There are a few windows issues listed about XP and IE

----- Original Message -----
From: "X-Force" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, February 10, 2003 4:43 PM
Subject: ISS Security Alert Summary AS03-06


> -----BEGIN PGP SIGNED MESSAGE-----
>
> Internet Security Systems Security Alert Summary AS03-06
> February 10, 2003
>
> X-Force Vulnerability and Threat Database:
> http://www.iss.net/security_center
>
> To receive these Alert Summaries, as well as other Alerts and
> Advisories, subscribe to the Internet Security Systems Alert
> mailing list at:
> http://www.iss.net/security_center/maillists
>
> This summary is available at the following address:
> http://www.iss.net/security_center/alerts/AS03-06.php
> _____
> Contents:
> * 33 Reported Vulnerabilities
> * Risk Factor Key
> _____
>
>
> Date Reported:      01/27/2003
> Brief Description:  Nukebrowser $filhead remote PHP file include
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Linux Any version, Windows Any version, Unix Any
>                     version, Nukebrowser 2.1 to 2.41
> Vulnerability:      nukebrowser-php-file-include
> X-Force URL:        http://www.iss.net/security_center/static/11217.php
>
> Date Reported:      01/28/2003
> Brief Description:  WebLogic keystores store plaintext passwords
> Risk Factor:        Medium
> Attack Type:        Host Based
> Platforms:          Windows NT 4.0, Solaris 2.6, HP-UX 11.00, Red Hat
>                     Linux Any version, Solaris 7, Solaris 8, Windows
>                     2000 Server, Windows 2000 Advanced Server, HP-UX
>                     11i, AIX 4.3.3, Windows XP, AIX 5.1L, Windows 2000
>                     Professional, WebLogic Server 7.0, WebLogic Server
>                     7.0.0.1, WebLogic Express 7.0, WebLogic Express
>                     7.0.0.1
> Vulnerability:      weblogic-keystore-plaintext-passwords
> X-Force URL:        http://www.iss.net/security_center/static/11220.php
>
> Date Reported:      01/28/2003
> Brief Description:  WebLogic clustered environment race condition
>                     session sharing
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Tru64 UNIX Any version, Windows NT 4.0, Solaris
>                     2.6, HP-UX 11.00, Red Hat Linux Any version, SuSE
>                     Linux Any version, Solaris 7, Solaris 8, Windows
>                     2000 Server, Windows 2000 Advanced Server, WebLogic
>                     Server 6.0, HP-UX 11i, AIX 4.3.3, Windows XP,
>                     WebLogic Express 5.1, Compaq NonStop Himalaya
>                     Servers Any version, AIX 5.1L, Solaris 9, Windows
>                     2000 Professional, OpenVMS Any version, WebLogic
>                     Server 6.1, WebLogic Server 7.0, WebLogic Server
>                     7.0.0.1, WebLogic Express 6.1, WebLogic Express
>                     7.0, WebLogic Express 7.0.0.1, WebLogic Express
>                     6.0, WebLogic Server 5.1, IBM AS/400e OS/400
>                     V4R4/V4R5, IBM Dynix/ptx Any version, IBM S/390
> Vulnerability:      weblogic-clustered-race-condition
> X-Force URL:        http://www.iss.net/security_center/static/11221.php
>
> Date Reported:      01/28/2003
> Brief Description:  IlohaMail compose.php script could allow an
>                     attacker to upload files
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Linux Any version, Mac OS X Any version, IlohaMail
>                     prior to 0.7.9
> Vulnerability:      ilohamail-compose-file-upload
> X-Force URL:        http://www.iss.net/security_center/static/11251.php
>
> Date Reported:      01/31/2003
> Brief Description:  SILC stores passwords and session information in
>                     plain text
> Risk Factor:        Medium
> Attack Type:        Host Based
> Platforms:          Linux Any version, Windows Any version, Unix Any
>                     version, SILC Client Any version
> Vulnerability:      silc-plaintext-account-information
> X-Force URL:        http://www.iss.net/security_center/static/11244.php
>
> Date Reported:      01/31/2003
> Brief Description:  SpamProbe HTML tag new line denial of service
> Risk Factor:        Low
> Attack Type:        Network Based
> Platforms:          Linux Any version, SpamProbe 0.8a
> Vulnerability:      spamprobe-newlines-href-dos
> X-Force URL:        http://www.iss.net/security_center/static/11247.php
>
> Date Reported:      02/02/2003
> Brief Description:  BladeEnc myFseek() code execution
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          BSD Any version, Linux Any version, Windows Any
>                     version, Unix Any version, Gentoo Linux Any
