| Date Reported:          12/07/2001
| Brief Description:      Windows 2000 IKE UDP packet flood denial of
|                         service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-ike-dos
| X-Force URL:            http://xforce.iss.net/static/7667.php

| Date Reported:          12/11/2001
| Brief Description:      Microsoft IIS HTTP GET request with false
|                         "Content-Length" field can cause a denial of
|                         service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Microsoft IIS 5.0
| Vulnerability:          iis-false-content-length-dos
| X-Force URL:            http://xforce.iss.net/static/7691.php


----- Original Message -----
From: "X-Force" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, December 18, 2001 1:41 AM
Subject: ISSalert: ISS Security Alert Summary AS01-11


|
| TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to
| [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
| --------------------------------------------------------------------------
-
|
| -----BEGIN PGP SIGNED MESSAGE-----
|
| Internet Security Systems Security Alert Summary AS01-11
| December 17, 2001
|
| X-Force Vulnerability and Threat Database: http://xforce.iss.net
|
| To receive these Alert Summaries, as well as other Alerts and
| Advisories, subscribe to the Internet Security Systems Alert
| mailing list at: http://xforce.iss.net/maillists/index.php
|
| This summary is available at the following address:
| http://xforce.iss.net/alerts/AS01-11.php
|
| IMPORTANT:
| X-Force will not deliver an Alert Summary during the holiday week
| of December 24, 2001. The next alert summary will be sent on
| December 31, 2001. Happy holidays!
|
| ____
| Contents:
| * 26 Reported Vulnerabilities
| * Risk Factor Key
| _____
|
|
| Date Reported:          12/05/2001
| Brief Description:      Axis Network Camera has a default administrator
|                         password
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Axis Network Camera 200, Axis Network Camera
|                         2100, Axis Network Camera 2110, Axis Network
|                         Camera 2120
| Vulnerability:          axis-default-admin-passwd
| X-Force URL:            http://xforce.iss.net/static/7665.php
|
| Date Reported:          12/06/2001
| Brief Description:      CDE xterm could allow an attacker to obtain
|                         privileges of previous sessions
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     Caldera OpenUnix 8.0.0, Caldera UnixWare 7.1.0,
|                         Caldera UnixWare 7.1.1
| Vulnerability:          cde-xterm-gain-privileges
| X-Force URL:            http://xforce.iss.net/static/7666.php
|
| Date Reported:          12/07/2001
| Brief Description:      Windows 2000 IKE UDP packet flood denial of
|                         service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Windows 2000 All versions
| Vulnerability:          win2k-ike-dos
| X-Force URL:            http://xforce.iss.net/static/7667.php
|
| Date Reported:          12/06/2001
| Brief Description:      wmtv -e option command execution
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     Debian Linux 2.2, wmtv 0.6.5
| Vulnerability:          wmtv-execute-commands
| X-Force URL:            http://xforce.iss.net/static/7669.php
|
| Date Reported:          12/04/2001
| Brief Description:      Microsoft Outlook Express allows blocked
|                         attachments to be opened when the message is
|                         forwarded
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     Microsoft Outlook Express 6.0
| Vulnerability:          oe-blocked-attachment-forward
| X-Force URL:            http://xforce.iss.net/static/7670.php
|
| Date Reported:          12/05/2001
| Brief Description:      ZoneAlarm and Tiny Personal Firewall allows non-
|                         standard outbound packets to bypass filtering
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     Tiny Personal Firewall 2.0 and earlier,
|                         ZoneAlarm 2.6 and earlier, ZoneAlarm Pro 2.6 and
|                         earlier
| Vulnerability:          zonealarm-tiny-bypass-filter
| X-Force URL:            http://xforce.iss.net/static/7671.php
|
| Date Reported:          12/07/2001
| Brief Description:      Volition Red Faction game server and client can
|                         be crashed with UDP packets
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Red Faction 1.0, Red Faction 1.1
| Vulnerability:          red-faction-udp-dos
| X-Force URL:            http://xforce.iss.net/static/7672.php
|
| Date Reported:          12/07/2001
| Brief Description:      XFree86 buffer overflow using the Konqueror Web
|                         browser and file manager
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     XFree86 X11R6 4.0.x
| Vulnerability:          xfree86-konqueror-bo
| X-Force URL:            http://xforce.iss.net/static/7673.php
|
