Summary of Security Items from October 12 through October 18, 2005
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, therefore the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
Note: Even though a vulnerability may allow several malicious acts to be performed, only the highest level risk will be defined in the Risk column.
High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Windows Microsoft Distribution Transaction Coordinator (MSDTC) and COM+
A buffer overflow vulnerability has been reported in Windows MSDTC and COM+ that could let local or remote malicious users execute arbitrary code, obtain elevated privileges or cause a Denial of Service.
A vulnerability has been reported due to the insecure creation of several temporary files in the default configuration, which could let a remote malicious overwrite arbitrary files.
No workaround or patch available at time of publishing.
There is no exploit code required.
Flexbackup Insecure Temporary File Creation
Medium
ZATAZ Flexbackup Advisory, October 15, 2005
Gentoo Linux
Gentoo Linux
Vulnerabilities have been reported in multiple packages in Gentoo Linux due to an insecure RUNPATH vulnerability, which could let a malicious user obtain elevated privileges.
Gentoo Linux Security Advisory, GLSA 200510-14, October 17, 2005
GNU
gzip 1.2.4 a, 1.2.4, 1.3.3-1.3.5
A Directory Traversal vulnerability has been reported due to an input validation error when using 'gunzip' to extract a file with the '-N' flag, which could let a remote malicious user obtain sensitive information.
Trustix Secure Linux Security Advisory,
TSLSA-2005-0018,
May 6, 2005
Gentoo Linux Security Advisory, GLSA 200505-05, May 9, 2005
Security Focus,13290, May 11, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:092, May 19, 2005
Turbolinux Security Advisory, TLSA-2005-59, June 1, 2005
FreeBSD
Security Advisory, FreeBSD-SA-05:11, June 9, 2005
OpenPKG Security Advisory, OpenPKG-SA-2005.009, June 10, 2005
RedHat Security Advisory,
RHSA-2005:357-19, June 13, 2005
SGI Security Advisory, 20050603-01-U, June 23, 2005
Conectiva Linux Announce-ment, CLSA-2005:974, July 6, 2005
Debian Security Advisory DSA 752-1, July 11, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101816, July 20, 2005
Avaya Security Advisory, ASA-2005-172, August 29, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101816, Updated September 27, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101816, Updated October 13, 2005
GNU
Texinfo 4.7
A vulnerability has been reported in 'textindex.c' due to insecure creation of temporary files by the 'sort_offline()' function, which could let a malicious user create/ overwrite arbitrary files.
Security Focus, Bugtraq ID: 14854, September 15, 2005
Gentoo Linux Security Advisory, GLSA 200510-04, October 5, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:175, October 6, 2005
Ubuntu Security Notice, USN-194-1, October 06, 2005
SUSE Security Summary Report, SUSE-SR:2005:023, October 14, 2005
GNU
gzip 1.2.4, 1.3.3
A vulnerability has been reported when an archive is extracted into a world or group writeable directory, which could let a malicious user modify file permissions.
Trustix Secure Linux Security Advisory,
TSLSA-2005-0018,
May 6, 2005
Gentoo Linux Security Advisory, GLSA 200505-05, May 9, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:092,
May 19, 2005
Turbolinux Security Advisory, TLSA-2005-59, June 1, 2005
FreeBSD Security Advisory, FreeBSD-SA-05:11, June 9, 2005
RedHat Security Advisory,
RHSA-2005:357-19, June 13, 2005
SGI Security Advisory, 20050603-01-U, June 23, 2005
Conectiva Linux Announce-ment, CLSA-2005:974, July 6, 2005
Debian Security Advisory DSA 752-1, July 11, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101816, July 20, 2005
Avaya Security Advisory, ASA-2005-172, August 29, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101816, Updated September 27, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101816, Updated October 13, 2005
Graphviz
Graphviz 2.2.1
A vulnerability has been reported in '/dotty/dotty/
dotty.lefty' due to the insecure creation of temporary files, which could let a malicious user overwrite arbitrary files.
Debian Security Advisory, DSA 857-1, October 10, 2005
Ubuntu Security Notice, USN-208-1, October 17, 2005
Grip
Grip 3.1.2, 3.2 .0
A buffer overflow vulnerability has been reported in the CDDB protocol due to a boundary error, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code.
Fedora Update Notifications,
FEDORA-2005-
202 & 203,
March 9, 2005
Gentoo Linux
Security Advisory,
GLSA 200503-21,
March 17, 2005
RedHat Security Advisory, RHSA-2005:304-08,
March 28, 2005
Mandrakelinux Security Update Advisory,
MDKSA-2005:066,
April 3, 2005
Gentoo Linux Security Advisory, GLSA 200504-07, April 8, 2005
SUSE Security Summary Report, SUSE-SR:2005:010, April 8, 2005
Mandriva Linux Security Update Advisories, MDKSA-2005:074 & 075, April 21, 2005
Peachtree Linux Security Notice, PLSN-0007, April 22, 2005
Fedora Legacy Update Advisory, FLSA:152919, September 15, 2005
Conectiva Linux Announcement, CLSA-2005:1033, October 13, 2005
Hewlett Packard Company
HP-UX 11.23, B.11.23
A Denial of Service vulnerability has been reported in systems running on Itanium platforms due to a failure to properly handle exceptional conditions.
Currently we are not aware of any exploits for this vulnerability.
HP-UX Itanium Denial of Service
Low
HP Security Bulletin, HPSBUX01233, October 12, 2005
Hewlett Packard Company
HP-UX 10.20, B.11.11, B.11.00
A vulnerability has been reported in the FTP server included with HP-UX , which could let an unauthenticated malicious user obtain sensitive information.
Reports indicate that HP has addressed this issue in HP advisory HPSBUX0208-213.
There is no exploit code required; however, a Proof of Concept exploit script has been published.
HP-UX FTP Server Directory Listing
Medium
Security Focus, Bugtraq ID: 15138, October 19, 2005
Hewlett Packard Company
HP-UX 10.20, B.11.11, B.11.00
A vulnerability has been reported in the LPD service, which could let a remote malicious user execute arbitrary commands.
Reports indicate that HP has addressed this issue in HP advisory HPSBUX0208-213.
There is no exploit code required; however, a Proof of Concept exploit script has been published.
HP-UX LPD Arbitrary Command Execution
High
Security Focus, Bugtraq ID: 15136, October 19, 2005
Hylafax
Hylafax 4.2.1
Several vulnerabilities have been reported: a vulnerability was reported in the 'xferfaxstats' script due to the insecure creation of temporary files, which could let a remote malicious user create/
overwrite arbitrary files; and a vulnerability was reported because ownership of the UNIX domain socket is not created or verified, which could let a malicious user obtain sensitive information and cause a Denial of Service.
