____________________________________________________________ \ / Scott Fosseen - Systems Engineer - Arrowhead AEA 5 \ www.aea5.k12.ia.us/aeaphone.nsf/Web/FosseenScott /____________________________________________________________ ----- Original Message ----- From: "X-Force" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Monday, April 15, 2002 3:32 PM Subject: ISSalert: ISS Security Alert Summary AS02-15
> > TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to > [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! > -------------------------------------------------------------------------- - > > -----BEGIN PGP SIGNED MESSAGE----- > > Internet Security Systems Security Alert Summary AS02-15 > April 15, 2002 > > X-Force Vulnerability and Threat Database: > http://www.iss.net/security_center > > To receive these Alert Summaries, as well as other Alerts and > Advisories, subscribe to the Internet Security Systems Alert > mailing list at: > http://www.iss.net/security_center/maillists > > This summary is available at the following address: > http://www.iss.net/security_center/alerts/AS02-15.php > _____ > Contents: > * 46 Reported Vulnerabilities > * Risk Factor Key > _____ > > > Date Reported: 04/06/2002 > Brief Description: Horde IMP invalid PHP file request could disclose > the Web root path > Risk Factor: Low > Attack Type: Network Based > Platforms: IMP 2.2.7 > Vulnerability: imp-php-path-disclosure > X-Force URL: http://www.iss.net/security_center/static/8768.php > > Date Reported: 04/06/2002 > Brief Description: Horde IMP status.php3 cross-site scripting > Risk Factor: Medium > Attack Type: Network Based > Platforms: IMP 2.2.7 > Vulnerability: imp-status-php3-css > X-Force URL: http://www.iss.net/security_center/static/8769.php > > Date Reported: 04/06/2002 > Brief Description: Anthill bug tracking system cross-site scripting > Risk Factor: Medium > Attack Type: Network Based > Platforms: Anthill 0.1.6.1 and earlier > Vulnerability: anthill-bug-tracking-css > X-Force URL: http://www.iss.net/security_center/static/8770.php > > Date Reported: 04/06/2002 > Brief Description: Anthill postbug.php authentication bypass > Risk Factor: Medium > Attack Type: Network Based > Platforms: Anthill 0.1.6.1 and earlier > Vulnerability: anthill-postbug-auth-bypass > X-Force URL: http://www.iss.net/security_center/static/8771.php > > Date Reported: 04/01/2002 > Brief Description: Oracle8i tnslsnr command line buffer overflow > Risk Factor: High > Attack Type: Host Based > Platforms: Oracle 8.1.5 > Vulnerability: oracle-tnslsnr-command-line-bo > X-Force URL: http://www.iss.net/security_center/static/8772.php > > Date Reported: 04/08/2002 > Brief Description: WatchGuard Firebox SOHO invalid IP options denial > of service > Risk Factor: Low > Attack Type: Network Based > Platforms: WatchGuard Firebox SOHO prior to 5.0.35 > Vulnerability: watchguard-soho-ipoptions-dos > X-Force URL: http://www.iss.net/security_center/static/8774.php > > Date Reported: 04/05/2002 > Brief Description: CA-MLINK /mlclear and /mllock buffer overflows > Risk Factor: High > Attack Type: Host Based > Platforms: CA-MLINK All versions > Vulnerability: ca-mlink-bo > X-Force URL: http://www.iss.net/security_center/static/8776.php > > Date Reported: 04/08/2002 > Brief Description: Microsoft OWC Spreadsheet component "=HOST()" > formula could be used to execute arbitrary script > through Internet Explorer > Risk Factor: Medium > Attack Type: Network Based > Platforms: Microsoft Internet Explorer 5.0, Microsoft Internet > Explorer 5.01, Microsoft Internet Explorer 5.5, > Microsoft Internet Explorer 6.0, Microsoft Office > XP, Microsoft Office Web Components 10 > Vulnerability: owc-spreadsheet-host-script-execution > X-Force URL: http://www.iss.net/security_center/static/8777.php > > Date Reported: 04/08/2002 > Brief Description: Microsoft OWC Spreadsheet component "LoadText" > method could be used to read arbitrary files > through Internet Explorer > Risk Factor: Medium > Attack Type: Network