Medium | BEA Security Advisory, BEA05-84.00, August 22, 2005 |
SaveWebPortal 3.4 | Multiple vulnerabilities have been reported: a vulnerability was reported in the '/admin/PhpMyExplorer/ No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | SaveWebPortal Multiple Vulnerabilities | High | Secunia Advisory: SA16522, August 23, 2005 |
Cisco Clean Access (CCA) 3.5-3.5.3, 3.4-3.4.5, 3.3 | A vulnerability has been reported in the CCA Application Program Interface (API) because authentication is not performed, which could let a remote malicious user bypass security, make configuration changes, or obtain sensitive information. Patches available at: Currently we are not aware of any exploits for this vulnerability. | Cisco Clean Access API Access Validation href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2631">CAN-2005-2631 | Medium | Cisco Security Advisory, 66068, August 17, 2005 |
Intrusion Prevention System 5.0 (1) & (2) | A vulnerability has been reported in the command line processing (CLI) logic, which could let a local/remote malicious user obtain full administrative privileges. Updates available at: http://www.cisco.com/cgi-bin/tablebuild.pl/ips5 Currently we are not aware of any exploits for this vulnerability. | Cisco Intrusion Prevention System Administrative Access | High | Cisco Security Advisory, cisco-sa-20050824, August 21, 2005 |
Message Queuing software prior to 1.07 Build 220_13 & 1.11 Build 29_13 | Multiple vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported in the Computer Associates Message Queuing (CAM) service due to an unspecified error when specially crafted packets are submitted to the TCP port; buffer overflow vulnerabilities have been reported due to unspecified boundary errors, which could lead to the execution of arbitrary code; and a vulnerability has been reported due to a failure in the CAM service to verify the legitimacy of the CAFT application, which could let a remote malicious user spoof a legitimate CAFT instance and ultimately execute arbitrary code.
Upgrade information available at: There is no exploit code required. | Computer Associates Message Queuing Multiple Vulnerabilities | High | Computer Associates Advisory, August 19, 2005 |
Photo Gallery 1.3-1.3.3 , 1.2- 1.2.2 b, 1.1 beta 2, 1.1 .0, 1.0 RC3 | A vulnerability has been reported in 'Displayimage.php' due to insufficient sanitization of EXIF data, which could let a remote malicious user execute arbitrary script code. Upgrades available at: There is no exploit code required. | Coppermine 'Displayimage. | Medium | Security Focus, Bugtraq ID: 14625, August 22, 2005 |
DTLink Software | A vulnerability has been reported in 'aspell_setup.php' due to insufficient sanitization of the 'dictionary' variable before used as command line arguments, which could let a remote malicious user execute arbitrary code. Upgrades available at: There is no exploit code required. | DTLink Software AreaEdit SpellChecker | High | Secunia Advisory: SA16511, August 22, 2005 |
ECW-Shop 6.0.2 | Several vulnerabilities have been discovered: a Cross-Site Scripting vulnerability was reported due to insufficient sanitization 'max' and 'ctg' parameters before returned to users, which could let a remote malicious user execute arbitrary HTML and script code; an SQL injection vulnerability was reported due to insufficient sanitization of the 'min' and 'max' parameters before used in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a vulnerability was reported because a remote malicious user can modify/reduce the cost of their shopping cart. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploit have been published. | ECW Shop | Medium | Secunia Advisory: SA16459, August 17, 2005 |
Emefa Guestbook 1.2 | HTML injection vulnerabilities have been reported in 'sign.asp' due to insufficient sanitization of the 'name,' 'location,' and 'email' parameters before stored as a guest book entry, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required. | Emefa Guestbook Multiple HTML Injection | Medium | Secunia Advisory: SA16489, August 18, 2005 |
Ethereal | Multiple dissector and zlib vulnerabilities have been reported in Ethereal that could let remote malicious users cause a Denial of Service or execute arbitrary code. Upgrade to version 0.10.12: Fedora: Mandriva: RedHat: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | Ethereal Denial of Service or Arbitrary Code Execution CAN-2005-2361 | High | Secunia, Advisory: SA16225, July 27, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:131, August 4, 2005 RedHat Security Advisory, RHSA-2005:687-03, August 10, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005