Security Focus, Bugtraq ID: 14907, September 22, 2005
Gentoo Linux Security Advisory, GLSA 200509-21, September 30, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:177, October 7, 2005
Debian Security Advisory, DSA 865-1, October 13, 2005
IBM
AIX 5.3
Buffer overflow vulnerabilities have been reported in the 'invscout,' 'paginit,' 'diagTasksWebSM,' 'getlvname,' and 'swcons' commands and multiple 'p' commands, which could let a malicious user execute arbitrary code, potentially with root privileges.
IBM has released an advisory (IBM-06-10-2005) to address this and other issues.
Updated APAR availability information. Removed interim fix information.
IBM Security Advisory, IBM-06-10-2005, June 10, 2005
Security Focus, 13909, July 7, 2005
IBM Security Advisory, September 13, 2005
IBM Security Advisory Updated October 19, 2005
IBM
AIX 5.2.2, 5.2 L, 5.2
A vulnerability has been reported because AIX 'lscfg' command creates temporary trace files in an unsafe manner, which could let a malicious user obtain elevated privileges.
Security Focus, Bugtraq ID: 15060, October 11, 2005
Ubuntu Security Notice, USN-202-1, October 12, 2005
Gentoo Linux Security Advisory, GLSA 200510-12, October 12, 2005
Ubuntu Security Notice, USN-202-1, October 12, 2005
Marc Lehmann
Convert-UUlib 1.50
A buffer overflow vulnerability has been reported in the Convert::UUlib module for Perl due to a boundary error, which could let a remote malicious user execute arbitrary code.
A vulnerability has been reported in OpenLDAP, 'pam_ldap,' and 'nss_ldap' when a connection to a slave is established using TLS and the client is referred to a master, which could let a remote malicious user obtain sensitive information.
Several vulnerabilities have been reported: a vulnerability was reported in '/bin/cfmailfilter' and '/contrib/cfcron.in' due to the insecure creation of temporary files, which could let a remote malicious user create/
overwrite arbitrary files; and a vulnerability was reported in 'contrib/vicf.in/ due to the insecure creation of temporary files, which could let a remote malicious user create/
overwrite arbitrary files.
Debian Security Advisories, DSA 835-1 & 836-1, October 1, 2005
Ubuntu Security Notice, USN-198-1, October 10, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:184, October 13, 2005
Multiple Vendors
zlib 1.2.2, 1.2.1, 1.2 .0.7, 1.1-1.1.4, 1.0-1.0.9; Ubuntu Linux 5.0 4, powerpc, i386, amd64, 4.1 ppc, ia64, ia32; SuSE Open-Enterprise-Server 9.0, Novell Linux Desktop 9.0, Linux Professional 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Personal 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Enterprise Server 9; Gentoo Linux;
FreeBSD 5.4, -RELENG, -RELEASE, -PRERELEASE, 5.3, -STABLE, -RELENG, -RELEASE;
Debian Linux 3.1, sparc, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, alpha; zsync 0.4, 0.3-0.3.3, 0.2-0.2.3 , 0.1-0.1.6 1, 0.0.1-0.0.6
A buffer overflow vulnerability has been reported due to insufficient validation of input data prior to utilizing it in a memory copy operation, which could let a remote malicious user execute arbitrary code.
Apple Security Update 2005-007,
APPLE-SA-2005-08-15, August 15, 2005
SCO Security Advisory, SCOSA-2005.33, August 19, 2005
Security Focus, Bugtraq ID: 14162, August 26, 2005
Debian Security Advisory, DSA 797-1, September 1, 2005
Security Focus, Bugtraq ID: 14162, September 12, 2005
Fedora Legacy Update Advisory, FLSA:162680, September 14, 2005
Gentoo Linux Security Advisory, GLSA 200509-18, September 26, 2005
Debian Security Advisory, DSA 797-2, September 29, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101989, October 14, 2005
Multiple Vendors
Gentoo Linux;
GNU GDB 6.3
Multiple vulnerabilities have been reported: a heap overflow vulnerability was reported when loading malformed object files, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported which could let a malicious user obtain elevated privileges.
A vulnerability has been reported due to the way console keyboard mapping is handled, which could let a malicious user modify the console keymap to include scripted macro commands.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of Concept exploit has been published.
Linux Kernel Console Keymap Arbitrary Command Injection
Medium
Security Focus, Bugtraq ID: 15122, October 17, 2005
Multiple Vendors
MandrakeSoft Multi Network Firewall 2.0, Linux Mandrake 2006.0 x86_64, 2006.0, 10.2 x86_64, 10.2, Corporate Server 3.0 x86_64, 3.0;
GNU wget 1.10;
Daniel Stenberg curl 7.14.1, 7.13.1, 7.13, 7.12.1- 7.12.3, 7.11- 7.11.2, 7.10.6- 7.10.8
A buffer overflow vulnerability has been reported due to insufficient validation of user-supplied NTLM user name data, which could let a remote malicious user execute arbitrary code.
Security Tracker Alert ID: 1015056, October 13, 2005
Mandriva Linux Security Update Advisories, MDKSA-2005:182 & 183, October 13, 200
Ubuntu Security Notice, USN-205-1, October 14, 2005
Fedora Update Notifications
FEDORA-2005-995 & 996, October 17, 2005
Fedora Update Notification,
FEDORA-2005-1000, October 18, 2005
Multiple Vendors
RedHat Enterprise Linux WS 4, WS 3, 2.1, IA64, ES 4, ES 3, 2.1, IA64, AS 4, AS 3, AS 2.1, IA64, Desktop 4.0, 3.0, Advanced Workstation for the Itanium Processor 2.1, IA64; OpenSSL Project OpenSSL 0.9.3-0.9.8, 0.9.2 b, 0.9.1 c; FreeBSD 6.0 -STABLE, -RELEASE, 5.4 -RELENG, -RELEASE, 5.3 -STABLE, -RELENG, -RELEASE, 5.3, 5.2.1 -RELEASE, -RELENG, 5.2 -RELEASE, 5.2, 5.1 -RELENG, -RELEASE/Alpha, 5.1 -RELEASE-p5, -RELEASE, 5.1, 5.0 -RELENG, 5.0, 4.11 -STABLE, -RELENG, 4.10 -RELENG, -RELEASE, 4.10
A vulnerability has been reported due to the implementation of the 'SSL_OP_MSIE_
SSLV2_RSA_PADDING' option that maintains compatibility with third party software, which could let a remote malicious user bypass security.
