Summary of Security Items from November 17 through November 23, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, therefore the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
Note: Even though a vulnerability may allow several malicious acts to be performed, only the highest level risk will be defined in the Risk column.
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Windows Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attack Scripts | Common Name / CVE Reference | Risk | Source |
AMAX Information Technologies Winmail Server 4.2 | Multiple vulnerabilities have been reported in Winmail Server that could let remote malicious users conduct Cross-Site Scripting and arbitrarily manipulate files. No workaround or patch available at time of publishing. There is no exploit code required. | Winmail Server Multiple Vulnerabilities | Medium | Secunia Advisory: SA16665, November 18, 2005 |
Cerberus FTP Server prior to 2.32 | A vulnerability has been reported in Cerberus FTP Server that could let remote malicious users cause a Denial of Service. Upgrade to newest version: Currently we are not aware of any exploits for this vulnerability. | Cerberus FTP Server Denial of Service | Low | Secunia Advisory: SA17650, November 23, 2005 |
e-Quick Cart | An input validation vulnerability has been reported in e-Quick Cart that could let remote malicious user conduct Cross-Site Scripting, perform SQL injection, or execute arbitrary code. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | e-Quick Cart Multiple Vulnerabilitie | High | Security Tracker Alert ID: 1015244, November 19, 2005 |
A vulnerability has been reported in WorldMail Server that could let remote malicious users disclose information. No workaround or patch available at time of publishing. An exploit has been published. | Eudora WorldMail Server Information Disclosure | Medium | Security Tracker, Alert ID: 1015236, November 17, 2005 | |
Cosminexus Collaboration, Groupmax Collaboration | A vulnerability has been reported in Cosminexus Collaboration and Groupmax Collaboration that could let remote malicious users conduct Cross-Site Scripting or cause a Denial of Service. Vendor solution available: There is no exploit code required. | Cosminexus Collaboration and Groupmax Collaboration Cross-Site Scripting or Denial of Service | Medium | Hitachi, Software Vulnerability Information HS05-023, November 18, 2005 |
MailEnable Professional 1.6, Enterprise 1.1 | A buffer overflow vulnerability has been reported in MailEnable that could let remote malicious users execute arbitrary code or cause a Denial of Service. Vendor fix available; http://www.mailenable.com/hotfix/ Currently we are not aware of any exploits for this vulnerability. | MailEnable Arbitrary Code Execution or Denial of Service | High | Security Tracker, Alert ID: 1015239, November 18, 2005 |
Internet Explorer | A vulnerability has been reported in Internet Explorer that could let remote malicious users to obtain unauthorized access. Vendor solutions available: An exploit script has been published. | Microsoft Internet Explorer Unauthorized Access href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1790">CVE-2005-1790 | Medium | Microsoft, Security Advisory 911302, November 21, 2005 |
VP-ASP Shopping Cart 5.50 | An input validation vulnerability has been reported in VP-ASP Shopping Cart that could let remote malicious users conduct Cross-Site Scripting. No workaround or patch available at time of publishing. There is no exploit code required; however a Proof of Concept exploit has been published. | VP-ASP Shopping Cart Cross-Site Scripting | Medium | Security Tracker, Alert ID: 1015238, November 18, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attack Scripts | Common Name / CVE Reference | Risk | Source |
common-lisp-controller | A vulnerability has been reported when validating the ownership of the cache directory, which could let a remote malicious user obtain elevated privileges. Debian: Currently we are not aware of any exploits for this vulnerability. | Common-lisp-controller Elevated Privileges | Medium | Debian Security Advisory, DSA 811-1, September 14, 2005 Debian Security Advisory, DSA 811-2, November 21, 2005 |