|
JaguarControl | A buffer overflow vulnerability has been reported in 'JaguarEditControl.dll' due to a boundary error, which could let a remote malicious user cause a Denial of Service and/or potentially execute arbitrary code. No workaround or patch available at time of publishing. A Denial of Service Proof of Concept exploit has been published. | Isemarket JaguarControl | High | Security Focus Bugtraq ID 14558, August 13, 2005 |
mediabox404 1.2, 1.1 | An SQL injection vulnerability has been reported in 'Login_admin_Mediabox404.php' due to insufficient sanitization of the 'User' and 'Password' parameters before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. The vendor has addressed this issue in the latest CVS version. There is no exploit code required. | Mediabox404 href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2634">CAN-2005-2634 | Medium | Secunia Advisory: SA16493, August 18, 2005 |
MediaWiki 1.x | A vulnerability has been reported due to insufficient sanitization of input passed to certain HTML attributes, which could let a remote malicious user execute arbitrary script code. Upgrades available at: Gentoo: SUSE: There is no exploit code required. | High | Security Focus, 13861, June 6, 2005 Gentoo Security Advisory, GLSA 200506-12, June 13, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005
| |
Firefox 0.x, 1.x | Multiple vulnerabilities have been reported: a vulnerability was reported due to an error because untrusted events generated by web content are delivered to the browser user interface; a vulnerability was reported because scripts in XBL controls can be executed even when JavaScript has been disabled; a vulnerability was reported because remote malicious users can execute arbitrary code by tricking the user into using the 'Set As Wallpaper' context menu on an image URL that is really a javascript; a vulnerability was reported in the 'InstallTrigger.install()' function due to an error in the callback function, which could let a remote malicious user execute arbitrary code; a vulnerability was reported due to an error when handling 'data:' URL that originates from the sidebar, which could let a remote malicious user execute arbitrary code; an input validation vulnerability was reported in the 'InstallVersion.compareTo()' function when handling unexpected JavaScript objects, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because it is possible for remote malicious user to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL; a vulnerability was reported due to an error when handling DOM node names with different namespaces, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported due to insecure cloning of base objects, which could let a remote malicious user execute arbitrary code.
Updates available at: Gentoo: Mandriva: Fedora: RedHat: Ubuntu: http://security.ubuntu.com/ http://security.ubuntu.com/ SUSE: Debian: http://security.debian. SGI: Exploits have been published. | Firefox Multiple Vulnerabilities CAN-2005-2260 | High | Secunia Advisory: SA16043, July 13, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:120, July 13, 2005 Gentoo Linux Security Advisory, GLSA 200507-14, July 15, 2005 Gentoo Linux Security Advisory, GLSA 200507-17, July 18, 2005 Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:586-11, July 21, 2005 Slackware Security Advisory, SSA:2005-203-01, July 22, 2005 Ubuntu Security Notices, USN-155-1 & 155-2 July 26 & 28, 2005 Ubuntu Security Notices, USN-157-1 & 157-2 August 1& 2, 2005 SUSE Security Announcement, SUSE-SA:2005:045, August 11, 2005 Debian Security Advisory, DSA 775-1, August 15, 2005 SGI Security Advisory, 20050802-01-U, August 15, 2005 Debian Security Advisory, DSA 777-1, August 17, 2005 Debian Security Advisory, DSA 779-1, August 20, 2005 Debian Security Advisory, DSA 781-1, August 23, 2005 |
Mozilla | Multiple vulnerabilities have been reported: a vulnerability was reported in the 'EMBED' tag for non-installed plugins when processing the 'PLUGINSPAGE' attribute due to an input validation error, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because blocked popups that are opened through the GUI incorrectly run with 'chrome' privileges, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because the global scope of a window or tab are not cleaned properly before navigating to a new web site, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because the URL of a 'favicons' icon for a web site isn't verified before changed via JavaScript, which could let a remote malicious user execute arbitrary code with elevated privileges; a vulnerability was reported because the