A vulnerability has been reported in xntpd when started using the '-u' option and the group is specified by a string, which could let a malicious user obtain elevated privileges.
Fedora Update Notification,
FEDORA-2005-812, August 26, 2005
Ubuntu Security Notice, USN-175-1, September 01, 2005
Debian Security Advisory, DSA 801-1, September 5, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:156, September 6, 2005
Conectiva Linux Announcement, CLSA-2005:1029, October 11, 2005
Multiple Vendors
SuSE Open-Enterprise-Server 9.0, Linux Enterprise Server 9;
OpenWBEM 3.1 .0, 3.0.2, 2.0.14, 1.3.2
Multiple buffer overflow vulnerabilities have been reported due to insufficient bounds checking of user-supplied input before copying to insufficiently sized memory buffers, which could let a remote malicious user execute arbitrary code.
A buffer overflow vulnerability has been reported in the 'PNMToPNG' conversion package due to insufficient bounds checking of user-supplied input before coping to an insufficiently sized memory buffer, which could let a remote malicious user execute arbitrary code.
Ubuntu Security Notice, USN-210-1, October 18, 2005
Multiple Vendors
XFree86 X11R6 4.3 .0,
4.1 .0; X.org X11R6 6.8.2;
RedHat Enterprise Linux WS 2.1, IA64, ES 2.1, IA64, AS 2.1, IA64, Advanced Workstation for the Itanium Processor 2.1, IA64; Gentoo Linux
A buffer overflow vulnerability has been reported in the pixmap processing code, which could let a malicious user execute arbitrary code and possibly obtain superuser privileges.
Fedora Update Notifications,
FEDORA-2005-893 & 894, September 16, 2005
Trustix Secure Linux Security Advisory, TSLSA-2005-0049, September 16, 2005
Debian Security Advisory DSA 816-1, September 19, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101926, September 19, 2005
SUSE Security Announcement, SUSE-SA:2005:056, September 26, 2005
Slackware Security Advisory, SSA:2005-269-02, September 26, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101953, October 3, 2005
SUSE Security Summary Report, SUSE-SR:2005:023, October 14, 2005
Avaya Security Advisory, ASA-2005-218, October 19, 2005
Multiple Vendors
xine xine-lib 1.1.0, 1.0-1.0.2, 0.9.13; Ubuntu Linux 5.0 4 powerpc, i386, amd64, ppc, ia64, ia32;
Gentoo Linux
A format string vulnerability has been reported in 'input_cdda.c' when writing CD metadata retrieved from a CDDB server to a cache file, which could let a remote malicious user execute arbitrary code.
Trustix Secure
Linux Security Advisory, TSLSA-2005-0034,
July 8, 2005
Fedora Update Notifications,
FEDORA-2005
-561 & 562, July 13, 2005
RedHat Security Advisory, RHSA-2005:720-04, August 9, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:137, August 11, 2005
Ubuntu Security Notice, USN-190-1, September 29, 2005
RedHat Security Advisory, RHSA-2005:395-18, October 5, 2005
Conectiva Linux Announcement, CLSA-2005:1032, October 13, 2005
Avaya Security Advisory, ASA-2005-225, October 18, 2005
Net-snmp
Net-snmp 5.x
A vulnerability has been reported in 'fixproc' due to a failure to securely create temporary files in world writeable locations, which could let a malicious user obtain elevated privileges and possibly execute arbitrary code with ROOT privileges.
Gentoo Linux Security Advisory, GLSA 200508-22, August 31, 2005
Conectiva Linux Announcement, CLSA-2005:1027, October 14, 2005
RedHat Security Advisory, RHSA-2005:767-8, October 17, 2005
PCRE
PCRE 6.1, 6.0, 5.0
A vulnerability has been reported in 'pcre_compile.c' due to an integer overflow, which could let a remote/local malicious user potentially execute arbitrary code.
Gentoo Linux Security Advisory, GLSA 200509-19, September 27, 2005
Debian Security Advisory, DSA 821-1, September 28, 2005
Conectiva Linux Announcement, CLSA-2005:1013, September 27, 2005
Turbolinux Security Advisory, TLSA-2005-92, October 3, 2005
Avaya Security Advisory, ASA-2005-216, October 18, 2005
phpMyAdmin
phpMyAdmin 2.6.4 -pl1
A vulnerability has been reported in 'libraries/grab_
globals.lib.php' due to insufficient verification of the 'subform' array parameter before including files, which could let a malicious user include arbitrary files.
Mandriva Linux Security Update Advisory, MDKSA-2005:147, August 22, 2005
Turbolinux Security Advisory, TLSA-2005-91, September 20, 2005
RedHat Security Advisory, RHSA-2005:345-24, September 28, 2005
RedHat Security Advisory, RHSA-2005:346-19, October 5, 2005
Conectiva Linux Announcement, CLSA-2005:1028, October 11, 2005
Sun Microsystems Inc.
Solaris 10.0, _x86, 9.0, _x86, 8.0, _x86, 7.0, _x86
A vulnerability has been reported in the Xsun and Xprt commands due to an unspecified error, which could let a malicious user obtain elevated privileges.
Sun(sm) Alert Notification
Sun Alert ID: 101800, September 26, 2005
Avaya Security Advisory, ASA-2005-220, October 18, 2005
Sun Microsystems, Inc.
Solaris 10.0 _x86, 10.0
Several vulnerabilities have been reported: a Denial of Service vulnerability was reported in the 'privilege management' feature due to an unspecified error; and a vulnerability was reported in the Process File System (procfs) due to an unspecified security issue, which could let a malicious user obtain sensitive information.
SUSE Security Summary Report, SUSE-SR:2005:023, October 14, 2005
xloadimage
xloadimage 4.1
A buffer overflow vulnerability has been reported when handling the title of a NIFF image when performing zoom, reduce, or rotate functions, which could let a remote malicious user execute arbitrary code.
Debian Security Advisories, DSA 858-1 & 859-1, October 10, 2005
RedHat Security Advisory, RHSA-2005:802-4, October 18, 2005
YaPiG
YaPig 0.95 b
Multiple vulnerabilities have been reported: a Cross-Site Scripting vulnerability was reported due to insufficient sanitization of the 'Website' field when adding a comment, which could let a remote malicious user execute arbitrary HTML and script code; a Cross-Site Scripting vulnerability was reported in 'view.php' due to insufficient sanitization of the 'img_size' parameter before returning to the user, which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability was reported because users can perform certain actions via HTTP POST requests without validity checks, which could let a remote malicious user perform certain administrative tasks.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of Concept exploit has been published.