| Date Reported:          12/07/2001
| Brief Description:      Kebi Webmail administrative directory is
|                         accessible
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     Kebi Community 1.0 academy, Kebi Community 1.0
|                         enterprise
| Vulnerability:          kebi-webmail-admin-dir-access
| X-Force URL:            http://xforce.iss.net/static/7674.php
|
| Date Reported:          12/06/2001
| Brief Description:      Allaire JRun '%00' or '%2570' could allow an
|                         attacker to view the source code of JSP files
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     JRun 3.0, JRun 3.1
| Vulnerability:          allaire-jrun-view-jsp-source
| X-Force URL:            http://xforce.iss.net/static/7676.php
|
| Date Reported:          12/06/2001
| Brief Description:      Allaire JRun could allow an attacker to access
|                         JSP files in the WEB-INF and META-INF
|                         directories
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     JRun 3.1
| Vulnerability:          allaire-jrun-webinf-metainf-jsp
| X-Force URL:            http://xforce.iss.net/static/7677.php
|
| Date Reported:          12/06/2001
| Brief Description:      Allaire JRun JWS "dot dot" directory traversal
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     JRun 2.3.3, JRun 3.0, JRun 3.1
| Vulnerability:          allaire-jrun-jws-directory-traversal
| X-Force URL:            http://xforce.iss.net/static/7678.php
|
| Date Reported:          12/06/2001
| Brief Description:      Allaire JRun appends the jsessionid to a URL if
|                         cookies are turned on
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     JRun 3.0, JRun 3.1
| Vulnerability:          allaire-jrun-jsessionid-appended
| X-Force URL:            http://xforce.iss.net/static/7679.php
|
| Date Reported:          12/07/2001
| Brief Description:      Pathways Homecare uses weak encryption on
|                         usernames and passwords
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Pathways Homecare 6.5
| Vulnerability:          pathways-homecare-weak-encryption
| X-Force URL:            http://xforce.iss.net/static/7682.php
|
| Date Reported:          12/08/2001
| Brief Description:      XFree86 xterm -title buffer overflow
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     XFree86 X11R6 4.0.x
| Vulnerability:          xfree86-xterm-title-bo
| X-Force URL:            http://xforce.iss.net/static/7683.php
|
| Date Reported:          12/07/2001
| Brief Description:      Lotus Domino URL database request denial of
|                         service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Lotus Domino 5.0.5, Lotus Domino 5.0.8
| Vulnerability:          lotus-domino-database-dos
| X-Force URL:            http://xforce.iss.net/static/7684.php
|
| Date Reported:          12/05/2001
| Brief Description:      Load Sharing Facility (LSF) /tmp file symlink
|                         attack
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     LSF 4.0
| Vulnerability:          lsf-tmp-symlink
| X-Force URL:            http://xforce.iss.net/static/7685.php
|
| Date Reported:          12/05/2001
| Brief Description:      Load Sharing Facility (LSF) user configuration
|                         file symlink attack
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     LSF 4.0
| Vulnerability:          lsf-config-file-symlink
| X-Force URL:            http://xforce.iss.net/static/7686.php
|
| Date Reported:          12/05/2001
| Brief Description:      Load Sharing Facility (LSF) lsadmin and badmin
|                         buffer overflow
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     LSF 4.0
| Vulnerability:          lsf-lsadmin-badmin-bo
| X-Force URL:            http://xforce.iss.net/static/7687.php
|
| Date Reported:          12/05/2001
| Brief Description:      Load Sharing Facility (LSF) without eauth
|                         authentication scheme has multiple buffer
|                         overflows
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     LSF 4.0
| Vulnerability:          lsf-no-eauth-bo
| X-Force URL:            http://xforce.iss.net/static/7688.php
|
| Date Reported:          12/05/2001
| Brief Description:      Load Sharing Facility (LSF) mbatchd daemon
|                         remote buffer overflow
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     LSF 4.0
| Vulnerability:          lsf-mbatchd-bo
| X-Force URL:            http://xforce.iss.net/static/7689.php
|
| Date Reported:          12/11/2001
| Brief Description:      Microsoft IIS HTTP GET request with false
|                         "Content-Length" field can cause a denial of
|                         service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Microsoft IIS 5.0
| Vulnerability:          iis-false-content-length-dos
| X-Force URL:            http://xforce.iss.net/static/7691.php
|
| Date Reported:          12/11/2001