search plugin action URL is not properly verified before used to perform a search, which could let a remote malicious user execute arbitrary code; a vulnerability was reported due to the way links are opened in a sidebar when using the '_search' target, which could let a remote malicious user execute arbitrary code; several input validation vulnerabilities were reported when handling invalid type parameters passed to 'InstallTrigger' and 'XPInstall' related objects, which could let a remote malicious user execute arbitrary code; and vulnerabilities were reported due to insufficient validation of DOM nodes in certain privileged UI code, which could let a remote malicious user execute arbitrary code. Upgrades available at:
href="http://www.mozilla.org/products/mozilla1.x/" Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-18.xml"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-383.html">
href="http://rhn.redhat.com/errata/RHSA-2005-386.html">http://rhn.redhat.com/ TurboLinux: SUSE: RedHat: SGI: Ubuntu: Mandriva: FedoraLegacy: SCO: Gentoo: Fedora: Ubuntu: http://security.ubuntu.com/ HP: Debian: An exploit script has been published. | Mozilla Suite / Firefox Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0752">CAN-2005-0752
| High | Mozilla Foundation Security Advisories, 2005-35 - Gentoo Linux Security Advisory, GLSA 200504-18, April 19, 2005 RedHat Security Advisories, RHSA-2005:383-07 & RHSA-2005-386., April 21 & 26, 2005 Turbolinux Security Advisory, SUSE Security Announcement, SUSE-SA:2005:028, April 27, 2005 RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005 SGI Security Advisory, 20050501-01-U, May 5, 2005 Ubuntu Security Notice, USN-124-1 & USN-124-2, May 11 & 12, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:088, Mandriva Linux Security Update Advisory, MDKSA-2005:088-1, Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005 Packet Storm, May 23, 2005 SCO Security Advisory, SCOSA-2005.29, July 1, 2005 Gentoo Linux Security Advisory, GLSA 200507-17, July 18, 2005 Fedora Update Notifications, Ubuntu Security Notices, USN-157-1 & 157-2 August 1& 2, 2005 HP Security Bulletin, Debian Security Advisory, DSA 781-1, August 23, 2005 |
Mozilla Browser prior to 1.7.8; | A vulnerability was reported due to a failure in the application to properly verify Document Object Model (DOM) property values, which could let a remote malicious user execute arbitrary code. Firefox: Mozilla Browser Suite: TurboLinux:: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-435.html">http://rhn.redhat.com/ Ubuntu: SUSE: SGI: Fedora: Ubuntu: http://security.ubuntu.com/ HP: Debian: Currently we are not aware of any exploits for this vulnerability. | Mozilla Suite And Firefox DOM Property Overrides href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1532">CAN-2005-1532 | High | Mozilla Foundation Security Advisory, Turbolinux Security Advisory, RedHat Security Advisories, RHSA-2005:434-10 & RHSA-2005:435-10, May 23 & 24, 2005 Ubuntu Security Notice, USN-134-1, May 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:014, June 7, 2005 SGI Security Advisory, 20050503-01-U, June 8, 2005 SUSE Security Announcement, SUSE-SA:2005:030, June 9, 2005 Ubuntu Security Notices, USN-157-1 & 157-2 August 1& 2, 2005 HP Security Bulletin, Debian Security Advisory, DSA 781-1, August 23, 2005 |
Mozilla.org Mozilla Browser 1.7.6, Firefox 1.0.1, 1.0.2; K-Meleon 0.9; Netscape 7.2 | A vulnerability has been reported in the javascript implementation due to improper parsing of lamba list regular expressions, which could a remote malicious user obtain sensitive information. The vendor has issued a fix, available via CVS. RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-383.html">
href="http://rhn.redhat.com/errata/RHSA-2005-386.html">http://rhn.redhat.com/ Slackware:
href="http://www.mozilla.org/projects/security/known-vulnerabilities.html"> TurboLinux: SUSE: RedHat: SGI: Mandriva: FedoraLegacy: SCO: Gentoo: Fedora: Ubuntu: http://security.ubuntu.com/ HP: Debian: There is no exploit code required; however, a Proof of Concept exploit has been published. | Mozilla href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989 | Medium | Security Tracker Alert, 1013635, April 4, 2005 Security Focus, 12988, April 16, 2005 RedHat Security Advisories, RHSA-2005:383-07 & RHSA-2005:386-08, Turbolinux Slackware Security Advisory, SSA:2005-111-04, April 22, 2005 SUSE Security Announcement, SUSE-SA:2005:028, April 27, 2005 RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005 SGI Security Advisory, 20050501-01-U, May 5, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:088, Mandriva Linux Security Update Advisory, MDKSA-2005:088-1, Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005 SCO Security Advisory, SCOSA-2005.29, July 1, 2005 Gentoo Linux Security Advisory, GLSA 200507-17, July 18, 2005 Fedora Update Notifications, Ubuntu Security Notices, USN-157-1 & 157-2 August 1& 2, 2005 HP Security Bulletin, Debian Security Advisory, DSA 781-1, August 23, 2005 |