Yapig Cross-Site Scripting & HTTP POST Requests Validity
Medium
Technical University of Vienna Security Advisory
TUVSA-0510-001, October 13, 2005
Yukihiro Matsumoto
Ruby 1.6 - 1.6.8, 1.8 - 1.8.2
A vulnerability has been reported in 'eval.c' due to a flaw in the logic that implements the SAFE level checks, which could let a remote malicious user bypass access restrictions to execute scripting code.
Multiple stack-based buffer overflow vulnerabilities have been reported due to insufficient bounds checking of user-supplied data prior to copying it to an insufficiently sized memory buffer while importing RTF files, which could let a remote malicious user execute arbitrary code.
The vendor has addressed this issue in AbiWord version 2.2.11. Users are advised to contact the vendor to obtain the appropriate update.
Ubuntu Security Notice, USN-203-1, October 13, 2005
Fedora Update Notification,
FEDORA-2005-989, October 13, 2005
Accelerated Mortgage Manager
Accelerated Mortgage Manager
An SQL injection vulnerability has been reported in the 'Password' field due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code.
No workaround or patch available at time of publishing.
There is no exploit code required; however a Proof of Concept exploit has been published.
Accelerated Mortgage Manager SQL Injection
Medium
Security Focus, Bugtraq ID: 15097, October 13, 2005
AdventNet
ManageEngine NetFlow Analyzer 4.0
A Cross-Site Scripting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of Concept exploit has been published.
NetFlow Analyzer Cross-Site Scripting
Medium
Security Focus, Bugtraq ID: 15127, October 18, 2005
Australian Projects Pty Limited
Trust Digital Trusted Mobility Suite 3.0, 2.0
A vulnerability has been reported because a malicious user can bypass authentication policies.
No workaround or patch available at time of publishing.
There is no exploit code required.
Trust Digital Trusted Mobility Suite Authentication Bypass
Medium
Security Focus, Bugtraq ID: 15109, October 14, 2005
Cisco Systems
Cisco IOS 12.2ZH & 12.2ZL based trains,
12.3 based trains,
12.3T based trains,
12.4 based trains,
12.4T based trains
A buffer overflow vulnerability has been reported in the authentication proxy, which could let a remote malicious user cause a Denial of Service or potentially execute arbitrary code.
Currently we are not aware of any exploits for this vulnerability.
Cisco 11500 Content Services Switch Malformed SSL Client Certificate Remote Denial of Service
Low
Cisco Security Advisory, Document ID: 67919, October 19, 2005
Complete PHP Counter
Complete PHP Counter
An SQL injection & Cross-Site Scripting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary SQL code and HTML and script code.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of Concept exploits have been published.
Multiple vulnerabilities have been reported: a remote Denial of Service vulnerability was reported in the Computer Associates Message Queuing (CAM) service due to an unspecified error when specially crafted packets are submitted to the TCP port; buffer overflow vulnerabilities were reported due to unspecified boundary errors, which could lead to the execution of arbitrary code; and a vulnerability was reported due to a failure in the CAM service to verify the legitimacy of the CAFT application, which could let a remote malicious user spoof a legitimate CAFT instance and ultimately execute arbitrary code.
Security Focus, Bugtraq ID: 14622, October 19, 2005
e107.org
e107 website system 0.6172, 0.6171, 0.617
An SQL injection vulnerability has been reported in 'resetcore.php' due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code.
No workaround or patch available at time of publishing.
There is no exploit code required; however, a Proof of Concept exploit script has been published.
E107 SQL Injection
Medium
Security Focus, Bugtraq ID: 15125, October 18, 2005
Gallery
Gallery 2.0 Beta1-Beta3, 2.0 Alpha-Alpha4, 2.0
A Directory Traversal vulnerability has been reported in the 'main.php' script due to insufficient sanitization of the 'g2_itemID' parameter, which could let a remote malicious user obtain sensitive information.
Currently we are not aware of any exploits for this vulnerability.
Hitachi TP1/Server Base Remote Denial of Service
Low
Hitachi Security Advisory, HS05-020, October 13, 2005
IBM
DB2 Universal Database for Windows 8.1.9 a, 8.1.9, 8.1.8 a, 8.1.8, 8.1.7 b, 8.1.7, 8.1.6 c, 8.1.6, 8.1.5, 8.1.4, 8.1, 8.0, DB2 Universal Database for Solaris 8.1.9 a, 8.1.9, 8.1.8 a, 8.1.8, 8.1.7 b, 8.1.7, 8.1.6 c, 8.1.6, 8.1.5, 8.1.4, 8.1, 8.0, DB2 Universal Database for Linux 8.1.9 a, 8.1.9, 8.1.8 a, 8.1.8, 8.1.7 b, 8.1.7, 8.1.6 c, 8.1.6, 8.1.5, 8.1.4, 8.1, 8.0, DB2 Universal Database for HP-UX 8.1.9 a, 8.1.9, 8.1.8 a, 8.1.8, 8.1.7 b, 8.1.7, 8.1.6 c, 8.1.6, 8.1.5, 8.1.4, 8.1, 8.0 , DB2 Universal Database for AIX 8.1.9 a, 8.1.9, 8.1.8 a, 8.1.8, 8.1.7 b, 8.1.7, 8.1.6 c, 8.1.6, 8.1.5, 8.1.4, 8.1, 8.0
Multiple vulnerabilities have been reported: a Denial of Service vulnerability was reported when handling SQL queries that contain constant strings; a Denial of Service vulnerability was reported when processing hash joins; a Denial of Service vulnerability was reported in 'db2agents' due to an error when handling abnormally terminated connections; a vulnerability was reported when handling object creations due to an error, which could let a malicious user create objects based on routines even when the user is not granted execute privileges; a Denial of Service vulnerability was reported in the 'in' list or the 'SYSCAT.TABLES' when handling a query that contains more than 32000 elements; and a Denial of Service vulnerability was reported in the 'db2jd' listener service when handling connections from certain clients.
Currently we are not aware of any exploits for these vulnerabilities.
IBM DB2 Universal Database Denials of Service & Security Restriction Bypass
Medium
Secunia Advisory: SA17031, October 18, 2005
Mozilla.
org
Thunderbird 1.5 Beta 2, 1.0.7
A vulnerability has been reported due to an insecure SMTP authentication protocol negotiation, which could let a remote malicious user obtain sensitive information.
