Date Reported:          11/24/2001
Brief Description:      Badtrans worm with keystroke logging
                        functionality
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Windows 2000 All versions, Windows 95 All
                        versions, Windows 98 All versions, Windows ME
                        All versions, Windows NT All versions, Windows
                        XP All versions
Vulnerability:          badtrans-worm
X-Force URL:            http://xforce.iss.net/static/7607.php


----- Original Message -----
From: "X-Force" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, December 03, 2001 3:48 PM
Subject: ISSalert: ISS Security Alert Summary AS01-09


|
| TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to
| [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
| --------------------------------------------------------------------------
-
|
| -----BEGIN PGP SIGNED MESSAGE-----
|
| Internet Security Systems Security Alert Summary AS01-09
| December 03, 2001
|
| X-Force Vulnerability and Threat Database: http://xforce.iss.net
|
| To receive these Alert Summaries, as well as other Alerts and
| Advisories, subscribe to the Internet Security Systems Alert
| mailing list at: http://xforce.iss.net/maillists/index.php
|
| This summary is available at the following address:
| http://xforce.iss.net/alerts/AS01-09.php
|
| _____
| Contents:
| * 43 Reported Vulnerabilities
| * Risk Factor Key
| _____
|
| Date Reported:          11/19/2001
| Brief Description:      Intel HDCP authentication keys
| Risk Factor:            Low
| Attack Type:            Host Based / Network Based
| Platforms Affected:     HDCP 1.0
| Vulnerability:          hdcp-authentication-keys
| X-Force URL:            http://xforce.iss.net/static/7612.php
|
| Date Reported:          11/19/2001
| Brief Description:      Microsoft IIS allows attackers to create fake
|                         log entries
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Microsoft IIS 5.0
| Vulnerability:          iis-fake-log-entry
| X-Force URL:            http://xforce.iss.net/static/7613.php
|
| Date Reported:          11/19/2001
| Brief Description:      Internet Explorer HTTP_USER_AGENT could allow
|                         attacker to determine the existence of patch
|                         Q312461
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Microsoft Internet Explorer 5.5, Microsoft
|                         Internet Explorer 6
| Vulnerability:          ie-q312461-patch-existence
| X-Force URL:            http://xforce.iss.net/static/7581.php
|
| Date Reported:          11/19/2001
| Brief Description:      OpenSSH with Kerberos allows attacker to gain
|                         elevated privileges
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     OpenSSH 3.0
| Vulnerability:          openssh-kerberos-elevate-privileges
| X-Force URL:            http://xforce.iss.net/static/7598.php
|
| Date Reported:          11/20/2001
| Brief Description:      Thttpd 'Basic Authentication' feature buffer
|                         overflow
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     thttpd 2.20b and earlier
| Vulnerability:          thttpd-basic-authentication-bo
| X-Force URL:            http://xforce.iss.net/static/7595.php
|
| Date Reported:          11/21/2001
| Brief Description:      Linux kernel vmlinux denial of service
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Linux kernel 2.4.x
| Vulnerability:          linux-vmlinux-dos
| X-Force URL:            http://xforce.iss.net/static/7591.php
|
| Date Reported:          11/21/2001
| Brief Description:      Netscape Web browser for MacOS prints passwords in
|                         plaintext
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     Macintosh All versions
| Vulnerability:          macos-netscape-print-passwords
| X-Force URL:            http://xforce.iss.net/static/7593.php
|
| Date Reported:          11/21/2001
| Brief Description:      Linux-Mandrake expect package could allow
|                         unauthorized users to gain root privileges
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     Mandrake Linux 8.1
| Vulnerability:          linux-expect-unauth-root
| X-Force URL:            http://xforce.iss.net/static/7604.php
|
| Date Reported:          11/21/2001
| Brief Description:      Internet Explorer allows an attacker to
|                         determine password characters
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Microsoft Internet Explorer 4.0, Microsoft