>                     version, BladeEnc 0.94.2 and earlier
> Vulnerability:      bladeenc-myfseek-code-execution
> X-Force URL:        http://www.iss.net/security_center/static/11227.php
>
> Date Reported:      02/02/2003
> Brief Description:  KaZaA automated advertisement download buffer
>                     overflow
> Risk Factor:        High
> Attack Type:        Network Based
> Platforms:          Windows XP Professional, KaZaA 2.0.2
> Vulnerability:      kazaa-automated-ad-bo
> X-Force URL:        http://www.iss.net/security_center/static/11228.php
>
> Date Reported:      02/03/2003
> Brief Description:  PHP-Nuke avatar field could allow an attacker to
>                     execute code
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Linux Any version, Windows Any version, Unix Any
>                     version, PHP-Nuke 6.0 and earlier
> Vulnerability:      phpnuke-avatar-code-execution
> X-Force URL:        http://www.iss.net/security_center/static/11229.php
>
> Date Reported:      02/03/2003
> Brief Description:  OpenBSD chpass user database information disclosure
> Risk Factor:        Medium
> Attack Type:        Host Based
> Platforms:          OpenBSD 2.1, OpenBSD 2.2, OpenBSD 2.3, OpenBSD 2.4,
>                     OpenBSD 2.0, OpenBSD 2.5, OpenBSD 2.6, OpenBSD 2.7,
>                     OpenBSD 2.8, OpenBSD 2.9, OpenBSD 3.0, OpenBSD 3.1,
>                     OpenBSD 3.2
> Vulnerability:      openbsd-chpass-information-disclosure
> X-Force URL:        http://www.iss.net/security_center/static/11233.php
>
> Date Reported:      02/03/2003
> Brief Description:  Majordomo which_access variable set to "open" could
>                     disclose email addresses
> Risk Factor:        Low
> Attack Type:        Network Based
> Platforms:          Unix Any version, Majordomo 2 and earlier
> Vulnerability:      majordomo-whichaccess-email-disclosure
> X-Force URL:        http://www.iss.net/security_center/static/11243.php
>
> Date Reported:      02/03/2003
> Brief Description:  Linux kernel O_DIRECT information leak
> Risk Factor:        Medium
> Attack Type:        Host Based
> Platforms:          Red Hat Linux 7.1, Red Hat Linux 7.2, Red Hat Linux
>                     7.3, Red Hat Linux 8.0, Mandrake Linux 9.0, Linux
>                     kernel 2.4.10 to 2.4.18
> Vulnerability:      linux-odirect-information-leak
> X-Force URL:        http://www.iss.net/security_center/static/11249.php
>
> Date Reported:      02/03/2003
> Brief Description:  Internet Explorer dragDrop() method could be used
>                     to read local files
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Windows Any version, Microsoft Internet Explorer
>                     5.5, Microsoft Internet Explorer 6.0, Microsoft
>                     Internet Explorer 6.0 SP1
> Vulnerability:      ie-dragdrop-read-files
> X-Force URL:        http://www.iss.net/security_center/static/11250.php
>
> Date Reported:      02/03/2003
> Brief Description:  Red Hat Linux pam_xauth could allow an attacker to
>                     gain privileges
> Risk Factor:        High
> Attack Type:        Host Based
> Platforms:          Red Hat Linux 7.1, Red Hat Linux 7.2, Red Hat Linux
>                     7.3, Red Hat Linux 8.0
> Vulnerability:      linux-pamxauth-gain-privileges
> X-Force URL:        http://www.iss.net/security_center/static/11254.php
>
> Date Reported:      02/04/2003
> Brief Description:  32bit FTP banner buffer overflow
> Risk Factor:        High
> Attack Type:        Network Based
> Platforms:          Windows Any version, 32bit FTP 9.49.01
> Vulnerability:      32bit-ftp-banner-bo
> X-Force URL:        http://www.iss.net/security_center/static/11234.php
>
> Date Reported:      02/04/2003
> Brief Description:  ByteCatcher FTP banner buffer overflow
> Risk Factor:        High
> Attack Type:        Network Based
> Platforms:          Windows Any version, ByteCatcher FTP 1.04b
> Vulnerability:      bytecatcher-ftp-banner-bo
> X-Force URL:        http://www.iss.net/security_center/static/11235.php
>
> Date Reported:      02/04/2003
> Brief Description:  Opera cross-domain security zone access
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Windows Any version, Opera 7
> Vulnerability:      opera-cross-domain-access
> X-Force URL:        http://www.iss.net/security_center/static/11238.php
>
> Date Reported:      02/04/2003
> Brief Description:  Opera custom debug message could access files
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Windows Any version, Opera 7
> Vulnerability:      opera-debug-file-access
> X-Force URL:        http://www.iss.net/security_center/static/11239.php
>
> Date Reported:      02/04/2003