No workaround or patch available at time of publishing.
There is no exploit code required.
Mozilla Thunderbird Insecure SMTP Authentication Protocol Negotiation
Medium
Security Focus, Bugtraq ID: 15106, October 14, 2005
Mozilla.org
Firefox 0.x, 1.x
Multiple vulnerabilities have been reported: a vulnerability was reported due to an error because untrusted events generated by web content are delivered to the browser user interface; a vulnerability was reported because scripts in XBL controls can be executed even when JavaScript has been disabled; a vulnerability was reported because remote malicious users can execute arbitrary code by tricking the user into using the 'Set As Wallpaper' context menu on an image URL that is really a javascript; a vulnerability was reported in the 'InstallTrigger.install()' function due to an error in the callback function, which could let a remote malicious user execute arbitrary code; a vulnerability was reported due to an error when handling 'data:' URL that originates from the sidebar, which could let a remote malicious user execute arbitrary code; an input validation vulnerability was reported in the 'InstallVersion.compareTo()' function when handling unexpected JavaScript objects, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because it is possible for remote malicious user to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL; a vulnerability was reported due to an error when handling DOM node names with different namespaces, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported due to insecure cloning of base objects, which could let a remote malicious user execute arbitrary code.
Ubuntu Security Notices, USN-157-1 & 157-2 August 1& 2, 2005
SUSE Security Announcement, SUSE-SA:2005:045, August 11, 2005
Debian Security Advisory, DSA 775-1, August 15, 2005
SGI Security Advisory, 20050802-01-U, August 15, 2005
Debian Security Advisory, DSA 777-1, August 17, 2005
Debian Security Advisory, DSA 779-1, August 20, 2005
Debian Security Advisory, DSA 781-1, August 23, 2005
Gentoo Linux Security Advisory, GLSA 200507-24, August 26, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:127-1, August 26, 2005
Slackware Security Advisory, SSA:2005-085-01, August 28, 2005
Debian Security Advisory, DSA 779-2, September 1, 2005
Debian Security Advisory, DSA 810-1, September 13, 2005
Fedora Legacy Update Advisory, FLSA:160202, September 14, 2005
HP Security Bulletin, HPSBOV01229, September 19, 2005
HP Security Bulletin,
HPSBUX01230, October 3, 2005
Ubuntu Security Notice, USN-155-3, October 04, 2005
Sun(sm) Alert Notification
Sun Alert ID: 101952, October 17, 2005
Mozilla.org
Netscape 8.0.3.3, 7.2;
Mozilla Firefox 1.5 Beta1, 1.0.6;
Mozilla Browser 1.7.11; Mozilla Thunderbird 1.0.6
A buffer overflow vulnerability has been reported due to an error when handling IDN URLs that contain the 0xAD character in the domain name, which could let a remote malicious user execute arbitrary code.
Gentoo Linux Security Advisory GLSA 200509-11, September 18, 2005
Security Focus, Bugtraq ID: 14784, September 22, 2005
Slackware Security Advisory, SSA:2005-269-01, September 26, 2005
Gentoo Linux Security Advisory [UPDATE], GLSA 200509-11:02, September 29, 2005
Conectiva Linux Announcement, CLSA-2005:1017, September 28, 2005
Fedora Update Notifications,
FEDORA-2005-962 & 963, September 30, 2005
Debian Security Advisory, DSA 837-1, October 2, 2005
Turbolinux Security Advisory, TLSA-2005-93, October 3, 2005
HP Security Bulletin,
HPSBUX01231, October 3, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:174, October 6, 2005
HP Security Bulletin,
HPSBUX01231 Rev 1, October 12, 2005
Multiple Vendors
Mozilla Firefox 1.0-1.0.6; Mozilla Browser 1.7-1.7.11; Netscape Browser 8.0.3.3
Multiple vulnerabilities have been reported: a heap overflow vulnerability was reported when processing malformed XBM images, which could let a remote malicious user execute arbitrary code; a vulnerability was reported when unicode sequences contain 'zero-width non-joiner' characters, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; a vulnerability was reported due to a flaw when making XMLHttp requests, which could let a remote malicious user spoof XMLHttpRequest headers; a vulnerability was reported because a remote malicious user can create specially crafted HTML that spoofs XML objects to create an XBL binding to execute arbitrary JavaScript with elevated (chrome) permissions; an integer overflow vulnerability was reported in the JavaScript engine, which could let a remote malicious user obtain unauthorized access; a vulnerability was reported because a remote malicious user can load privileged 'chrome' pages from an unprivileged 'about:' page, which could lead to unauthorized access; and a window spoofing vulnerability was reported when a blank 'chrom' canvas is obtained by opening a window from a reference to a closed window, which could let a remote malicious user conduct phishing type attacks.
Mandriva Linux Security Update Advisory, MDKSA-2005:169 & 170, September 26, 2005
Fedora Update Notifications,
FEDORA-2005-926-934, September 26, 2005
Slackware Security Advisory, SSA:2005-269-01, September 26, 2005
SGI Security Advisory, 20050903-02-U, September 28, 2005
Conectiva Linux Announcement, CLSA-2005:1017, September 28, 2005
Gentoo Linux Security Advisory [UPDATE] , September 29, 2005
SUSE Security Announcement, SUSE-SA:2005:058, September 30, 2005
Fedora Update Notifications,
FEDORA-2005-962 & 963, September 30, 2005
Debian Security Advisory, DSA 838-1, October 2, 2005
Turbolinux Security Advisory, TLSA-2005-93, October 3, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:174, October 6, 2005
Ubuntu Security Notice, USN-200-1, October 11, 2005
Security Focus, Bugtraq ID: 14916, October 19, 2005
Multiple Vendors
Snort Project Snort 2.4.0-2.4.2; Nortel Networks Threat Protection System Intrusion Sensor 4.1,
Nortel Networks Threat Protection System Defense Center 4.1
A buffer overflow vulnerability has been reported in the Back Orifice processor due to a failure to securely copy network-derived data into sensitive process buffers,
which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing.
Currently we are not aware of any exploits for this vulnerability.
Snort Back Orifice Preprocessor Remote Buffer Overflow
Ubuntu Linux 5.0 4 powerpc, i386, amd64, 4.1 ppc, ia64, ia32;
AbiSource Community AbiWord 2.2 .0-2.2.9, 2.0.1-2.0.9
A buffer overflow vulnerability has been reported in the RTF importer due to a boundary error, which could let a remote malicious user execute arbitrary code.