|                         Internet Explorer 5.x, Microsoft Internet
|                         Explorer 6
| Vulnerability:          ie-password-character-information
| X-Force URL:            http://xforce.iss.net/static/7592.php
|
| Date Reported:          11/21/2001
| Brief Description:      CBlade worm infects Microsoft SQL Servers
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     Microsoft SQL Server 7.0, Microsoft SQL Server
|                         6.x
| Vulnerability:          cblade-worm
| X-Force URL:            http://xforce.iss.net/static/7610.php
|
| Date Reported:          11/21/2001
| Brief Description:      Legato NetWorker reverse DNS authentication can
|                         be bypassed
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     Networker 6.0
| Vulnerability:          networker-reverse-dns-bypass-auth
| X-Force URL:            http://xforce.iss.net/static/7601.php
|
| Date Reported:          11/21/2001
| Brief Description:      Linux pmake .SHELL variable buffer overflow
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     pmake 2.1.33 and earlier
| Vulnerability:          pmake-shell-bo
| X-Force URL:            http://xforce.iss.net/static/7603.php
|
| Date Reported:          11/21/2001
| Brief Description:      Linux pmake .SHELL variable format string
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     pmake 2.1.33 and earlier
| Vulnerability:          pmake-shell-format-string
| X-Force URL:            http://xforce.iss.net/static/7602.php
|
| Date Reported:          11/21/2001
| Brief Description:      Windows XP helpctr.exe buffer overflow
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     Windows XP All versions
| Vulnerability:          winxp-helpctr-bo
| X-Force URL:            http://xforce.iss.net/static/7605.php
|
| Date Reported:          11/22/2001
| Brief Description:      Informix SQL Web DataBlade module "dot dot"
|                         directory traversal
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     Informix SQL 9.20.UC2, Informix SQL 7.31.UC5
| Vulnerability:          informix-web-datablade-directory-traversal
| X-Force URL:            http://xforce.iss.net/static/7585.php
|
| Date Reported:          11/22/2001
| Brief Description:      Jakarta Tomcat reveals installation path
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Jakarta Tomcat 4.0.1
| Vulnerability:          tomcat-reveal-install-path
| X-Force URL:            http://xforce.iss.net/static/7599.php
|
| Date Reported:          11/22/2001
| Brief Description:      PHP-Nuke and PostNuke use weak encryption for
|                         passwords stored in authentication cookies
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     PHP-Nuke 5.2, PHP-Nuke 5.1, PHP-Nuke 5.3.1,
|                         PostNuke 0.64
| Vulnerability:          phpnuke-postnuke-insecure-passwords
| X-Force URL:            http://xforce.iss.net/static/7596.php
|
| Date Reported:          11/22/2001
| Brief Description:      Rwhoisd syslog() remote format string
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     Rwhoisd 1.5.7, Rwhoisd 1.5.7.1, Rwhoisd 1.5.3,
|                         Rwhoisd 1.5.5, Rwhoisd 1.5.6, Rwhoisd 1.5.1a,
|                         Rwhoisd 1.5.2
| Vulnerability:          rwhoisd-syslog-format-string
| X-Force URL:            http://xforce.iss.net/static/7597.php
|
| Date Reported:          11/22/2001
| Brief Description:      susehelp CGI scripts remote command execution
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     SuSE Linux 7.2, SuSE Linux 7.3
| Vulnerability:          susehelp-cgi-command-execution
| X-Force URL:            http://xforce.iss.net/static/7583.php
|
| Date Reported:          11/23/2001
| Brief Description:      Red Hat Stronghold Secure Web Server could allow
|                         an attacker to obtain sensitive server
|                         information
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Stronghold Secure Web server 2.3, Stronghold
|                         Secure Web Server 2.4, Stronghold Secure Web
|                         Server 3.0
| Vulnerability:          stronghold-webserver-obtain-information
| X-Force URL:            http://xforce.iss.net/static/7582.php
|
| Date Reported:          11/23/2001
| Brief Description:      REX 6000 MicroPDA transmits plaintext password
|                         information
| Risk Factor:            Low
| Attack Type:            Host Based
| Platforms Affected:     Xircom Rex 6000 All versions
| Vulnerability:          rex6000-pda-password-retrieval
