Date Reported:          11/07/2001
Brief Description:      Windows 2000 and XP Terminal services allows an
                        attacker to spoof IP addresses
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Windows 2000 All versions, Windows XP All
                        versions
Vulnerability:          win-terminal-spoof-address
X-Force URL:            http://xforce.iss.net/static/7538.php

| Date Reported:          11/12/2001
| Brief Description:      Windows 2000 RunAs service denial of service
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-runas-dos
| X-Force URL:            http://xforce.iss.net/static/7533.php
|
| Date Reported:          11/12/2001
| Brief Description:      Windows 2000 RunAs service allows local attacker
|                         to bypass pipe authentication
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-runas-pipe-authentication
| X-Force URL:            http://xforce.iss.net/static/7532.php
|
| Date Reported:          11/12/2001
| Brief Description:      Windows 2000 RunAs service reveals sensitive
|                         information
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-runas-reveal-information
| X-Force URL:            http://xforce.iss.net/static/7531.php





----- Original Message -----
From: "X-Force" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, November 19, 2001 7:03 PM
Subject: ISSalert: ISS Security Alert Summary AS01-07


|
| TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to
| [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
| --------------------------------------------------------------------------
-
|
| -----BEGIN PGP SIGNED MESSAGE-----
|
| Internet Security Systems Security Alert Summary AS01-07
| November 19, 2001
|
| X-Force Vulnerability and Threat Database: http://xforce.iss.net
|
| To receive these Alert Summaries, as well as other Alerts and
| Advisories, subscribe to the Internet Security Systems Alert
| mailing list at: http://xforce.iss.net/maillists/index.php
|
| This summary will be posted at the following address:
| http://xforce.iss.net/alerts/AS01-07.php
| _____
| Contents:
| * 22 Reported Vulnerabilities
| * Risk Factor Key
| _____
|
| Date Reported:          11/07/2001
| Brief Description:      Apache 'mod_usertrack' module generates
|                         predictable session ID
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Apache Web Server 1.3.x
| Vulnerability:          apache-modusertrack-predicticable-sessionid
| X-Force URL:            http://xforce.iss.net/static/7494.php
|
| Date Reported:          11/07/2001
| Brief Description:      Slashcode allows session ID to be obtained using
|                         brute force attack
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Slashcode 2.0
| Vulnerability:          slashcode-sessionid-brute-force
| X-Force URL:            http://xforce.iss.net/static/7493.php
|
| Date Reported:          11/07/2001
| Brief Description:      Windows 2000 and XP Terminal services allows an
|                         attacker to spoof IP addresses
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Windows 2000 All versions, Windows XP All
|                         versions
| Vulnerability:          win-terminal-spoof-address
| X-Force URL:            http://xforce.iss.net/static/7538.php
|
| Date Reported:          11/08/2001
| Brief Description:      IBM HTTP Server discloses source code
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     IBM HTTP Server 1.3.19 and earlier
| Vulnerability:          ibm-http-source-disclosure
| X-Force URL:            http://xforce.iss.net/static/7490.php
|
| Date Reported:          11/09/2001
| Brief Description:      ClearCase db_loader TERM buffer overflow
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     ClearCase 4.2, ClearCase 3.2+, ClearCase 4.0,
|                         ClearCase 4.1
| Vulnerability:          clearcase-dbloader-term-bo
| X-Force URL:            http://xforce.iss.net/static/7488.php
|
| Date Reported:          11/10/2001
| Brief Description:      IMP allows a remote attacker to steal cookie
|                         information using cross-site scripting
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     IMP 2.2.6 or earlier
| Vulnerability:          imp-css-steal-cookies
| X-Force URL:            http://xforce.iss.net/static/7496.php
|
| Date Reported:          11/12/2001
| Brief Description:      Multi-vendor CDE dtspcd daemon buffer overflow