Security Tracker Alert ID: 1014982, September 28, 2005
Ubuntu Security Notice, USN-188-1, September 29, 2005
Fedora Update Notification,
FEDORA-2005-955, September 30, 2005
Gentoo Linux Security Advisory, GLSA 200509-20, September 30, 2005
Conectiva Linux Announcement, CLSA-2005:1035, October 14, 2005
SUSE Security Summary Report, SUSE-SR:2005:023, October 14, 2005
Multiple Vendors
University of Kansas Lynx 2.8.6 dev.1-dev.13, 2.8.5 dev.8, 2.8.5 dev.2-dev.5, 2.8.5, 2.8.4 rel.1, 2.8.4, 2.8.3 rel.1, 2.8.3 pre.5, 2.8.3 dev2x, 2.8.3 dev.22, 2.8.3, 2.8.2 rel.1, 2.8.1, 2.8, 2.7;
RedHat Enterprise Linux WS 4, WS 3, 2.1, ES 4, ES 3, ES 2.1, AS 4, AS 3, AS 2.1,
RedHat Desktop 4.0, 3.0,
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
A buffer overflow vulnerability has been reported in the 'HTrjis()' function when handling NNTP article headers, which could let a remote malicious user execute arbitrary code.
Gentoo Linux Security Advisory, GLSA 200510-15, October 17, 2005
Ubuntu Security Notice, USN-206-1, October 17, 2005
RedHat Security Advisory, RHSA-2005:803-4, October 17, 2005
Fedora Update Notifications,
FEDORA-2005-993 & 994, October 17, 2005
Mandriva Linux Security Update Advisory, MDKSA-2005:186, October 18, 2005
Conectiva Linux Announcement, CLSA-2005:1037, October 19, 2005
MySource
MySource 2.14.0RC2, 2.14 .0
Several vulnerabilities have been reported: a vulnerability was reported due to insufficient verification of some input before used to include files, which could let a remote malicious user include arbitrary files; and Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of some input before returning to the user, which could let a remote malicious user execute arbitrary HTML and script code.
There is no exploit code required; however, Proof of Concept exploits have been published.
MySource Cross-Site Scripting & File Inclusion
High
Secunia Advisory: SA16946, October 18, 2005
OpenSSH
OpenSSH 4.1, 4.0, p1
Several vulnerabilities have been reported: a vulnerability was reported due to an error when handling dynamic port forwarding when no listen address is specified, which could let a remote malicious user cause "GatewayPorts" to be incorrectly activated; and a vulnerability was reported due to an error when handling GSSAPI credential delegation, which could let a remote malicious user be delegated with GSSAPI credentials.
A remote Denial of Service vulnerability has been reported when parsing certain malformed HTML content.
No workaround or patch available at time of publishing.
Proof of Concept exploits have been published.
Opera Web Browser Malformed HTML Parsing Remote Denial of Service
Low
Security Focus, Bugtraq ID: 15124, October 17, 2005
Oracle Corporation
JD Edwards EnterpriseOne 8.x, OneWorld 8.x;
Oracle Application Server 10g, Collaboration Suite Release 1, 2, Database 8.x, Database Server 10g, Developer Suite 10g, E-Business Suite 11i, Enterprise Manager 10.x, 9.x,
Oracle9i Application Server,
Oracle9i Database Enterprise Edition,
Oracle9i Database Standard Edition, Workflow 11.5.9 .5, 11.5.1;
PeopleSoft Enterprise Customer Relationship Management (CRM) 8.x, EnterpriseOne Applications 8.x
85 vulnerabilities have been reported in various Oracle products. Some have an unknown impact, and others can be exploited to conduct SQL injection attacks, Cross-Site Scripting attacks, or potentially to compromise a vulnerable system.
A vulnerability has been reported in the 'open_basedir' directive due to the way PHP handles it, which could let a remote malicious user obtain sensitive information.
Security Focus, Bugtraq ID: 14957, September 27, 2005
Ubuntu Security Notice, USN-207-1, October 17, 2005
PHP
PHP 5.0.5
Multiple vulnerabilities have been reported which could let a remote malicious user bypass the 'safedir' directory restriction.
These issues have been addressed in the latest CVS. Users are advised to contact the vendor to obtain updates.
There is no exploit code required; however, Proof of Concept exploits have been published.
PHP Safedir Restriction Bypass
Medium
Security Focus, Bugtraq ID: 15119, October 17, 2005
PHPNUke
PHPNuke 7.9, 7.8
A Directory Traversal vulnerability has been reported in 'Modules.php' due to insufficient sanitization, which could let a remote malicious user obtain sensitive information.
An SQL injection vulnerability was reported in the search module due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code.
There is no exploit code required; however a Proof of Concept exploit and exploit script has been published.
PHPWebSite Search Module SQL Injection
Medium
Security Focus, Bugtraq ID: 15088, October 12, 2005
PunBB
PunBB 1.2.1-1.2.8
An SQL injection vulnerability has been reported in 'search.php' due to insufficient sanitization of the 'old_
searches' array parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code.
There is no exploit code required; however, a Proof of Concept exploit has been published.
PunBB SQL Injection
Medium
KAPDA New advisory #6, October 14, 2005
RTasarim WebAdmin
RTasarim WebAdmin
An SQL injection vulnerability has been reported due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code.
No workaround or patch available at time of publishing.
There is no exploit code required.
RTasarim WebAdmin Login SQL Injection
Medium
Security Focus, Bugtraq ID: 15107, October 14, 2005
Stani's Python Editor
SPE 0.7.5
A vulnerability has been reported because files belonging to SPE are installed with world-writable permissions, which could let a malicious user obtain elevated privileges.
Symantec Brightmail AntiSpam Remote Denial of Service
Low
Symantec Security Advisory, SYM05-019, October 12, 2005
W-Agora
W-Agora 4.2
Several vulnerabilities have been reported: a vulnerability was reported in 'extras/
quicklist.php' due to insufficient verification of the 'site' parameter before used to include files, which could let a malicious user include arbitrary files; and a vulnerability was reported in 'browse_
avatar.php' because arbitrary files can be uploaded inside the web root, which could let a malicious user execute arbitrary PHP script code.
No workaround or patch available at time of publishing.
There is no exploit code required; however, an exploit script has been published.
W-Agora File Inclusion & File Upload
High
Secunia Advisory: SA17201, October 17, 2005
WebGUI
WebGUI 6.6.0- 6.7.5, 6.5.0-6.5.6, 6.4.0, 6.3.0
A vulnerability has been reported due to an unspecified error, which could let a remote malicious user execute arbitrary code.