| Brief Description:      CSVForm.pl could allow remote command execution
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     CSVForm 0.1, CSVFormPlus 1.0
| Vulnerability:          csvform-cgi-execute-commands
| X-Force URL:            http://xforce.iss.net/static/7692.php
|
| Date Reported:          12/10/2001
| Brief Description:      FreeBSD AIO library could allow an attacker to
|                         overwrite memory and gain elevated privileges
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     FreeBSD 4.4-Stable
| Vulnerability:          bsd-aio-overwrite-memory
| X-Force URL:            http://xforce.iss.net/static/7693.php
|
| Date Reported:          12/08/2001
| Brief Description:      Winsock RSHD/NT daemon standard connection error
|                         data denial of service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Windows 2000 All versions, Windows NT All
|                         versions, Winsock RSHD/NT 2.20, Winsock RSHD/NT
|                         2.21
| Vulnerability:          winsock-rshdnt-error-dos
| X-Force URL:            http://xforce.iss.net/static/7694.php
|
| Date Reported:          12/13/2001
| Brief Description:      ATPhttpd long URL denial of service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     ATPhttpd 0.4
| Vulnerability:          atphttpd-long-url-dos
| X-Force URL:            http://xforce.iss.net/static/7695.php
|
| _____
|
| Risk Factor Key:
|
|      High     Any vulnerability that provides an attacker with immediate
|               access into a machine, gains superuser access, or bypasses
|               a firewall. Example: A vulnerable Sendmail 8.6.5 version
|               that allows an intruder to execute commands on mail server.
|      Medium   Any vulnerability that provides information that has a high
|               potential of giving system access to an intruder. Example:
|               A misconfigured TFTP or vulnerable NIS server that allows
|               an intruder to get the password file that could contain an
|               account with a guessable password.
|      Low      Any vulnerability that provides information that could
|               potentially lead to a compromise. Example: A finger that
|               allows an intruder to find out who is online and potential
|               accounts to attempt to crack passwords via brute force
|               methods.
|
| ______
|
| About Internet Security Systems (ISS)
| Internet Security Systems is a leading global provider of security
| management solutions for the Internet, protecting digital assets and
| ensuring safe and uninterrupted e-business. With its industry-leading
| intrusion detection and vulnerability assessment, remote managed
| security services, and strategic consulting and education offerings, ISS
| is a trusted security provider to more than 8,000 customers worldwide
| including 21 of the 25 largest U.S. commercial banks and the top 10 U.S.
| telecommunications companies. Founded in 1994, ISS is headquartered in
| Atlanta, GA, with additional offices throughout North America and
| international operations in Asia, Australia, Europe, Latin America and
| the Middle East. For more information, visit the Internet Security
| Systems web site at www.iss.net or call 888-901-7477.
|
| Copyright (c) 2001 Internet Security Systems, Inc. All rights reserved
| worldwide.
|
| Permission is hereby granted for the redistribution of this Alert
| electronically. It is not to be edited in any way without express consent
of
| the X-Force. If you wish to reprint the whole or any part of this Alert in
| any other medium excluding electronic medium, please e-mail [EMAIL PROTECTED]
| for permission.
|
| Disclaimer
|
| The information within this paper may change without notice. Use of this
| information constitutes acceptance for use in an AS IS condition. There
are
| NO warranties with regard to this information. In no event shall the
author
| be liable for any damages whatsoever arising out of or in connection with
| the use or spread of this information. Any use of this information is at
the
| user's own risk.
|
| X-Force PGP Key available at: http://xforce.iss.net/sensitive.php
| as well as on MIT's PGP key server and PGP.com's key server.
|
| Please send suggestions, updates, and comments to: X-Force
| [EMAIL PROTECTED] of Internet Security Systems, Inc.
|
| -----BEGIN PGP SIGNATURE-----
| Version: 2.6.3a
| Charset: noconv
|
| iQCVAwUBPB7y5DRfJiV99eG9AQE2SwP+OMrO9Lkt2nZB9Elc197C+Zezav2AAbBI
| 7/UTG5VbZ1AFADAKD8CN8Q2RXfIp+CZvPFGWcU0Xu1sCuqmxLVlP7jlqHuIksuuI
| CRNAB+qzabyyQEBJdfCuSpImo5MMD2M5kjd3TTLNGq8kYSS1waHfnEoiX2oG+anf
| 1ibw7+pKZFk=
| =jzro
| -----END PGP SIGNATURE-----
|
|


---------------------------------------------------------
Archived messages from this list can be found at:
http://www.mail-archive.com/tech-cord@aea5.k12.ia.us/
---------------------------------------------------------

Reply via email to