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     AIX 5.1, AIX 4.3, Caldera OpenUnix 8.0, Caldera
|                         UnixWare 7, HP-UX 11.04, HP-UX 11.11, HP-UX
|                         10.24, HP-UX 11.00, HP-UX 10.20, HP-UX 10.10,
|                         Solaris 8, Solaris 7, Tru64 DIGITAL UNIX 5.1a,
|                         Tru64 DIGITAL UNIX 5.0a, Tru64 DIGITAL UNIX
|                         4.0G, Tru64 DIGITAL UNIX 4.0F
| Vulnerability:          cde-dtspcd-bo
| X-Force URL:            http://xforce.iss.net/static/7396.php
|
| Date Reported:          11/12/2001
| Brief Description:      Windows 2000 RunAs service denial of service
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-runas-dos
| X-Force URL:            http://xforce.iss.net/static/7533.php
|
| Date Reported:          11/12/2001
| Brief Description:      Windows 2000 RunAs service allows local attacker
|                         to bypass pipe authentication
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-runas-pipe-authentication
| X-Force URL:            http://xforce.iss.net/static/7532.php
|
| Date Reported:          11/12/2001
| Brief Description:      Windows 2000 RunAs service reveals sensitive
|                         information
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-runas-reveal-information
| X-Force URL:            http://xforce.iss.net/static/7531.php
|
| Date Reported:          11/13/2001
| Brief Description:      Thttpd and Mini_Httpd Web server allows remote
|                         attacker to bypass permissions
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     mini_httpd 1.15c and earlier
| Vulnerability:          httpd-bypass-permissions
| X-Force URL:            http://xforce.iss.net/static/7541.php
|
| Date Reported:          11/13/2001
| Brief Description:      RADIUS message digest calculation buffer
|                         overflow
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     RADIUS All versions
| Vulnerability:          radius-message-digest-bo
| X-Force URL:            http://xforce.iss.net/static/7534.php
|
| Date Reported:          11/13/2001
| Brief Description:      Linux Korean install contains insecure umask
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Red Hat Linux 7.1
| Vulnerability:          linux-korean-default-umask
| X-Force URL:            http://xforce.iss.net/static/7549.php
|
| Date Reported:          11/14/2001
| Brief Description:      Cisco 12000 series routers keyword fragment
|                         denial of service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Cisco 12000 series router
| Vulnerability:          cisco-turbo-acl-dos
| X-Force URL:            http://xforce.iss.net/static/7552.php
|
| Date Reported:          11/14/2001
| Brief Description:      Cisco 12000 series router 'ICMP unreachable'
|                         packets denial of service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Cisco 12000 series router
| Vulnerability:          cisco-icmp-unreachable-dos
| X-Force URL:            http://xforce.iss.net/static/7536.php
|
| Date Reported:          11/14/2001
| Brief Description:      Cisco 12000 series router has input ACL
|                         configured
| Risk Factor:            Low
| Attack Type:            Host Based / Network Based
| Platforms Affected:     Cisco 12000 series router
| Vulnerability:          cisco-input-acl-configured
| X-Force URL:            http://xforce.iss.net/static/7554.php
|
| Date Reported:          11/14/2001
| Brief Description:      Cisco 12000 series routers "deny ip any any"
|                         rule ignored in ACL
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Cisco 12000 series router
| Vulnerability:          cisco-acl-deny-ip
| X-Force URL:            http://xforce.iss.net/static/7553.php
|
| Date Reported:          11/14/2001
| Brief Description:      Cisco 12000 series router does not filter
|                         keyword fragment
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Cisco 12000 series router
| Vulnerability:          cisco-acl-fragment-bypass
| X-Force URL:            http://xforce.iss.net/static/7555.php
|
| Date Reported:          11/14/2001
| Brief Description:      Cisco 12000 series router non-initial packet
|                         fragments denial of service
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Cisco 12000 series router
| Vulnerability:          cisco-acl-noninital-dos
| X-Force URL:            http://xforce.iss.net/static/7550.php
|