There is no exploit code required; however, a Proof of Concept exploit has been published.
WebGUI Unspecified Arbitrary Code Execution
High
Security Focus, Bugtraq ID: 15083, October 12, 2005
Xeobook
Xeobook 0.93
Multiple HTML injection vulnerabilities have been reported due to insufficient sanitization of input passed to various fields when signing the guestbook, which could let a remote malicious user execute arbitrary script code.
No workaround or patch available at time of publishing.
There is no exploit code required.
Xeobook Multiple HTML Injection
Medium
Secunia Advisory: SA17159, October 12, 2005
Xerver
Xerver 4.17
Several vulnerabilities have been reported: a vulnerability was reported because a remote malicious user can obtain the source code of script files when appending a dot to the filename in an HTTP request; and a vulnerability was reported because a remote malicious user can obtain the content of a directory even when there is an index file by appending a null character to the path in a HTTP request.
There is no exploit code required; however, Proof of Concept exploits have been published.
Xerver Multiple Input Validation Vulnerabilities
Medium
Secunia Advisory: SA17243, October 19, 2005
XMail
XMail 1.21
A buffer overflow vulnerability has been reported in the 'AddressFromAtPtr()' function due to a boundary error when copying the hostname portion of an e-mail address to a 256-byte buffer, which could let a malicious user execute arbitrary code.
The section below contains wireless vulnerabilities, articles, and viruses/trojans identified during this reporting period.
Microsoft creates virtual Wi-Fi: Microsoft has developed a technique to allow people to access multiple Wi-Fi networks with a single Wi-Fi card.
Virtual Wi-Fi is designed to improve multitasking, save money on hardware and reduce the power needed for Wi-Fi communications. The software is designed to run with Windows XP. Source: http://www.vnunet.com/vnunet/news/2144172/
microsoft-creates-virtual-wi.
Mobile phone security comes with a swagger: VTT, a Finnish electronics firm, has unveiled a biometric security system for mobile phones that operates by measuring the user's gait.
The device, which contains movement sensors, connects to a phone and is calibrated so that it recognizes the unique walking pattern of its owner.
Source: http://www.vnunet.com/vnunet/news/2144116/
system-locks-mobiles-user-walk
New Hacker Targets: Cell Phones And PDAs: There was a time when the biggest mobile computing risk was losing a laptop, but things have changed. Cell phones, smart phones, and PDAs increasingly are being used to access business applications, E--mail, and the Internet. New security threats to mobile devices that store and distribute company information are emerging. They're becoming victims of zombie attacks and other forms of hacking; malware; hybrid PC--mobile viruses like Comwarrior, Bluejacking, and Cabir; and spam. Many businesses are finding they need plans for securing mobile devices, including what methods to use and rules for how devices can be used.
Source: http://www.securitypipeline.com/news/172301486;jsessionid=
XGKC2CBBHNDQGQSNDBECKH0CJUMEKJVN.
Securing laptop PCs for public Wi-Fi hot spots: Cranite Systems, a California-based network security company, said it has new technology that could enable government employees to work securely on laptop computers and other devices from public Wi-Fi hot spots or networks at home. They announced that their SafeConnect product would provide the first Layer 2 secure access solution for enterprise networks. The patent-pending technology would also allow remote users to access the same functions they use when working in an office. Source: http://www.fcw.com/article91132-10-17-05-Web
Newest Mobile Devices Are Latest Threat To Network Security: Next-generation mobile devices may enhance mobile workers’ productivity, but they also place unprecedented demands on enterprise security infrastructure. Until stronger security practices become more widespread, enterprise mobile devices will continue to represent a threat to sensitive corporate data.
Next-generation mobile handsets are capable of using different types of wireless networks, and they’re being powered by a growing number of mobile operating systems. Source: http://www.mobilepipeline.com/trends/172301056
Wireless Vulnerabilities
WifiScanner-1.0.0.tar.gz: WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz.
rfakeap-0.1.tar.gz: Proof of Concept code for a program that emulates IEEE 802.11 access points thanks to wireless raw injection. It aims at creating/injecting both beacon and probe response frames in order to emulate valid IEEE 802.11 access points.
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script
(Reverse Chronological Order)
Script name
Workaround or Patch Available
Script Description
October 19, 2005
cacam_logsecurity_
win32.pm
Yes
Exploit for the Computer Associates Message Queuing Multiple Vulnerabilities.
October 19, 2005
ewdd.pdf
N/A
Exploiting Windows Device Drivers is a paper that describes device driver exploitation techniques, and provides detailed descriptions of techniques used. It also includes full exploit code with sample vulnerable driver code for testing purposes.
October 19, 2005
hpux_ftpd_preauth_
list.pm
Yes
Proof of Concept exploit for the HP-UX FTP Server Directory Listing vulnerability.
October 19, 2005
hpux_lpd_exec.pm
Yes
Proof of Concept exploit for the HP-UX LPD Arbitrary Command Execution vulnerability.
October 19, 2005
qcrack-v0.1.tgz
N/A
A program written to test the security of md5 passwords by attempting to brute force them. The user can also specify the characters to use when brute-forcing.
October 19, 2005
rfakeap-0.1.tar.gz
N/A
Proof of Concept code for a program that emulates IEEE 802.11 access points thanks to wireless raw injection. It aims at creating/injecting both beacon and probe response frames in order to emulate valid IEEE 802.11 access points.
October 19, 2005
rsa_iiswebagent_
redirect.pm
Yes
Exploit for the RSA Authentication Agent for Web Buffer Overflow Vulnerability.
October 18, 2005
e017_xpl.php
e107remote.txt
No
Proof of Concept exploits for the E107 Resetcore.PHP SQL Injection vulnerability.
October 17, 2005
0xletzdance.c
winrar-3.50-eng.txt
No
Scripts that exploit the RARLAB WinRAR Command Line Processing Buffer Overflow vulnerability.
October 14, 2005
lynx-data.zip
Yes
A Proof of Concept Denial of Service exploit for the Lynx 'HTrjis()' NNTP Buffer Overflow vulnerability.
October 14, 2005
wagora_420_xpl.php
wagora420_xpl.txt
No
Scripts that exploit the W-Agora Multiple Arbitrary PHP Code Injection Vulnerabilities.
October 13, 2005
suckit2priv.tar.gz
N/A
An easy-to-use, Linux-i386 kernel-based rootkit.
October 13, 2005
typsoft-1.11-DOS.pl
No
Script that exploits the TYPSoft FTP Server RETR Denial of Service Vulnerability.