Mantis 0.19.0a-0.19.2, 0.18-0.18.3; | Multiple vulnerabilities have been reported: a Cross-Site Scripting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code; a Cross-Site Scripting vulnerability has been reported in the 'mantis/view_all_set.php' script, which could let a remote malicious user execute arbitrary HTML and nd script code; a vulnerability has been reported in 'mantis/view_all_bug_page.php' due to insufficient sanitization before returned to users, which could let a remote malicious user execute arbitrary HTML and script code; and an SQL injection vulnerability was reported due to insufficient satiation of unspecified input before used in and SQL query, which could let a remote malicious user execute arbitrary SQL code. Upgrades available for the first two vulnerabilities available at: Debian: There is no exploit code required. | Mantis Multiple Input Validation | Medium | Debian Security Advisory, DSA 778-1, August 19, 2005 Secunia Advisory: SA16506, August 22, 2005 |
OpenPGP | A vulnerability exists that could permit a remote malicious user to conduct an adaptive-chosen-ciphertext attack against OpenPGP's cipher feedback mode. The flaw is due to an ad-hoc integrity check feature in OpenPGP. A solution will be available in the next release of the product. SUSE: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-29.xml"> ALTLinux:
href="http://lists.altlinux.ru/pipermail/security-announce/2005-March/000287.html"> Ubuntu: A Proof of Concept exploit has been published. | Medium | SUSE Security Summary Report, SUSE-SR:2005:007, March 4, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:057, March 16, 2005 Gentoo Linux Security Advisory, GLSA 200503-29, March 24,2005 ALTLinux Security Advisory, March 29, 2005 Ubuntu Security Notice, USN-170-1, August 19, 2005
| |
PHPXMLRPC 1.1.1; | A vulnerability has been reported in XML-RPC due to insufficient sanitization of certain XML tags that are nested in parsed documents being used in an 'eval()' call, which could let a remote malicious user execute arbitrary PHP code.
PHPXMLRPC : Pear: Drupal: eGroupWare: MailWatch: Nucleus: RedHat: Ubuntu: Mandriva: There is no exploit code required. | PHPXMLRPC and PEAR XML_RPC Remote Arbitrary Code Execution | High | Security Focus, Bugtraq ID 14560, August 15, 2995 Security Focus, Bugtraq ID 14560, August 18, 2995 RedHat Security Advisory, RHSA-2005:748-05, August 19, 2005 Ubuntu Security Notice, USN-171-1, August 20, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:146, August 22, 2005 |
Ubuntu Linux 5.0 4 powerpc, i386, amd64; AWStats 6.4 & prior | A vulnerability has been reported due to insufficient sanitization of the 'url' parameter before using in an 'eval()' function when Referer field statistics are generated, which could let a remote malicious user execute arbitrary code. Note: The system is only vulnerable if at least one URLPlugin is enabled. Updates available at: Gentoo: SUSE: There is no exploit code required. | AWStats Arbitrary Command Execution | High | iDEFENSE Security Advisory, August 9, 2005 Ubuntu Security Notice, USN-167-1, August 11, 2005 Gentoo Linux Security Advisory, GLSA 200508-07, August 16, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 |
ScreenOS 2.x, 3.x, 4.x, 5.x | A vulnerability has been reported because different responses are returned when a username is valid or invalid, which could let a malicious user obtain sensitive information. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Netscreen VPN Username href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2640">CAN-2005-2640 | Medium | Security Focus, Bugtraq ID 14595, August 18, 2005 |
OpenVPN 2.0 , 1.6 .0, 1.5 .0, 1.4.0-1.4.3, 1.3.2 , 1.2.1 | Multiple remote Denial of Service vulnerabilities have been reported: a Denial of Service vulnerability was reported when flushing the OpenSSL error due to a failed client certificate authentication; a Denial of Service vulnerability was reported when flushing the OpenSSL error when a received packet fails to decrypt; a Denial of Service vulnerability was reported when configured in the 'dev tap' ethernet bridging mode; and a Denial of Service vulnerability was reported when two or more clients connect to the server at the same time using the same client certificate.