| Date Reported:          11/14/2001
| Brief Description:      Cisco allows fragmented packets in outgoing ACL
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Cisco 12000 series router
| Vulnerability:          cisco-acl-outgoing-fragment
| X-Force URL:            http://xforce.iss.net/static/7551.php
|
| Date Reported:          11/15/2001
| Brief Description:      ActivePerl perlIS.dll long filename buffer
|                         overflow
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     ActivePerl 5.6.1.629 and prior
| Vulnerability:          activeperl-perlis-filename-bo
| X-Force URL:            http://xforce.iss.net/static/7539.php
|
| Date Reported:          11/15/2001
| Brief Description:      Cisco IOS ARP table can be overwritten
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Cisco IOS All versions
| Vulnerability:          cisco-arp-overwrite-table
| X-Force URL:            http://xforce.iss.net/static/7547.php
|
|
| _____
|
| Risk Factor Key:
|
|      High     Any vulnerability that provides an attacker with immediate
|               access into a machine, gains superuser access, or bypasses
|               a firewall. Example: A vulnerable Sendmail 8.6.5 version
|               that allows an intruder to execute commands on mail server.
|      Medium   Any vulnerability that provides information that has a high
|               potential of giving system access to an intruder. Example:
|               A misconfigured TFTP or vulnerable NIS server that allows
|               an intruder to get the password file that could contain an
|               account with a guessable password.
|      Low      Any vulnerability that provides information that could
|               potentially lead to a compromise. Example: A finger that
|               allows an intruder to find out who is online and potential
|               accounts to attempt to crack passwords via brute force
|               methods.
|
| ______
|
| About Internet Security Systems (ISS)
| Internet Security Systems is a leading global provider of security
| management solutions for the Internet, protecting digital assets and
| ensuring safe and uninterrupted e-business. With its industry-leading
| intrusion detection and vulnerability assessment, remote managed
| security services, and strategic consulting and education offerings, ISS
| is a trusted security provider to more than 8,000 customers worldwide
| including 21 of the 25 largest U.S. commercial banks and the top 10 U.S.
| telecommunications companies. Founded in 1994, ISS is headquartered in
| Atlanta, GA, with additional offices throughout North America and
| international operations in Asia, Australia, Europe, Latin America and
| the Middle East. For more information, visit the Internet Security
| Systems web site at www.iss.net or call 888-901-7477.
|
| Copyright (c) 2001 Internet Security Systems, Inc. All rights reserved
| worldwide.
|
| Permission is hereby granted for the redistribution of this Alert
| electronically. It is not to be edited in any way without express consent
of
| the X-Force. If you wish to reprint the whole or any part of this Alert in
| any other medium excluding electronic medium, please e-mail [EMAIL PROTECTED]
| for permission.
|
| Disclaimer
|
| The information within this paper may change without notice. Use of this
| information constitutes acceptance for use in an AS IS condition. There
are
| NO warranties with regard to this information. In no event shall the
author
| be liable for any damages whatsoever arising out of or in connection with
| the use or spread of this information. Any use of this information is at
the
| user's own risk.
|
| X-Force PGP Key available at: http://xforce.iss.net/sensitive.php
| as well as on MIT's PGP key server and PGP.com's key server.
|
| Please send suggestions, updates, and comments to: X-Force
| [EMAIL PROTECTED] of Internet Security Systems, Inc.
|
| -----BEGIN PGP SIGNATURE-----
| Version: 2.6.3a
| Charset: noconv
|
| iQCVAwUBO/mrTDRfJiV99eG9AQGZogP8D+3nnRRqVVfPxVJS6EFNjm1Khzp8ByR5
| GfgmKFXO7Z3a5a9zIChWS1o2U2Khd19KTvxy86MPwktpTqGar7P9jBqmC4yj9NYm
| Hwij+C7Kz1FDh91tLBkuUKKpFaZAMe+CNU8CZiDMfb9XLqOwsVN9QYMSX3qzHR0P
| Wwj6Z2Azfm4=
| =VhtS
| -----END PGP SIGNATURE-----
|
|


---------------------------------------------------------
Archived messages from this list can be found at:
http://www.mail-archive.com/tech-cord@aea5.k12.ia.us/
---------------------------------------------------------

Reply via email to