Fetchmail 6.x | A vulnerability has been reported in the 'fetchmailconf' configuration utility due to a race condition, which could let a malicious user obtain sensitive information. Upgrades available at: http://download. Gentoo: Ubuntu: Mandriva: Debian: http://security.debian. There is no exploit code required. | Fetchmail 'fetchmailconf' Information Disclosure | Medium | fetchmail-SA-2005-02 Security Announcement, October 21, 2005 Gentoo Linux Security Advisory, GLSA 200511-06, November 6, 2005 Ubuntu Security Notice, USN-215-1, November 07, 2005 Mandriva Linux Security Advisory, MDKSA-2005:209, November 10, 2005 Debian Security Advisory, DSA 900-2 & 900-3, November 21 & 22, 2005 |
GpsDrive 2.0 9 | A format string vulnerability has been reported in 'Friendsd,' which could let a remote malicious user execute arbitrary code. Debian: SUSE: Proof of Concept exploits have been published. | GpsDrive Remote Format String | High | Security Focus, Bugtraq ID: 15319, November 4, 2005 Debian Security Advisory, DSA 891-1, November 9, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
HP-UX B.11.23, B.11.11, B.11.00 | A remote Denial of Service vulnerability has been reported due to security flaws in HP's IPSec implementation. Updates available at: http://www.hp.com/ Vulnerability can be reproduced using the PROTOS ISAKMP Test Suite. | HP-UX IPSec Remote Denial of Service | Low | HP Security Bulletin, HPSBUX02076, November 16, 2005 |
WebSphere Application Server for z/OS 5.0 | A remote Denial of Service vulnerability has been reported in the 'BBOORB' module due to a double-free error. Update available at: Currently we are not aware of any exploits for this vulnerability. | IBM WebSphere Application Server for z/OS Remote Denial of Service | Low | IBM Advisory, PK13936, November 22, 2005 |
UnZip 5.52 | A vulnerability has been reported due to a security weakness when extracting an archive to a world or group writeable directory, which could let a malicious user modify file permissions. Fedora: SCO: Ubuntu: Trustix: Mandriva: Debian: There is no exploit code required. | Info-ZIP UnZip File Permission Modification | Medium | Security Focus, 14450, August 2, 2005 Fedora Update Notification, SCO Security Advisory, SCOSA-2005.39, September 28, 2005 Ubuntu Security Notice, USN-191-1, September 29, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0053, September 30, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:197, October 26, 2005 Debian Security Advisory, DSA 903-1, November 21, 2005 |
IPsec-Tools0.6-0.6.2, 0.5-0.5.2 | A remote Denial of Service vulnerability has been reported due to a failure to handle exceptional conditions when in 'AGGRESSIVE' mode. Upgrades available at: Vulnerability can be reproduced with the PROTOS IPSec Test Suite. | IPsec-Tools ISAKMP IKE Remote Denial of Service | Low | Security Focus, Bugtraq ID: 15523, November 22, 2005 |
pnmtopng 2.38, 2.37.3-2.37.6 | A buffer overflow vulnerability has been reported in 'Alphas_Of Upgrades available at: Debian: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | PNMToPNG Remote Buffer Overflow | High | Security Focus, Bugtraq ID: 15427, November 15, 2005 Debian Security Advisory, DSA 904-1, November 21, 2005 Ubuntu Security Notice, USN-218-1, November 21, 2005 |
LiteSpeed Web Server 2.1.5 | A Cross-Site Scripting vulnerability has been reported in 'admin'/config'confMgr.php' due to insufficient sanitization of the 'm' parameter, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | LiteSpeed Web Server Cross-Site Scripting | Medium | Secunia Advisory: SA17587, November 17, 2005 |
gnump3d 2.9-2.9.7; Debian Linux 3.1, sparc, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, amd64, alpha | Several vulnerabilities have been reported: a vulnerability was reported in the 'index.lok' lock file when indexing music files due to the insecure creation of temporary files, which could let a remote malicious user overwrite arbitrary files; and a Directory Traversal vulnerability was reported when processing certain CGI parameters and cookie values due to an input validation error, which could let a remote malicious user obtain sensitive information. Update available at: Debian: Gentoo: There is no exploit code required. | GNU gnump3d Insecure Temporary File Creation & Directory Traversal | Medium | Secunia Advisory: SA17647, November 18, 2005 Debian Security Advisory, DSA 901-1, November 19, 2005 Gentoo Linux Security Advisory, GLSA 200511-16, November 21, 2005 |