| X-Force URL:            http://xforce.iss.net/static/7584.php
|
| Date Reported:          11/24/2001
| Brief Description:      Badtrans worm with keystroke logging
|                         functionality
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     Windows 2000 All versions, Windows 95 All
|                         versions, Windows 98 All versions, Windows ME
|                         All versions, Windows NT All versions, Windows
|                         XP All versions
| Vulnerability:          badtrans-worm
| X-Force URL:            http://xforce.iss.net/static/7607.php
|
| Date Reported:          11/26/2001
| Brief Description:      AutoNice Daemon (AND) format string
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     AND 1.0.4 and earlier
| Vulnerability:          and-format-string
| X-Force URL:            http://xforce.iss.net/static/7606.php
|
| Date Reported:          11/26/2001
| Brief Description:      Sun NetDynamics session ID hijacking
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     NetDynamics 5.0, NetDynamics 4.1, NetDynamics
|                         4.1.2, NetDynamics 4.1.3, NetDynamics 4.0
| Vulnerability:          netdynamics-session-hijacking
| X-Force URL:            http://xforce.iss.net/static/7620.php
|
| Date Reported:          11/26/2001
| Brief Description:      Xitami Webserver stores admin password in
|                         plaintext in 'default.aut' file
| Risk Factor:            Medium
| Attack Type:            Host Based / Network Based
| Platforms Affected:     Xitami Web Servers All versions
| Vulnerability:          xitami-default-password-plaintext
| X-Force URL:            http://xforce.iss.net/static/7600.php
|
| Date Reported:          11/27/2001
| Brief Description:      Audiogalaxy stores account name and password in
|                         plaintext within a cookie
| Risk Factor:            Low
| Attack Type:            Host Based / Network Based
| Platforms Affected:     Audiogalaxy All versions
| Vulnerability:          audiogalaxy-plaintext-password
| X-Force URL:            http://xforce.iss.net/static/7621.php
|
| Date Reported:          11/27/2001
| Brief Description:      WU-FTPD glob() function error handling heap
|                         corruption
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     Caldera OpenLinux 2.3, Caldera OpenLinux
|                         eBuilder All versions, Caldera OpenLinux
|                         eDesktop 2.4, Caldera OpenLinux eServer 2.3.1,
|                         Caldera OpenLinux Server 3.1, Conectiva Linux
|                         6.0, Conectiva Linux 5.0, Conectiva Linux prg
|                         graficos, Conectiva Linux ecommerce, Conectiva
|                         Linux 5.1, Conectiva Linux 7.0, Immunix OS 7.0
| Vulnerability:          wuftp-glob-heap-corruption
| X-Force URL:            http://xforce.iss.net/static/7611.php
|
| Date Reported:          11/27/2001
| Brief Description:      Allaire JRun could allow an attacker to view
|                         contents of the Web root directory and
|                         subdirectories
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     JRun 3.0, JRun 3.1
| Vulnerability:          allaire-jrun-view-directory
| X-Force URL:            http://xforce.iss.net/static/7623.php
|
| Date Reported:          11/27/2001
| Brief Description:      Allaire JRun could allow an attacker to view
|                         contents of files
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     JRun 3.0, JRun 3.1, JRun 2.3.3
| Vulnerability:          allaire-jrun-view-source
| X-Force URL:            http://xforce.iss.net/static/7622.php
|
| Date Reported:          11/27/2001
| Brief Description:      GNOME libgtop_daemon remote format string
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     libgtop_daemon 1.0.12 and earlier
| Vulnerability:          libgtop-format-string
| X-Force URL:            http://xforce.iss.net/static/7608.php
|
| Date Reported:          11/27/2001
| Brief Description:      Sendpage.pl $message command execution
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     sendpage.pl All versions
| Vulnerability:          sendpage-message-command-execution
| X-Force URL:            http://xforce.iss.net/static/7609.php
|
| Date Reported:          11/27/2001
| Brief Description:      UNICOS NQS daemon batch job allows root
|                         compromise using format string attack
| Risk Factor:            High
| Attack Type:            Host Based
| Platforms Affected:     UNICOS 2.0.5.54 and earlier
