Date Reported: 03/07/2002 Brief Description: Windows 2000 allows an attacker to bypass password policy Risk Factor: Medium Attack Type: Network Based Platforms: Windows 2000 All versions Vulnerability: win2k-password-bypass-policy X-Force URL: http://www.iss.net/security_center/static/8402.php
____________________________________________________________ \ / Scott Fosseen - Systems Engineer - Arrowhead AEA 5 \ www.aea5.k12.ia.us/aeaphone.nsf/Web/FosseenScott /____________________________________________________________ ----- Original Message ----- From: "X-Force" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Monday, March 18, 2002 5:38 PM Subject: ISSalert: ISS Security Alert Summary AS02-11 > > TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to > [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! > -------------------------------------------------------------------------- - > > -----BEGIN PGP SIGNED MESSAGE----- > > Internet Security Systems Security Alert Summary AS02-11 > March 18, 2002 > > X-Force Vulnerability and Threat Database: > http://www.iss.net/security_center > > To receive these Alert Summaries, as well as other Alerts and > Advisories, subscribe to the Internet Security Systems Alert > mailing list at: > http://www.iss.net/security_center/maillists > > This summary is available at the following address: > http://www.iss.net/security_center/alerts/AS02-11.php > _____ > Contents: > * 35 Reported Vulnerabilities > * Risk Factor Key > _____ > > > Date Reported: 03/06/2002 > Brief Description: Windows NT Server with IIS 4.0 could allow users to > bypass "User cannot change password" security > policy > Risk Factor: Low > Attack Type: Host Based / Network Based > Platforms: Microsoft IIS 4.0, Windows NT 4.0 > Vulnerability: winnt-pw-policy-bypass > X-Force URL: http://www.iss.net/security_center/static/8388.php > > Date Reported: 03/07/2002 > Brief Description: Norton AntiVirus 2002 incoming email scan can be > bypassed using a NULL character > Risk Factor: Medium > Attack Type: Network Based > Platforms: Norton AntiVirus 2002 > Vulnerability: nav-nullchar-bypass-protection > X-Force URL: http://www.iss.net/security_center/static/8389.php > > Date Reported: 03/07/2002 > Brief Description: Norton AntiVirus 2002 incoming email scan can be > bypassed by embedding malicious code in non-RFC > compliant MIME messages > Risk Factor: Medium > Attack Type: Network Based > Platforms: Norton AntiVirus 2002 > Vulnerability: nav-nonrfc-bypass-protection > X-Force URL: http://www.iss.net/security_center/static/8390.php > > Date Reported: 03/07/2002 > Brief Description: Norton AntiVirus 2002 .nch and .dbx file types can > be used to bypass protection > Risk Factor: Medium > Attack Type: Network Based > Platforms: Norton AntiVirus 2002 > Vulnerability: nav-filetype-bypass-protection > X-Force URL: http://www.iss.net/security_center/static/8391.php > > Date Reported: 03/07/2002 > Brief Description: Norton AntiVirus 2002 incoming email scan can be > bypassed by changing the file name in the Content- > Type header > Risk Factor: Medium > Attack Type: Network Based > Platforms: Norton AntiVirus 2002 > Vulnerability: nav-contenttype-bypass-protection > X-Force URL: http://www.iss.net/security_center/static/8392.php > > Date Reported: 03/06/2002 > Brief Description: mIRC DCC "100 testing" command could reveal the > nickname and the number of IRC servers the victim > is connected to > Risk Factor: Low > Attack Type: Network Based > Platforms: mIRC All versions > Vulnerability: mirc-dcc-reveal-info > X-Force URL: http://www.iss.net/security_center/static/8393.php > > Date Reported: 03/08/2002 > Brief Description: Linksys EtherFast BEFVP41 Cable/DSL VPN Router weak > key encryption > Risk Factor: Low > Attack Type: Network Based > Platforms: Linksys EtherFast BEFVP41 > Vulnerability: linksys-etherfast-weak-encryption > X-Force URL: http://www.iss.net/security_center/static/8397.php > > Date Reported: 03/05/2002 > Brief Description: Kaffe OpenVM NoClassDefFoundError format string > Risk