Linux Kernel Linux kernel 2.6- 2.6.14 | A Denial of Service vulnerability has been reported in 'net/ipv6/ Fedora: Upgrades available at: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel IPV6 Denial of Service | Low | Secunia Advisory: SA17261, October 21, 2005 Fedora Update Notifications, Security Focus, Bugtraq ID: 15156, October 31, 2005 Ubuntu Security Notice, USN-219-1, November 22, 2005 |
Squid Web Proxy Cache 2.5 .STABLE3-STABLE10, STABLE1 | A remote Denial of Service vulnerability has been reported when handling certain client NTLM authentication request sequences. Upgrades available at: Ubuntu: Debian: Mandriva: SCO: SUSE: Currently we are not aware of any exploits for this vulnerability. | Squid NTLM Authentication Remote Denial of Service | Low | Secunia Advisory: SA16992, September 30, 2005 Ubuntu Security Notice, USN-192-1, September 30, 2005 Debian Security Advisory, DSA 828-1, September 30, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:181, October 11, 2005 SCO Security Advisory, SCOSA-2005.44, November 1, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
Ubuntu Linux 5.10 powerpc, i386, amd64, 5.0 4 powerpc, i386, amd64, 4.1 ppc, ia64, ia32; | Multiple vulnerabilities have been reported: an integer overflow vulnerability was reported in '/gtk+/gdk-pixbuf/io-xpm.c' due to the insufficient validation of the 'n_col' value before using to allocate memory, which could let a remote malicious user execute arbitrary code; a remote Denial of Service vulnerability was reported in '/gtk+/gdk-pixbuf/io-xpm.c' when processing an XPM file that contains a large number of colors; and an integer overflow vulnerability was reported in '/gtk+/gdk-pixbuf/io-xpm.c' when performing calculations using the height, width, and colors of a XPM file, which could let a remote malicious user execute arbitrary code or cause a Denial of Service. Updates available at: Fedora: RedHat: Gentoo: SuSE: Ubuntu: Mandriva: Trustix: Currently we are not aware of any exploits for these vulnerabilities. | GTK+ GdkPixbuf XPM Image Rendering Library | High | Fedora Update Notifications RedHat Security Advisory, RHSA-2005:810-9, November 15, 2005 Gentoo Linux Security Advisory GLSA 200511-14, November 16, 2005 SUSE Security Announcement, SUSE-SA:2005:065, November 16, 2005 Ubuntu Security Notice, USN-216-1, November 16, 2005 Mandriva Linux Security Advisory, MDKSA-2005:214, November 18, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0066, November 22, 2005 |
GNOME GdkPixbuf 0.22 | A remote Denial of Service vulnerability has been reported due to a double free error in the BMP loader. Fedora: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-344.html">
href="http://rhn.redhat.com/errata/RHSA-2005-343.html">http://rhn.redhat.com/ Ubuntu: SGI: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SGI: TurboLinux: Conectiva: Mandriva: Currently we are not aware of any exploits for this vulnerability. | Low | Fedora Update Notifications, RedHat Security Advisories, Ubuntu Security Notice, USN-108-1 April 05, 2005 SGI Security Advisory, 20050401-01-U, April 6, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:068 & 069, April 8, 2005 SGI Security Advisory, 20050403-01-U, April 15, 2005 Turbolinux Security Advisory, TLSA-2005-57, May 16, 2005 Conectiva Security Advisory, CLSA-2005:958, June 1, 2005 Mandriva Linux Security Advisory, MDKSA-2005:214, November 18, 2005 | |
Gnome-DB libgda 1.2.1; | Format string vulnerabilities have been reported in 'gda-log.c' due to format string errors in the 'gda_log_error()' and 'gda_ Debian: Ubuntu: Mandriva: Gentoo: SUSE: Fedora: Currently we are not aware of any exploits for these vulnerabilities. | GNOME-DB | High | Security Focus, Bugtraq ID: 15200, October 25, 2005 Debian Security Advisory, Ubuntu Security Notice, USN-212-1, October 28, 2005 Mandriva Linux Security Advisory, MDKSA-2005:203, November 1, 2005 Gentoo Linux Security Advisory, GLSA 200511-01, November 2, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 Fedora Update Notification, SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