| Vulnerability:          unicos-nqsd-format-string
| X-Force URL:            http://xforce.iss.net/static/7618.php
|
| Date Reported:          11/28/2001
| Brief Description:      Cisco IOS Firewall with CBAC allows attacker to
|                         bypass access control list
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Cisco IOS 12.1(x), Cisco IOS 11.3(x), Cisco IOS
|                         12.0(x), Cisco IOS 12.2(x), Cisco IOS 11.2(x)
| Vulnerability:          ios-cbac-bypass-acl
| X-Force URL:            http://xforce.iss.net/static/7614.php
|
| Date Reported:          11/28/2001
| Brief Description:      Mailman cross-site scripting using JavaScript
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     Mailman prior to 2.0.8
| Vulnerability:          mailman-java-css
| X-Force URL:            http://xforce.iss.net/static/7617.php
|
| Date Reported:          11/28/2001
| Brief Description:      PowerFTP "dot dot" directory traversal
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     PowerFTP 2.03
| Vulnerability:          powerftp-dot-directory-traversal
| X-Force URL:            http://xforce.iss.net/static/7615.php
|
| Date Reported:          11/28/2001
| Brief Description:      PowerFTP long command denial of service
| Risk Factor:            Low
| Attack Type:            Network Based
| Platforms Affected:     PowerFTP 2.03
| Vulnerability:          powerftp-long-command-dos
| X-Force URL:            http://xforce.iss.net/static/7616.php
|
| Date Reported:          11/28/2001
| Brief Description:      TWIG stores password in plaintext in cookies
| Risk Factor:            Medium
| Attack Type:            Host Based
| Platforms Affected:     TWIG 2.7.4 and earlier
| Vulnerability:          twig-password-plaintext-cookie
| X-Force URL:            http://xforce.iss.net/static/7619.php
|
| Date Reported:          11/29/2001
| Brief Description:      Alchemy HTTP server allows remote attacker to
|                         execute arbitrary commands using "dot dot"
|                         attack
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     Alchemy Eye 2.0 to 2.6.18
| Vulnerability:          alchemy-http-dot-commands
| X-Force URL:            http://xforce.iss.net/static/7625.php
|
| Date Reported:          11/29/2001
| Brief Description:      Alchemy HTTP server "dot dot" attack and "NUL"
|                         device
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     Alchemy Eye 2.6.19 to 3.0.10
| Vulnerability:          alchemy-http-dot-variant
| X-Force URL:            http://xforce.iss.net/static/7626.php
|
| Date Reported:          11/29/2001
| Brief Description:      PGPMail $CONFIG variable allows remote attacker
|                         to execute commands
| Risk Factor:            High
| Attack Type:            Network Based
| Platforms Affected:     PGPMail 1.31
| Vulnerability:          pgpmail-config-execute-commands
| X-Force URL:            http://xforce.iss.net/static/7627.php
|
| Date Reported:          11/30/2001
| Brief Description:      Alchemy HTTP server allows a remote attacker to
|                         view log files
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     Alchemy Eye 1.9.x to 2.6.18, Alchemy Network
|                         Monitor 1.9.x to 2.6.18
| Vulnerability:          alchemy-http-view-log
| X-Force URL:            http://xforce.iss.net/static/7630.php
|
| Date Reported:          11/30/2001
| Brief Description:      AspUpload 'UploadScript11.asp' script allows
|                         files to be uploaded to arbitrary directories
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     AspUpload 2.1
| Vulnerability:          aspupload-upload-directory-traversal
| X-Force URL:            http://xforce.iss.net/static/7628.php
|
| Date Reported:          11/30/2001
| Brief Description:      AspUpload 'DirectoryListing.asp' script allows
|                         directory browsing and download arbitrary files
| Risk Factor:            Medium
| Attack Type:            Network Based
| Platforms Affected:     AspUpload 2.1
| Vulnerability:          aspupload-directory-browsing-download
| X-Force URL:            http://xforce.iss.net/static/7629.php
|
| _____
|
| Risk Factor Key:
|
|      High     Any vulnerability that provides an attacker with immediate
|               access into a machine, gains superuser access, or bypasses
|               a firewall. Example: A vulnerable Sendmail 8.6.5 version
|               that allows an intruder to execute commands on mail server.