Factor: Low > Attack Type: Host Based > Platforms: Kaffe OpenVM 1.0.6 and prior > Vulnerability: openvm-class-format-strings > X-Force URL: http://www.iss.net/security_center/static/8399.php > > Date Reported: 03/07/2002 > Brief Description: Apache HTTP Server mod_frontpage buffer overflows > Risk Factor: High > Attack Type: Network Based > Platforms: FreeBSD Ports Collection All versions, Mandrake > Linux 8.0, Mandrake Linux 8.1 > Vulnerability: apache-modfrontpage-bo > X-Force URL: http://www.iss.net/security_center/static/8400.php > > Date Reported: 03/07/2002 > Brief Description: Windows 2000 allows an attacker to bypass password > policy > Risk Factor: Medium > Attack Type: Network Based > Platforms: Windows 2000 All versions > Vulnerability: win2k-password-bypass-policy > X-Force URL: http://www.iss.net/security_center/static/8402.php > > Date Reported: 03/04/2002 > Brief Description: KAME forged packet forwarding > Risk Factor: Low > Attack Type: Network Based > Platforms: FreeBSD 4.5-RELEASE, FreeBSD 4.5-STABLE, NetBSD > 1.5.2 > Vulnerability: kame-forged-packet-forwarding > X-Force URL: http://www.iss.net/security_center/static/8416.php > > Date Reported: 03/08/2002 > Brief Description: Xerver multiple 'C:/' requests denial of service > Risk Factor: Low > Attack Type: Network Based > Platforms: Xerver 2.10 > Vulnerability: xerver-multiple-request-dos > X-Force URL: http://www.iss.net/security_center/static/8419.php > > Date Reported: 03/08/2002 > Brief Description: Xerver "../" directory traversal > Risk Factor: Low > Attack Type: Network Based > Platforms: Xerver 2.10 > Vulnerability: xerver-dot-directory-traversal > X-Force URL: http://www.iss.net/security_center/static/8421.php > > Date Reported: 03/09/2002 > Brief Description: XTux server random character denial of service > Risk Factor: Low > Attack Type: Network Based > Platforms: XTux 20010601 > Vulnerability: xtux-server-dos > X-Force URL: http://www.iss.net/security_center/static/8422.php > > Date Reported: 03/08/2002 > Brief Description: FireWall-1 SecuRemote/SecuClient authentication > allows remote users to bypass "timeouts" > Risk Factor: Low > Attack Type: Network Based > Platforms: Check Point FireWall-1 4.0, Check Point FireWall-1 > 4.1 > Vulnerability: fw1-authentication-bypass-timeouts > X-Force URL: http://www.iss.net/security_center/static/8423.php > > Date Reported: 03/09/2002 > Brief Description: SurfControl SuperScout Email Filter long HELO or > RCPT TO: command denial of service > Risk Factor: Low > Attack Type: Network Based > Platforms: SuperScout Email Filter 3.5.1 > Vulnerability: surfcontrol-superscout-helo-dos > X-Force URL: http://www.iss.net/security_center/static/8424.php > > Date Reported: 03/10/2002 > Brief Description: InterScan VirusWall could allow virus infected Web > pages to bypass the HTTP proxy filtering > Risk Factor: Medium > Attack Type: Network Based > Platforms: InterScan VirusWall 3.6.x > Vulnerability: interscan-viruswall-http-proxy-bypass > X-Force URL: http://www.iss.net/security_center/static/8425.php > > Date Reported: 03/09/2002 > Brief Description: Citadel/UX long HELO command buffer overflow > Risk Factor: Low > Attack Type: Network Based > Platforms: Citadel/UX 5.90 and prior > Vulnerability: citadel-helo-bo > X-Force URL: http://www.iss.net/security_center/static/8426.php > > Date Reported: 03/11/2002 > Brief Description: zlib "double free" memory corruption > Risk Factor: High > Attack Type: Host Based / Network Based > Platforms: Debian Linux 2.2, EnGarde Secure Linux Community > Edition, Mandrake Linux 7.1, Mandrake Linux 7.2, > Mandrake Linux 8.0, Mandrake Linux 8.1, Mandrake > Linux Corporate Server 1.0.1, Mandrake Single > Network Firewall 7.2, OpenPKG 1.0, Red Hat Linux > 6.2, Red Hat Linux 7.0, Red Hat Linux 7.1, Red Hat > Linux 7.2, Red Hat Powertools 6.2, Red Hat > Powertools 7.0, Red Hat Powertools 7.1, SuSE eMail > Server III All versions, SuSE Linux 6.4, SuSE Linux > 7.0, SuSE Linux 7.1, SuSE Linux 7.2, SuSE Linux > 7.3, SuSE Linux Connectivity Server All