Based > Platforms: Microsoft Internet Explorer 5.0, Microsoft Internet > Explorer 5.01, Microsoft Internet Explorer 5.5, > Microsoft Internet Explorer 6.0, Microsoft Office > 2000, Microsoft Office XP, Microsoft Office Web > Components 10, Microsoft Office Web Components 9 > Vulnerability: owc-spreadsheet-loadtext-read-files > X-Force URL: http://www.iss.net/security_center/static/8778.php > > Date Reported: 04/08/2002 > Brief Description: Microsoft OWC Spreadsheet component "Paste" and > "Copy" method could allow unauthorized clipboard > access through Internet Explorer > Risk Factor: Medium > Attack Type: Network Based > Platforms: Microsoft Internet Explorer 5.0, Microsoft Internet > Explorer 5.01, Microsoft Internet Explorer 5.5, > Microsoft Internet Explorer 6.0, Microsoft Office > 2000, Microsoft Office XP, Microsoft Office Web > Components 10, Microsoft Office Web Components 9 > Vulnerability: owc-spreadsheet-clipboard-access > X-Force URL: http://www.iss.net/security_center/static/8779.php > > Date Reported: 04/01/2002 > Brief Description: Oracle Configurator DHTML UI text features cross- > site scripting > Risk Factor: Medium > Attack Type: Network Based > Platforms: Oracle Configurator 11i > Vulnerability: oracle-configurator-dhtml-css > X-Force URL: http://www.iss.net/security_center/static/8780.php > > Date Reported: 04/01/2002 > Brief Description: Oracle Configurator > 'oracle.apps.cz.servlet.UiServlet' servlet cross- > site scripting > Risk Factor: Medium > Attack Type: Network Based > Platforms: Oracle Configurator 11i > Vulnerability: oracle-configurator-uiservlet-css > X-Force URL: http://www.iss.net/security_center/static/8781.php > > Date Reported: 04/01/2002 > Brief Description: Oracle Configurator > 'oracle.apps.cz.servlet.UiServlet' servlet reveals > system information > Risk Factor: Low > Attack Type: Network Based > Platforms: Oracle Configurator 11i > Vulnerability: oracle-configurator-uiservlet-information > X-Force URL: http://www.iss.net/security_center/static/8782.php > > Date Reported: 04/08/2002 > Brief Description: Microsoft OWC Chart component could allow an > attacker to verify a file's existence using the > "Load" method > Risk Factor: Low > Attack Type: Host Based / Network Based > Platforms: Microsoft Office Web Components 10, Microsoft > Office Web Components 9 > Vulnerability: owc-chart-load-exist > X-Force URL: http://www.iss.net/security_center/static/8784.php > > Date Reported: 04/08/2002 > Brief Description: Microsoft OWC Spreadsheet component could allow an > attacker to verify a file's existence using the > "XMLURL" property > Risk Factor: Low > Attack Type: Host Based / Network Based > Platforms: Microsoft Office Web Components 10 > Vulnerability: owc-spreadsheet-xmlurl > X-Force URL: http://www.iss.net/security_center/static/8785.php > > Date Reported: 04/08/2002 > Brief Description: Microsoft OWC DataSourceControl component could > allow an attacker to verify a file's existence > using the "ConnectionFile" property > Risk Factor: Low > Attack Type: Host Based / Network Based > Platforms: Microsoft Office Web Components 10 > Vulnerability: owc-datasourcecontrol-connectionfile-exist > X-Force URL: http://www.iss.net/security_center/static/8786.php > > Date Reported: 04/09/2002 > Brief Description: Cisco Aironet telnet denial of service > Risk Factor: Low > Attack Type: Network Based > Platforms: Cisco Aironet Access Point 340 prior to 11.21, > Cisco Aironet Access Point 350 prior to 11.21, > Cisco Aironet Bridge 350 prior to 11.21 > Vulnerability: cisco-aironet-telnet-dos > X-Force URL: http://www.iss.net/security_center/static/8788.php > > Date Reported: 04/08/2002 > Brief Description: Funk Software Proxy uses insecure permissions > Risk Factor: Medium > Attack Type: Host Based / Network Based > Platforms: Funk Proxy Host 3.x > Vulnerability: funk-proxy-insecure-permissions > X-Force URL: http://www.iss.net/security_center/static/8791.php > > Date Reported: 04/08/2002 > Brief Description: Funk Software