> Brief Description:  Opera directive image cross-site scripting
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Windows Any version, Opera 7
> Vulnerability:      opera-image-file-xss
> X-Force URL:        http://www.iss.net/security_center/static/11240.php
>
> Date Reported:      02/04/2003
> Brief Description:  Opera could expose a user's browser history
> Risk Factor:        Low
> Attack Type:        Network Based
> Platforms:          Windows Any version, Opera 7
> Vulnerability:      opera-history-exposure
> X-Force URL:        http://www.iss.net/security_center/static/11241.php
>
> Date Reported:      02/04/2003
> Brief Description:  Opera error methods can be used to view visited
>                     URLs
> Risk Factor:        Low
> Attack Type:        Network Based
> Platforms:          Windows Any version, Opera 7
> Vulnerability:      opera-error-method-access
> X-Force URL:        http://www.iss.net/security_center/static/11242.php
>
> Date Reported:      02/04/2003
> Brief Description:  IBM WebSphere uses weak encryption algorithm to
>                     store passwords in an exported XML file
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          AIX Any version, HP-UX Any version, Linux Any
>                     version, Unix Any version, Windows NT Any version,
>                     Windows 2000 Any version, IBM WebSphere Advanced
>                     Server Edition 4.0.4
> Vulnerability:      websphere-xml-weak-encryption
> X-Force URL:        http://www.iss.net/security_center/static/11245.php
>
> Date Reported:      02/04/2003
> Brief Description:  TOPo in.php or out.php path disclosure
> Risk Factor:        Low
> Attack Type:        Network Based
> Platforms:          Windows Any version, TOPo 1.43 and earlier
> Vulnerability:      topo-path-disclosure
> X-Force URL:        http://www.iss.net/security_center/static/11248.php
>
> Date Reported:      02/04/2003
> Brief Description:  phpMyNewsletter customize.php unauthorized file
>                     access
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Linux Any version, Windows Any version, Unix Any
>                     version, phpMyNewsletter 0.6.11
> Vulnerability:      phpmynewsletter-customize-file-access
> X-Force URL:        http://www.iss.net/security_center/static/11261.php
>
> Date Reported:      02/04/2003
> Brief Description:  Windows 2000 NetBIOS continuation packets denial of
>                     service
> Risk Factor:        Low
> Attack Type:        Network Based
> Platforms:          Windows 2000 Server, Windows 2000 Advanced Server,
>                     Windows 2000 Datacenter Server, Windows 2000
>                     Professional, Windows 2000 Terminal Services
> Vulnerability:      win2k-netbios-continuation-dos
> X-Force URL:        http://www.iss.net/security_center/static/11274.php
>
> Date Reported:      02/05/2003
> Brief Description:  Internet Explorer dialog box zone bypass
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Windows Any version, Microsoft Internet Explorer
>                     5.01, Microsoft Internet Explorer 5.5, Microsoft
>                     Internet Explorer 6.0
> Vulnerability:      ie-dialog-zone-bypass
> X-Force URL:        http://www.iss.net/security_center/static/11258.php
>
> Date Reported:      02/05/2003
> Brief Description:  Internet Explorer showHelp() zone bypass
> Risk Factor:        Medium
> Attack Type:        Network Based
> Platforms:          Windows Any version, Microsoft Internet Explorer
>                     5.01, Microsoft Internet Explorer 5.5, Microsoft
>                     Internet Explorer 6.0
> Vulnerability:      ie-showhelp-zone-bypass
> X-Force URL:        http://www.iss.net/security_center/static/11259.php
>
> Date Reported:      02/05/2003
> Brief Description:  Windows XP Windows Redirector buffer overflow
> Risk Factor:        High
> Attack Type:        Host Based
> Platforms:          Windows XP
> Vulnerability:      winxp-windows-redirector-bo
> X-Force URL:        http://www.iss.net/security_center/static/11260.php
>
> Date Reported:      02/06/2003
> Brief Description:  AbsoluteTelnet title bar code buffer overflow
> Risk Factor:        High
> Attack Type:        Network Based
> Platforms:          Windows Any version, AbsoluteTelnet 2.00,
>                     AbsoluteTelnet 2.11
> Vulnerability:      absolutetelnet-title-bar-bo
> X-Force URL:        http://www.iss.net/security_center/static/11265.php
>
> Date Reported:      02/06/2003
> Brief Description:  F-Prot FreeBSD for Small Business command line
>                     buffer overflow
> Risk Factor:        High
> Attack Type:        Host Based