|      Medium   Any vulnerability that provides information that has a high
|               potential of giving system access to an intruder. Example:
|               A misconfigured TFTP or vulnerable NIS server that allows
|               an intruder to get the password file that could contain an
|               account with a guessable password.
|      Low      Any vulnerability that provides information that could
|               potentially lead to a compromise. Example: A finger that
|               allows an intruder to find out who is online and potential
|               accounts to attempt to crack passwords via brute force
|               methods.
|
| ______
|
| About Internet Security Systems (ISS)
| Internet Security Systems is a leading global provider of security
| management solutions for the Internet, protecting digital assets and
| ensuring safe and uninterrupted e-business. With its industry-leading
| intrusion detection and vulnerability assessment, remote managed
| security services, and strategic consulting and education offerings, ISS
| is a trusted security provider to more than 8,000 customers worldwide
| including 21 of the 25 largest U.S. commercial banks and the top 10 U.S.
| telecommunications companies. Founded in 1994, ISS is headquartered in
| Atlanta, GA, with additional offices throughout North America and
| international operations in Asia, Australia, Europe, Latin America and
| the Middle East. For more information, visit the Internet Security
| Systems web site at www.iss.net or call 888-901-7477.
|
| Copyright (c) 2001 Internet Security Systems, Inc. All rights reserved
| worldwide.
|
| Permission is hereby granted for the redistribution of this Alert
| electronically. It is not to be edited in any way without express consent
of
| the X-Force. If you wish to reprint the whole or any part of this Alert in
| any other medium excluding electronic medium, please e-mail [EMAIL PROTECTED]
| for permission.
|
| Disclaimer
|
| The information within this paper may change without notice. Use of this
| information constitutes acceptance for use in an AS IS condition. There
are
| NO warranties with regard to this information. In no event shall the
author
| be liable for any damages whatsoever arising out of or in connection with
| the use or spread of this information. Any use of this information is at
the
| user's own risk.
|
| X-Force PGP Key available at: http://xforce.iss.net/sensitive.php
| as well as on MIT's PGP key server and PGP.com's key server.
|
| Please send suggestions, updates, and comments to: X-Force
| [EMAIL PROTECTED] of Internet Security Systems, Inc.
|
|
|
| -----BEGIN PGP SIGNATURE-----
| Version: 2.6.3a
| Charset: noconv
|
| iQCVAwUBPAvy5zRfJiV99eG9AQECowQAuRKu8TGejrcMrMlX1OGgpEy407dqhtmS
| sUNwdiWwlMcr71xV3b26haTQ8zIbjJprX9AqhwgRNylDhSEzxDz3pOytwhapkfl4
| VjpEOlp/EI8HOMpKUyRiWxyOgQX8fs9akrSNZPTBd3sWQcc2itkbJaDzlJycAzDQ
| 5J9W1sRi9JU=
| =MKtg
| -----END PGP SIGNATURE-----
|
|


---------------------------------------------------------
Archived messages from this list can be found at:
http://www.mail-archive.com/[email protected]/
---------------------------------------------------------

Reply via email to