Proxy uses weak passwords > Risk Factor: High > Attack Type: Host Based > Platforms: Funk Proxy Host 3.x > Vulnerability: funk-proxy-weak-password > X-Force URL: http://www.iss.net/security_center/static/8792.php > > Date Reported: 04/08/2002 > Brief Description: Funk Software Proxy Named Pipe insecure permissions > Risk Factor: Medium > Attack Type: Host Based > Platforms: Funk Proxy Host 3.x > Vulnerability: funk-proxy-named-pipe > X-Force URL: http://www.iss.net/security_center/static/8793.php > > Date Reported: 04/10/2002 > Brief Description: IIS ASP chunked encoding heap buffer overflow > Risk Factor: High > Attack Type: Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0 > Vulnerability: iis-asp-chunked-encoding-bo > X-Force URL: http://www.iss.net/security_center/static/8795.php > > Date Reported: 04/10/2002 > Brief Description: IIS ASP data transfer heap buffer overflow > Risk Factor: High > Attack Type: Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0, Microsoft IIS > 5.1 > Vulnerability: iis-asp-data-transfer-bo > X-Force URL: http://www.iss.net/security_center/static/8796.php > > Date Reported: 04/10/2002 > Brief Description: IIS ASP HTTP header parsing buffer overflow > Risk Factor: High > Attack Type: Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0, Microsoft IIS > 5.1 > Vulnerability: iis-asp-http-header-bo > X-Force URL: http://www.iss.net/security_center/static/8797.php > > Date Reported: 04/10/2002 > Brief Description: IIS SSI safety check buffer overflow > Risk Factor: High > Attack Type: Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0, Microsoft IIS > 5.1 > Vulnerability: iis-ssi-safety-check-bo > X-Force URL: http://www.iss.net/security_center/static/8798.php > > Date Reported: 04/10/2002 > Brief Description: IIS HTR ISAPI ISM.DLL extension buffer overflow > Risk Factor: High > Attack Type: Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0 > Vulnerability: iis-htr-isapi-bo > X-Force URL: http://www.iss.net/security_center/static/8799.php > > Date Reported: 04/10/2002 > Brief Description: IIS FrontPage Server Extensions and ASP.NET ISAPI > filter error handling denial of service > Risk Factor: Low > Attack Type: Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0, Microsoft IIS > 5.1 > Vulnerability: iis-isapi-filter-error-dos > X-Force URL: http://www.iss.net/security_center/static/8800.php > > Date Reported: 04/10/2002 > Brief Description: IIS FTP session status request denial of service > Risk Factor: Low > Attack Type: Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0, Microsoft IIS > 5.1 > Vulnerability: iis-ftp-session-status-dos > X-Force URL: http://www.iss.net/security_center/static/8801.php > > Date Reported: 04/10/2002 > Brief Description: IIS Help File search cross-site scripting > Risk Factor: Medium > Attack Type: Host Based / Network Based > Platforms: Microsoft IIS 5.0, Microsoft IIS 5.1 > Vulnerability: iis-help-file-css > X-Force URL: http://www.iss.net/security_center/static/8802.php > > Date Reported: 04/10/2002 > Brief Description: IIS HTTP error page cross-site scripting > Risk Factor: Medium > Attack Type: Host Based / Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0 > Vulnerability: iis-http-error-page-css > X-Force URL: http://www.iss.net/security_center/static/8803.php > > Date Reported: 04/10/2002 > Brief Description: IIS redirected URL error cross-site scripting > Risk Factor: Medium > Attack Type: Host Based / Network Based > Platforms: Microsoft IIS 4.0, Microsoft IIS 5.0, Microsoft IIS > 5.1 > Vulnerability: iis-redirected-url-error-css > X-Force URL: http://www.iss.net/security_center/static/8804.php > > Date Reported: 04/07/2002 > Brief Description: Abyss Web Server retrieves configuration file using > hexadecimal URL encoded "dot dot" sequences > Risk Factor: Medium > Attack Type: Network Based > Platforms: Abyss Web Server 1.0 > Vulnerability: abyss-unicode-directory-traversal > X-Force URL: http://www.iss.net/security_center/static/8805.php > > Date Reported: 