Upgrades available at: Mandriva: There is no exploit code required. | OpenVPN Multiple Remote Denials of Service | Low | Secunia Advisory: SA16463, August 19, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:145, August 22, 2005 |
phpAdsNew 2.0.5 | Multiple vulnerabilities have been reported: a vulnerability was reported because a vulnerable version of XML-RPC for PHP was used, which could let a remote malicious user execute arbitrary PHP code; an SQL injection vulnerability was reported in 'lib-view-direct.inc.php' due to insufficient sanitization of the 'clientid' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a vulnerability was reported due to insufficient verification of certain parameters before used to include files, which could let a remote malicious user include arbitrary local files. The vendor has released version 2.0.6. to resolve this issue. There is no exploit code required; however, a Proof of Concept exploit has been published. | phpAdsNew
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2636">CAN-2005-2636
| High | Secunia Advisory: SA16468, August 17, 2005 |
PHPFreeNews 1.40 | Several vulnerabilities have been reported: an SQL injection vulnerability was reported in 'SearchResults.php' due to insufficient sanitization of the 'Match' and CatID' parameters before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a Cross-Site Scripting vulnerability was reported in 'SearchResults.php' and 'NewsCategoryForm.php' due to insufficient sanitization of the 'NewsMode' and 'Match' parameters, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | PHPFreeNews
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2637">CAN-2005-2637 | Medium | Securiteam, August 18, 2005 |
PHPKIT 1.6.1 | Multiple SQL injection vulnerabilities have been reported due to insufficient sanitization of user-supplied input before using in SQL queries, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPKit Multiple SQL Injection | Medium | Security Focus, Bugtraq ID: 14629, August 22, 2005 |
Zorum 3.5 | A vulnerability has been reported in the '/Zorum/prod.php' script due to insufficient validation of the 'argv' parameter, which could let a remote malicious user execute arbitrary PHP code. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Zorum Input Validation | High | Security Tracker Alert ID: 1014725, August 18, 2005 |
phpPgAds 2.0.5 | Multiple vulnerabilities have been reported: a vulnerability was reported because a vulnerable version of XML-RPC for PHP was used, which could let a remote malicious user execute arbitrary PHP code; an SQL injection vulnerability was reported in 'lib-view-direct.inc.php' due to insufficient sanitization of the 'clientid' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a vulnerability was reported due to insufficient verification of certain parameters before used to include files, which could let a remote malicious user include arbitrary local files. Upgrades available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | phpPgAds
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2636">CAN-2005-2636 | High | Secunia Advisory: SA16469, August 17, 2005 |
PostNuke 0.76 RC4b | Multiple vulnerabilities have been reported: Cross-Site Scripting vulnerabilities were reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code; and an SQL injection vulnerability was reported in 'DL-viewdownload.PHP' due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary SQL code.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PostNuke Multiple Cross-Site Scripting & SQL Injection | Medium | Security Focus Bugtraq ID: 14635 & 14636, August 22, 2005 |
PowerDNS 2.x | Several vulnerabilities have been reported: a remote Denial of Service vulnerability was reported in the LDAP backend due to insufficient validation of user-supplied queries; and a remote Denial of Service vulnerability was reported due to an error when handling requests that are denied recursion. Update available at: Debian: Debian: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | Low | Secunia Advisory: SA16111, July 18, 2005 Debian Security Advisory, DSA 771-1, August 1, 2005 Debian Security Advisory, DSA 773-1, August 11, 2005 SUSE Security Summary Report, SUSE-SR:2005:019, August 22, 2005 | |
RunCMS 1.2 & prior | Several vulnerabilities have been reported: a vulnerability was reported in '/includes/common.php' due to incorrect usage of the 'EXTR_OVERWRITE' argument in the 'extract()' function, which could let a remote malicious user overwrite arbitrary variables; and an SQL injection was reported in 'newbb_plus/newtopic.php,' 'newbb_plus/edit.php,' and 'newbb_plus/reply.php' due to insufficient sanitization of the 'forum' parameter and in 'messages/print.php' due to insufficient sanitization of the 'msg_id' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. The vulnerabilities were reportedly silently patched in mid July. There is no exploit code required; however, a Proof of Concept exploit has been published. | RunCMS SQL Injection &Arbitrary Variable Overwrite
| Medium | Secunia Advisory: SA16514, August 23, 2005 |