> Platforms:          FreeBSD Any version, F-Prot FreeBSD for Small
>                     Business 3.12b
> Vulnerability:      fprot-command-line-bo
> X-Force URL:        http://www.iss.net/security_center/static/11271.php
>
> Date Reported:      02/06/2003
> Brief Description:  CuteFTP long URL clipboard buffer overflow
> Risk Factor:        Low
> Attack Type:        Host Based
> Platforms:          Windows Any version, CuteFTP 5.0 XP
> Vulnerability:      cuteftp-url-clipboard-bo
> X-Force URL:        http://www.iss.net/security_center/static/11275.php
>
> Date Reported:      02/07/2003
> Brief Description:  HP-UX /usr/sbin/wall buffer overflow
> Risk Factor:        High
> Attack Type:        Host Based
> Platforms:          HP-UX Any version
> Vulnerability:      hp-wall-bo
> X-Force URL:        http://www.iss.net/security_center/static/11272.php
>
> Date Reported:      02/07/2003
> Brief Description:  Red Hat Linux uml_net utility could allow an
>                     attacker to gain privileges
> Risk Factor:        High
> Attack Type:        Host Based
> Platforms:          Red Hat Linux 8.0
> Vulnerability:      linux-umlnet-gain-privileges
> X-Force URL:        http://www.iss.net/security_center/static/11276.php
>
> _____
>
> Risk Factor Key:
>
>      High     Security issues that allow immediate remote, or local access
>               or immediate execution of code or commands, with
unauthorized
>               privileges. Examples are most buffer overflows, backdoors,
>               default or no password, and bypassing security on firewalls
>               or other network components.
>      Medium   Security issues that have the potential of granting access
or
>               allowing code execution by means of complex or lengthy
exploit
>               procedures, or low risk issues applied to major Internet
>               components. Examples are cross-site scripting,
man-in-the-middle
>               attacks, SQL injection, denial of service of major
applications,
>               and denial of service resulting in system information
disclosure
>               (such as core files).
>      Low      Security issues that deny service or provide non-system
>               information that could be used to formulate structured
attacks
>               on a target, but not directly gain unauthorized access.
Examples
>               are brute force attacks, non-system information disclosure
>               (configurations, paths, etc.), and denial of service
attacks.
>
> ______
>
> About Internet Security Systems (ISS)
> Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
> pioneer and world leader in software and services that protect critical
> online resources from an ever-changing spectrum of threats and misuse.
> Internet Security Systems is headquartered in Atlanta, GA, with
> additional operations throughout the Americas, Asia, Australia, Europe
> and the Middle East.
>
> Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved
> worldwide.
>
> Permission is hereby granted for the electronic redistribution of this
> document. It is not to be edited or altered in any way without the
> express written consent of the Internet Security Systems X-Force. If you
> wish to reprint the whole or any part of this document in any other
> medium excluding electronic media, please email [EMAIL PROTECTED] for
> permission.
>
> Disclaimer: The information within this paper may change without notice.
Internet
> Security Systems provides this information on an AS IS basis with NO
warranties,
> implied or otherwise. Any use of this information is at the user's risk.
In no event
> shall Internet Security Systems be held liable for any damages whatsoever
arising
> out of or in connection with the use or dissemination of this information.
>
> X-Force PGP Key available on MIT's PGP key server and PGP.com's key
server,
> as well as at http://www.iss.net/security_center/sensitive.php
>
> Please send suggestions, updates, and comments to: X-Force
>
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.2
>
> iQCVAwUBPkgq8zRfJiV99eG9AQHREQP+K7PpZZFK/v9MkmD/gGuDqMR9j4jIbEmt
> EDOWXxku9Z/yflbZQr+V/q6kta5aqfUBc4tEifqwRXi251qjx6/BkTqKizOAJElv
> wPg0/bWUG7UwEyiEN9drEKkCUXR2fpy+hl1oaNUccaevCdTdAgtv2DCArkxP/VzY
> E+QAgVB2gTs=
> =Gg57
> -----END PGP SIGNATURE-----
> ---
> [This E-mail scanned for viruses by Declude Virus]
>
>

---
[This E-mail scanned for viruses by Declude Virus]

---------------------------------------------------------
Archived messages from this list can be found at:
http://www.mail-archive.com/info-tech@aea8.k12.ia.us/
---------------------------------------------------------

Reply via email to