October 13, 2005
WifiScanner-
1.0.0.tar.gz
N/A
An analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz.
October 12, 2005
phpwebsite-
sql-inj.pl
Yes
Script that exploits the PHPWebSite Search Module SQL Injection Vulnerability.
Snort flaw leaves systems vulnerable: The U.S. Computer Emergency Readiness Team (CERT) announced that the open source IDS software, widely deployed in corporations and governments, was vulnerable to a buffer overflow in the preprocessor component it uses to detect the Back Orifice Trojan. Source: http://www.securityfocus.com/brief/17.
DDoS attacks still biggest threat: According to a survey of global ISPs from Arbor Networks in their Worldwide ISP Security Report, companies should devote more resources to countering Distributed Denial of Service (DDoS) attacks when investing in security. Questionnaires were sent to 36 large ISPs in the US, Europe and Asia.
Source: http://www.techworld.com/security/news/index.cfm?NewsID=4570.
Ten-Minute Guide To Killing Network Malware: According to Forrester Research,"If you ask any company why it has invested in anti-spyware tools, the first thing they'll say is that every PC was running so slowly that they couldn't function."
Source: http://www.networkingpipeline.com/172301862.
U.S. insists on controlling Web: According to a top U.S. official, the United States refuses to relinquish its role as the Internet's principal traffic policeman. They are rejecting calls in a United Nations meeting for a U.N. body to take over. But while the United States stuck to its position, other negotiators said there was a growing sense that a compromise had to be reached and that no single country ought to be the ultimate authority over such a vital part of the global economy.
Source: http://www.cnn.com/2005/TECH/internet/09/30/internet.control.ap/index.html.
Report: Anti-spam push helping curb U.S. junk mail: According to Sophos, the United States continues to be the world's worst source of spam, but computers are relaying far fewer junk e-mails than a year ago. The spam volume from South Korea and China is substantially up, compared with the same period last year. The report covered Sophos's analysis of messages received in its scanning network between April and September this year.
The United States was the country of origin for around 26 percent of global spam, down from 41.5 percent a year ago. The share of spurious e-mails from South Korea and China, which held the second and third position, has gone up to nearly 20 percent and 16 percent respectively, from 12 percent and 9 percent. Source: http://news.com.com/Report+Antispam+push+helping+curb+
U.S.+junk+mail/2100-7349_3-5894104.html?tag=cd.top.
FFIEC Releases Guidance on Authentication in Internet Banking Environment: The Federal Financial Institutions Examination Council (FFIEC) has released guidance on the risks and risk management controls that are necessary to authenticate Internet-based financial services customer identity. The guidance, Authentication in an Internet Banking Environment, was issued to reflect the many significant legal and technological changes with respect to the protection of customer information, increasing incidents of identity theft and fraud, and the introduction of improved authentication technologies and other risk mitigation strategies. Source: http://www.ffiec.gov/press/pr101205.htm.
A sophisticated Trojan-worm hybrid threatens users’ privacy and their bank accounts, reports Panda Software: PandaLabs has reported the appearance of a new kind of hybrid malware that has both worm and Trojan features, which could be used to steal confidential information of any kind, such as banking information, personal details or other type of information entered in Web registration forms.
This Eyeveg.D is a sophisticated hybrid with two sides to it: it carries out Trojan actions against the infected computer, and acts as a worm to spread.
Source: http://www.net-security.org/press.php?id=3524.
Antiphishing Efforts Show Success: According to the Anti-Phishing Working Group (APWG) the number of days a phishing site remains online has dropped to an average of 5.5 days. This is a sign that countermeasures against fraudulent web sites are being enacted with increased speed.
Source: http://news.yahoo.com/s/pcworld/20051014/tc_pcworld/123027.
Websense's Web Security Trends Report Finds Marked Increase in Crimeware and Malicious Websites : Websense, Inc. released its 2005 Semi-Annual Web Security Trends Report. According to the report, the web continued to evolve and grow as an attack vector in the first half of 2005 and there was a marked increase in the number of malicious websites and in the amount of "crimeware", a term which refers to using malicious code written with criminal intent.
Source: http://www.securitypark.co.uk/
pfv.asp?articleid=24437.
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
Rank
Common Name
Type of Code
Trend
Date
Description
1
Netsky-P
Win32 Worm
Stable
March 2004
A mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. The worm also tries to spread through various file-sharing programs by copying itself into various shared folder.
2
Lovgate.w
Win32 Worm
Stable
April 2004
A mass-mailing worm that propagates via by using MAPI as a reply to messages, by using an internal SMTP, by dropping copies of itself on network shares, and through peer-to-peer networks. Attempts to access all machines in the local area network.
3
Netsky-D
Win32 Worm
Stable
March 2004
A simplified variant of the Netsky mass-mailing worm in that it does not contain many of the text strings that were present in NetSky.C and it does not copy itself to shared folders. Netsky.D spreads itself in e-mails as an executable attachment only.
4
Mytob-BE
Win32 Worm
Stable
June 2005
A slight variant of the mass-mailing worm that utilizes an IRC backdoor, LSASS vulnerability, and email to propagate. Harvesting addresses from the Windows address book, disabling antivirus, and modifying data.
5
Mytob-AS
Win32 Worm
Stable
June 2005
A slight variant of the mass-mailing worm that disables security related programs and processes, redirection various sites, and changing registry values. This version downloads code from the net and utilizes its own email engine.
6
Zafi-B
Win32 Worm
Stable
June 2004
A mass-mailing worm that spreads via e-mail using several different languages, including English, Hungarian and Russian. When executed, the worm makes two copies of itself in the %System% directory with randomly generated file names.
7
Mytob.C
Win32 Worm
Stable
March 2004
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the Windows LSASS (MS04-011) exploit. The worm will attempt to harvest email addresses from the local hard disk by scanning files.
8
Zafi-D
Win32 Worm
Stable
December 2004
A mass-mailing worm that sends itself to email addresses gathered from the infected computer. The worm may also attempt to lower security settings, terminate processes, and open a back door on the compromised computer.
9
Netsky-Q
Win32 Worm
Stable
March 2004
A mass-mailing worm that attempts to launch Denial of Service attacks against several web pages, deletes the entries belonging to several worms, and emits a sound through the internal speaker.
10
Netsky-Z
Win32 Worm
Stable
April 2004
A mass-mailing worm that is very close to previous variants. The worm spreads in e-mails, but does not spread to local network and P2P and does not uninstall Bagle worm. The worm has a backdoor that listens on port 665.