SquirrelMail 1.4.0-1.4.5-RC1. | A vulnerability has been reported in 'options_identities.php' because parameters are insecurely extracted, which could let a remote malicious user execute arbitrary HTML and script code, or obtain/manipulate sensitive information. Upgrades available at: Debian: RedHat: Apple: Fedora: There is no exploit code required. | SquirrelMail Variable Handling | High | GulfTech Security Research Debian Security Advisory, RedHat Security Advisory, RHSA-2005:595-12, August 3, 2005 Apple Security Update 2005-007, Fedora Update Notifications, |
SquirrelMail 1.4.0 through 1.4.4 | Multiple vulnerabilities have been reported that could let remote malicious users conduct Cross-Site Scripting attacks. Upgrade to 1.4.4 and apply patch: http://prdownloads. Gentoo: Mandriva: Debian: RedHat: Apple: Fedora: There is no exploit code required. | SquirrelMail Cross-Site Scripting Vulnerabilities | Medium | SquirrelMail Advisory, June 15, 2005 Gentoo Linux Security Advisory, GLSA 200506-19, June 21, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:108, July 1, 2005 Debian Security Advisory , DSA 756-1, July 13, 2005 RedHat Security Advisory, RHSA-2005:595-12, August 3, 2005 Apple Security Update 2005-007, Fedora Update Notifications, |
PHPTB Topic Board 2.0 | Multiple remote file include vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary server-side script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPTB Topic Board Multiple Remote File Include href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2633">CAN-2005-2633 | High | Security Focus, Bugtraq ID 14592, August 17, 2005
|
Netquery 3.11
| A vulnerability has been reported in the 'nquser.php' script due to insufficient validation of the 'host' parameter, which could let a remote malicious user execute arbitrary code. Update available at: There is no exploit code required. | Netquery Input Validation | High | Security Tracker Alert ID: 1014750, August 22, 2005 |
W-Agora 4.2 | A Directory Traversal vulnerability has been reported in the 'Site' parameter, which could let a remote malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | W-Agora 'Site' Parameter Directory Traversal | Medium | Security Focus, Bugtraq ID 14597, August 18, 2005 |
Burning Board 2.2.2/2.3.3 & prior | An SQL injection vulnerability has been reported in the 'ModCP.php' script due to insufficient sanitization of the 'x' and 'y' parameters, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Woltlab Burning Board SQL Injection | Medium | Security Tracker Alert ID: 1014746, August 21, 2005 |
Xerox Document Centre | Multiple vulnerabilities have been reported: a vulnerability was reported due to unspecified errors, which could let a remote malicious user bypass authentication; a remote Denial of Service vulnerability was reported when handling HTTP requests; and a Cross-Site Scripting vulnerability was reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code.
Patches available at: There is no exploit code required. | Xerox MicroServer Web Server Multiple Authentication Bypass & Input Validation | Medium | XEROX Security Bulletin, XRX05-008 & 009, August 17, 2005 |
[back to top] Wireless
The section below contains wireless vulnerabilities, articles, and viruses/trojans identified during this reporting period.
- India bypasses the wires to bring Wi-Fi to its remote residents: In several developing countries, including India, wireless technology is making universal Internet access an attainable goal. Source: http://www.csmonitor.com/2005/0819/p07s01-wosc.html
Wireless Vulnerabilities
- BlueZ Arbitrary Command Execution: A vulnerability has been reported due to insufficient sanitization of input passed as a remote device name, which could let a remote malicious user execute arbitrary code.
- BluezHCIDpwned.txt: Document that outlines an exploitable scenario for the BlueZ vulnerability.
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
[back to
top]
name=trends>Trends
- US tops poll of spyware purveyors: According to a study by Webroot Software, the majority of spyware is coming from the US, with Poland in second, and the Netherlands third. Spyware purveyors are expanding their distribution channels and adopting new tactics in a bid to cash-in by infecting more PCs with parasitic malware. Source: http://www.theregister.co.uk/2005/08/23/webroot_spyware_report/ .
- Storm brewing over SHA-1 as further breaks are found: An attack on the Secure Hash Algorithm, an encryption standard frequently used to digitally sign documents, has been refined by three Chinese researchers. This attack was presented last week at the Crypto conference. Source: http://www.securityfocus.com/news/11292
- Exploit for Vulnerability in Microsoft DDS Library Shape Control (msdds.dll) component: US-CERT is aware of a public exploit for a vulnerability in the Microsoft DDS Library Shape Control (msdds.dll) component, which comes with various Microsoft products such as Visual Studio .NET and Microsoft Office. Systems with Visual Studio .NET 2002, which installs msdds.dll version 7.0.9466.0, are vulnerable. Source: http://www.us-cert.gov/current/.