versions, > SuSE Linux Database Server All versions, SuSE Linux > Enterprise Server 7, SuSE Linux Firewall All > versions, zlib 1.1.3 and earlier > Vulnerability: zlib-doublefree-memory-corruption > X-Force URL: http://www.iss.net/security_center/static/8427.php > > Date Reported: 03/10/2002 > Brief Description: Pi3Web Server 404 error page Web root directory > disclosure > Risk Factor: Low > Attack Type: Network Based > Platforms: Pi3Web 2.0 > Vulnerability: pi3web-error-disclosure > X-Force URL: http://www.iss.net/security_center/static/8428.php > > Date Reported: 03/10/2002 > Brief Description: Pi3Web asterisk (*) allows remote attacker to view > files > Risk Factor: Low > Attack Type: Network Based > Platforms: Pi3Web 2.0 > Vulnerability: pi3web-asterisk-view-files > X-Force URL: http://www.iss.net/security_center/static/8429.php > > Date Reported: 03/11/2002 > Brief Description: CaupoShop user information page cross-site > scripting > Risk Factor: Medium > Attack Type: Network Based > Platforms: CaupoShop 1.30a > Vulnerability: cauposhop-user-info-css > X-Force URL: http://www.iss.net/security_center/static/8431.php > > Date Reported: 03/10/2002 > Brief Description: GNU fileutils race condition > Risk Factor: Medium > Attack Type: Host Based > Platforms: GNU fileutils 4.0 up to 4.1.6 > Vulnerability: gnu-fileutils-race-condition > X-Force URL: http://www.iss.net/security_center/static/8432.php > > Date Reported: 03/11/2002 > Brief Description: SMS Server Tools format string attack > Risk Factor: High > Attack Type: Host Based / Network Based > Platforms: SMS Server Tools 1.4.7 and earlier > Vulnerability: sms-tools-format-string > X-Force URL: http://www.iss.net/security_center/static/8433.php > > Date Reported: 03/12/2002 > Brief Description: PHP FirstPost path disclosure > Risk Factor: Low > Attack Type: Network Based > Platforms: PHP FirstPost 0.1 > Vulnerability: phpfirstpost-path-disclosure > X-Force URL: http://www.iss.net/security_center/static/8434.php > > Date Reported: 03/11/2002 > Brief Description: SunSolve CGI scripts could allow remote command > execution > Risk Factor: High > Attack Type: Network Based > Platforms: Solaris 7, Solaris 8 > Vulnerability: sunsolve-cd-command-execution > X-Force URL: http://www.iss.net/security_center/static/8435.php > > Date Reported: 03/11/2002 > Brief Description: ZyXEL ZyWALL 10 malformed ARP packet denial of > service > Risk Factor: Low > Attack Type: Network Based > Platforms: ZyWALL 10 prior to V3.50(WA.2) > Vulnerability: zyxel-zywall10-arp-dos > X-Force URL: http://www.iss.net/security_center/static/8436.php > > Date Reported: 03/12/2002 > Brief Description: Black Tie Project non-existent category ID path > disclosure > Risk Factor: Low > Attack Type: Network Based > Platforms: Black Tie Project (BTP) 0.4b, Black Tie Project > (BTP) 0.5, Black Tie Project (BTP) 0.5b > Vulnerability: btp-cid-path-disclosure > X-Force URL: http://www.iss.net/security_center/static/8439.php > > Date Reported: 03/10/2002 > Brief Description: Marcus Xenakis directory.php allows malicious user > to execute commands > Risk Factor: High > Attack Type: Network Based > Platforms: directory.php All versions > Vulnerability: xenakis-directory-execute-commands > X-Force URL: http://www.iss.net/security_center/static/8440.php > > Date Reported: 03/11/2002 > Brief Description: PHP ImgList "../" directory traversal > Risk Factor: Low > Attack Type: Network Based > Platforms: PHP ImgList prior to 1.2.2 > Vulnerability: phpimglist-dot-directory-traversal > X-Force URL: http://www.iss.net/security_center/static/8441.php > > Date Reported: 03/11/2002 > Brief Description: Caldera OpenServer dlvr_audit buffer overflow > Risk Factor: High > Attack Type: Host Based > Platforms: Caldera OpenServer 5.0.5, Caldera OpenServer 5.0.6 > Vulnerability: openserver-dlvraudit-bo > X-Force URL: http://www.iss.net/security_center/static/8442.php > > Date Reported: 03/10/2002 > Brief Description: Ecartis does not drop root privileges > Risk Factor: High > Attack Type: Host Based > Platforms: Ecartis 1.0.0 and prior > Vulnerability: ecartis-root-privileges > X-Force URL: http://www.iss.net/security_center/static/8444.php > > Date Reported: 03/10/2002 > Brief Description: Ecartis local buffer overflows in moderate.c and > lcgi.c > Risk Factor: High > Attack Type: Host Based > Platforms: Ecartis prior to 1.0.0 > Vulnerability: ecartis-local-bo > X-Force URL: http://www.iss.net/security_center/static/8445.php > > Date Reported: 03/13/2002 > Brief Description: Web+ long WML script request buffer overflow > Risk Factor: High > Attack Type: Network Based > Platforms: Web+ 4.6, Web+ 5.0 > Vulnerability: webplus-wml-bo > X-Force URL: http://www.iss.net/security_center/static/8446.php > > Date Reported: 03/13/2002 > Brief Description: PHProjekt filemanager module allows attacker to > include remote files > Risk Factor: Medium > Attack Type: Host Based / Network Based > Platforms: PHProjekt 3.1, PHProjekt 3.1a > Vulnerability: phpprojekt-filemanager-include-files > X-Force URL: http://www.iss.net/security_center/static/8448.php > > _____ > > Risk Factor Key: > > High Any vulnerability that provides an attacker with immediate > access into a machine, gains superuser access, or bypasses > a firewall. Example: A vulnerable Sendmail 8.6.5 version > that allows an intruder to execute commands on mail server. > Medium Any vulnerability that provides information that has a high > potential of giving system access to an intruder. Example: > A misconfigured TFTP or vulnerable NIS server that allows > an intruder to get the password file that could contain an > account with a guessable password. > Low Any vulnerability that provides information that could > potentially lead to a compromise. Example: A finger that > allows an intruder to find out who is online and potential > accounts to attempt to crack passwords via brute force > methods. > > ______ > > About Internet Security Systems (ISS) > Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a > pioneer and world leader in software and services that protect critical > online resources from an ever-changing spectrum of threats and misuse. > Internet Security Systems is headquartered in Atlanta, GA, with > additional operations throughout the Americas, Asia, Australia, Europe > and the Middle East. > > Copyright (c) 2002 Internet Security Systems, Inc. All rights reserved > worldwide. > > Permission is hereby granted for the electronic redistribution of this > document. It is not to be edited or altered in any way without the > express written consent of the Internet Security Systems X-Force. If you > wish to reprint the whole or any part of this document in any other > medium excluding electronic media, please email [EMAIL PROTECTED] for > permission. > > Disclaimer: The information within this paper may change without notice. > Use of this information constitutes acceptance for use in an AS IS > condition. There are NO warranties, implied or otherwise, with regard to > this information or its use. Any use of this information is at the > user's risk. In no event shall the author/distributor (Internet Security > Systems X-Force) be held liable for any damages whatsoever arising out > of or in connection with the use or spread of this information. > > X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, > as well as at http://www.iss.net/security_center/sensitive.php > > Please send suggestions, updates, and comments to: X-Force > [EMAIL PROTECTED] of Internet Security Systems, Inc. > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.3a > Charset: noconv > > iQCVAwUBPJZ6PjRfJiV99eG9AQE77QP+P1SYgMPKR19MovNoxt3dcxOt4yVQ8vEz > MwIblnIJ7HdwxMT/ncSw3LU+02+Xg7+eYezGxqqzRUL0QCiZnVxf2dS5ImTkwcDP > u8t6pTzIAldUgfl1pm+EM/qmRMqQQsGYY8DphCqjpBhhXX6HxH0qSWCYVua/X15R > IXsasnQdLWI= > =jEWz > -----END PGP SIGNATURE----- > > --------------------------------------------------------- Archived messages from this list can be found at: http://www.mail-archive.com/tech-cord@aea5.k12.ia.us/ ---------------------------------------------------------