04/08/2002 > Brief Description: Windows 2000 Terminal Services allows attacker to > bypass group policy settings > Risk Factor: Medium > Attack Type: Network Based > Platforms: Windows 2000 Advanced Server, Windows 2000 > Datacenter Server, Windows 2000 Server > Vulnerability: win2k-terminal-bypass-policies > X-Force URL: http://www.iss.net/security_center/static/8813.php > > Date Reported: 04/10/2002 > Brief Description: WatchGuard Firebox SOHO allows users to bypass IP > restrictions > Risk Factor: Medium > Attack Type: Host Based > Platforms: WatchGuard Firebox SOHO 5.0.35 > Vulnerability: watchguard-soho-bypass-restrictions > X-Force URL: http://www.iss.net/security_center/static/8814.php > > Date Reported: 04/08/2002 > Brief Description: Microsoft VBScript ActiveX Word object denial of > service > Risk Factor: Low > Attack Type: Host Based / Network Based > Platforms: Microsoft Internet Explorer 5.0, Microsoft Internet > Explorer 5.01, Microsoft Internet Explorer 5.5, > Microsoft Internet Explorer 6.0, Microsoft Outlook > 2000, Microsoft Outlook 2002, Microsoft Outlook > Express 4.0, Microsoft Outlook Express 5.0, > Microsoft Outlook Express 5.5, Microsoft Outlook > Express 6.0, Microsoft Word 2000, Microsoft Word > 2002 > Vulnerability: ms-activex-word-dos > X-Force URL: http://www.iss.net/security_center/static/8815.php > > Date Reported: 04/11/2002 > Brief Description: Tivoli Storage Manager client port 1581 buffer > overflow > Risk Factor: High > Attack Type: Network Based > Platforms: IBM Tivoli Storage Manager 4.2.x.x > Vulnerability: tivoli-storagemanager-client-bo > X-Force URL: http://www.iss.net/security_center/static/8817.php > > Date Reported: 04/11/2002 > Brief Description: OpenBSD /usr/bin/mail in non-interactive mode could > allow local root privileges > Risk Factor: High > Attack Type: Host Based > Platforms: OpenBSD 3.0 and earlier > Vulnerability: openbsd-mail-root-privileges > X-Force URL: http://www.iss.net/security_center/static/8818.php > > Date Reported: 04/09/2002 > Brief Description: Powerboards local cookie modification could allow > account hijacking > Risk Factor: Medium > Attack Type: Network Based > Platforms: Powerboards 2.2b > Vulnerability: powerboards-account-hijacking > X-Force URL: http://www.iss.net/security_center/static/8819.php > > Date Reported: 04/09/2002 > Brief Description: Powerboards user file could be used to execute > arbitrary commands > Risk Factor: High > Attack Type: Network Based > Platforms: Powerboards 2.2b > Vulnerability: powerboards-user-file-execution > X-Force URL: http://www.iss.net/security_center/static/8820.php > > Date Reported: 04/09/2002 > Brief Description: Powerboards error.php cross-site scripting > Risk Factor: Medium > Attack Type: Network Based > Platforms: Powerboards 2.2b > Vulnerability: powerboards-error-css > X-Force URL: http://www.iss.net/security_center/static/8821.php > > Date Reported: 04/09/2002 > Brief Description: Powerboards could allow an attacker to gain > administrative access > Risk Factor: Medium > Attack Type: Network Based > Platforms: Powerboards 2.2b > Vulnerability: powerboards-admin-access > X-Force URL: http://www.iss.net/security_center/static/8822.php > > Date Reported: 04/09/2002 > Brief Description: Powerboards could allow an attacker to delete other > user's posts > Risk Factor: Low > Attack Type: Network Based > Platforms: Powerboards 2.2b > Vulnerability: powerboards-delete-posts > X-Force URL: http://www.iss.net/security_center/static/8823.php > > Date Reported: 04/09/2002 > Brief Description: Powerboards could reveal database path > Risk Factor: Low > Attack Type: Network Based > Platforms: Powerboards 2.2b > Vulnerability: powerboards-path-disclosure > X-Force URL: http://www.iss.net/security_center/static/8824.php > > Date Reported: 04/11/2002 > Brief Description: Tivoli Storage Manager Web server port 1580 login > buffer overflow > Risk Factor: High > Attack Type: Network Based > Platforms: IBM Tivoli Storage Manager 4.2.x.x > Vulnerability: tivoli-storagemanager-login-bo > X-Force URL: http://www.iss.net/security_center/static/8825.php > > Date Reported: 04/11/2002 > Brief Description: IBM Informix Web Datablade Module allows SQL > injection attack > Risk Factor: Medium > Attack Type: Network Based > Platforms: Informix Web Datablade Module 4.12 > Vulnerability: informix-wdm-sql-injection > X-Force URL: http://www.iss.net/security_center/static/8826.php > > Date Reported: 04/11/2002 > Brief Description: IBM Informix Web Datablade Module HTML decoding of > SQL Query > Risk Factor: Medium > Attack Type: Network Based > Platforms: Informix Web Datablade Module 4.12 > Vulnerability: informix-wbm-sql-decoding > X-Force URL: http://www.iss.net/security_center/static/8827.php > > Date Reported: 04/11/2002 > Brief Description: X11 library -xrm option buffer overflow > Risk Factor: High > Attack Type: Host Based > Platforms: Caldera OpenUnix 8.0.0, Caldera UnixWare 7.1.1 > Vulnerability: x11-xrm-bo > X-Force URL: http://www.iss.net/security_center/static/8828.php > > _____ > > Risk Factor Key: > > High Any vulnerability that provides an attacker with immediate > access into a machine, gains superuser access, or bypasses > a firewall. Example: A vulnerable Sendmail 8.6.5 version > that allows an intruder to execute commands on mail server. > Medium Any vulnerability that provides information that has a high > potential of giving system access to an intruder. Example: > A misconfigured TFTP or vulnerable NIS server that allows > an intruder to get the password file that could contain an > account with a guessable password. > Low Any vulnerability that provides information that could > potentially lead to a compromise. Example: A finger that > allows an intruder to find out who is online and potential > accounts to attempt to crack passwords via brute force > methods. > > ______ > > About Internet Security Systems (ISS) > Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a > pioneer and world leader in software and services that protect critical > online resources from an ever-changing spectrum of threats and misuse. > Internet Security Systems is headquartered in Atlanta, GA, with > additional operations throughout the Americas, Asia, Australia, Europe > and the Middle East. > > Copyright (c) 2002 Internet Security Systems, Inc. All rights reserved > worldwide. > > Permission is hereby granted for the electronic redistribution of this > document. It is not to be edited or altered in any way without the > express written consent of the Internet Security Systems X-Force. If you > wish to reprint the whole or any part of this document in any other > medium excluding electronic media, please email [EMAIL PROTECTED] for > permission. > > Disclaimer: The information within this paper may change without notice. > Use of this information constitutes acceptance for use in an AS IS > condition. There are NO warranties, implied or otherwise, with regard to > this information or its use. Any use of this information is at the > user's risk. In no event shall the author/distributor (Internet Security > Systems X-Force) be held liable for any damages whatsoever arising out > of or in connection with the use or spread of this information. > > X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, > as well as at http://www.iss.net/security_center/sensitive.php > > Please send suggestions, updates, and comments to: X-Force > [EMAIL PROTECTED] of Internet Security Systems, Inc. > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.2 > > iQCVAwUBPLs4rzRfJiV99eG9AQFgHQP/cc85DkRERJ5pZygO7VIhAHq/ZAEYJDlN > 328GAddxlT6aURVa4SgQltHGh2La3FeXktJ3qMMuCNfGaxLKaGEEPQCXun1YlYuO > RP313nb37xTz6jOhmtTVRdKO+dl9+q9YMXCrg67esQb7WgZ8gAcMj+bWEa6QXhmy > 5orZElcyH4w= > =ZrQq > -----END PGP SIGNATURE----- > > --------------------------------------------------------- Archived messages from this list can be found at: http://www.mail-archive.com/tech-cord@aea5.k12.ia.us/ ---------------------------------------------------------