- "Stealthy" Worms, Trojans Seen Tripling In Number: According to Kaspersky Labs, attackers are increasingly turning to stealthy rootkits to keep anti-virus vendors from detecting and deleting malicious worms or Trojan horses."Over the last 12 months, we've seen a large jump in the use of rootkits," said David Emm, a senior technology consultant with Kaspersky Labs. Source: http://www.techweb.com/wire/security/169500359.
- Over 90 Percent Of Companies Regularly Expose Employee, Customer Data: According to a recent study by Reconnex, an enterprise risk management vendor, 91 percent of companies exposed credit card numbers, and 82 percent exposed employee Social Security numbers. "We are seeing evidence of a growing trend regarding the distribution of sensitive data via Webmail," said the index's report. Source: http://www.informationweek.com/story/showArticle.jhtml;jsessionid=
A2VZY02Q0OCXUQSNDBCSKH0CJUMEKJVN?articleID=169500368. - Hacker underground erupts in virtual turf wars: Viruses are now designed to kill any other competing viruses in computer systems. That's a major reason that turf wars are emerging among hackers. Source: http://www.csmonitor.com/2005/0822/p01s01-stct.html.
- Search Engines Find Stolen Identities: During the first six months of 2005, more than 50 million identities were lost or stolen in a series of high profile data breaches across the United States. Thanks to search engines, many can be easily found. Source: http://www.informationweek.com/story/
showArticle.jhtml;jsessionid=DCREHOUZ5L3EMQSNDBCSKH0CJUMEKJVN?articleID=169400258. - Consumer worries about online security on the rise: According to a survey released by RSA Security Inc. and LightSpeed Research, more than four-fifths of 8,000 consumers felt threatened or extremely threatened by online fraud and identify theft. This includes all type of online transactions, including securities trading, banking, auctions, and retail. Source: http://www.informationweek.com/showArticle.jhtml;jsessionid=
QHNJND24A1HTWQSNDBCCKHSCJUMEKJVN?articleID=169400081.
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trend | Date |
face="Arial, Helvetica, sans-serif">Description |
1 | Netsky-P | Win32 Worm | Stable | March 2004 | A mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. The worm also tries to spread through various file-sharing programs by copying itself into various shared files. |
2 | Mytob.C | Win32 Worm | Slight Increase | March 2004 | A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the Windows LSASS (MS04-011) exploit. The worm will attempt to harvest email addresses from the local hard disk by scanning files. |
3 | Zafi-D | Win32 Worm | Slight Decrease | December 2004 | A mass-mailing worm that sends itself to email addresses gathered from the infected computer. The worm may also attempt to lower security settings, terminate processes, and open a back door on the compromised computer. |
4 | Netsky-Q | Win32 Worm | Stable | March 2004 | A mass-mailing worm that attempts to launch Denial of Service attacks against several web pages, deletes the entries belonging to several worms, and emits a sound through the internal speaker. |
5 | Mytob-BE | Win32 Worm | Slight Decrease | June 2005 | A slight variant of the mass-mailing worm that utilizes an IRC backdoor, LSASS vulnerability, and email to propagate. Harvesting addresses from the Windows address book, disabling antivirus, and modifying data. |
6 | Mytob-AS | Win32 Worm | Stable | June 2005 | A slight variant of the mass-mailing worm that disables security related programs and processes, redirection various sites, and changing registry values. This version downloads code from the net and utilizes its own email engine. |
7 | Zafi-B | Win32 Worm | Increase | June 2004 | A mass-mailing worm that spreads via e-mail using several different languages, including English, Hungarian and Russian. When executed, the worm makes two copies of itself in the %System% directory with randomly generated file names. |
8 | Netsky-D | Win32 Worm | Slight Increase | March 2004 | A simplified variant of the Netsky mass-mailing worm in that it does not contain many of the text strings that were present in NetSky.C and it does not copy itself to shared folders. Netsky.D spreads itself in e-mails as an executable attachment only. |
9 | Netsky-Z | Win32 Worm | Decrease | April 2004 | A mass-mailing worm that is very close to previous variants. The worm spreads in e-mails, but does not spread to local network and P2P and does not uninstall Bagle worm. The worm has a backdoor that listens on port 665. |
10 | Lovgate.w | Win32 Worm | Decrease | April 2004 | A mass-mailing worm that propagates via by using MAPI as a reply to messages, by using an internal SMTP, by dropping copies of itself on network shares, and through peer-to-peer networks. Attempts to access all machines in the local area network. |
Table Updated August 20, 2005
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.