GNU gnump3d 2.9-2.9.5; | A vulnerability has been reported in GNUMP3d that could let remote malicious users conduct Cross-Site Scripting or traverse directories. Upgrade to version 2.9.6:
href="http://savannah.gnu.org/download/gnump3d/gnump3d-2.9.6.tar.gz"> Debian: SUSE: Gentoo: There is no exploit code required; however, Proof of Concept exploits have been published. | GNUMP3d Cross-Site Scripting or Directory Traversal | Medium | Security Focus Bugtraq IDs: 15226 & 15228, October 28, 2005 Debian Security Advisory DSA 877-1, October 28, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 Gentoo Linux Security Advisory, GLSA 200511-05, November 6, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
GNU gnump3d 2.9-2.9.5; | A Cross-Site Scripting vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: Gentoo: SUSE: There is no exploit code required. | GNU gnump3d Unspecified Cross-Site Scripting | Medium | Gentoo Linux Security Advisory GLSA 200511-05, November 7, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
Linux Kernel 2.4.x, 2.6 prior to 2.6.11.11 | A vulnerability has been reported in the Linux kernel in the Radionet Open Source Environment (ROSE) implementation in the 'rose_rt_ioctl()' function due to insufficient validation of a new routes' ndigis argument. The impact was not specified. Updates available at: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Not Specified | Security Tracker Alert, 1014115, June 7, 2005 Ubuntu Security Notice, USN-219-1, November 22, 2005 | |
Linux kernel 2.6-2.6.12 .3, 2.4-2.4.32 | A Denial of Service vulnerability has been reported in 'IP_VS_ Kernel versions 2.6.13 and 2.4.32-pre2 are not affected by this issue. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel Denial of Service | Low | Security Focus, Bugtraq ID: 15528, November 22, 2005 Ubuntu Security Notice, USN-219-1, November 22, 2005 |
Linux kernel 2.6-2.6.14 | Several vulnerabilities have been reported: a Denial of Service vulnerability was reported due to a memory leak in '/security/keys/ Patches available at: Fedora: Trustix: RedHat: Ubuntu: There is no exploit code required. | Linux Kernel Denial of Service & Information Disclosure | Medium | Secunia Advisory: SA17114, October 12, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0057, October 14, 2005 Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:808-14, October 27, 2005 Ubuntu Security Notice, USN-219-1, November 22, 2005 |
Linux kernel 2.6-2.6.14 | A Denial of Service vulnerability has been in 'sysctl.c' due to an error when handling the un-registration of interfaces in '/proc/sys/net/ipv4/conf/.' Upgrades available at: Ubuntu: There is no exploit code required. | Linux Kernel 'Sysctl' Denial of Service | Low | Secunia Advisory: SA17504, November 9, 2005 Ubuntu Security Notice, USN-219-1, November 22, 2005 |
Linux kernel 2.6-2.6.14 | Several vulnerabilities have been reported: a Denial of Service vulnerability was reported when handling asynchronous USB access via usbdevio; and a Denial of Service vulnerability was reported in the 'ipt_recent.c' netfilter module due to an error in jiffies comparison.
RedHat: Ubuntu: Currently we are not aware of any exploits for these vulnerabilities. | Linux Kernel USB Subsystem Denials of Service | Low | Secunia Advisory: SA16969, September 27, 2005 RedHat Security Advisory, RHSA-2005:514-46, October 5, 2005 Ubuntu Security Notice, USN-219-1, November 22, 2005 |
Miklos Szeredi FUSE 2.4 .0, 2.3.0, 2.3 -rc1, 2.2.1, 2.2;
| A vulnerability has been reported because fusermount fails to securely handle special characters specified in mount points, which could let a malicious user cause a Denial of Service or add arbitrary mount points.
Gentoo: There is no exploit code required. | FUSE Mount Options Corruption | Medium | Gentoo Linux Security Advisory, GLSA 200511-17, November 22, 2005 |
RedHat Enterprise Linux WS 4, WS 3, 2.1, IA64, ES 4, ES 3, 2.1, IA64, AS 4, AS 3, AS 2.1, IA64, Desktop 4.0, 3.0, Advanced Workstation for the Itanium Processor 2.1, IA64; OpenSSL Project OpenSSL 0.9.3-0.9.8, 0.9.2 b, 0.9.1 c; FreeBSD 6.0 -STABLE, -RELEASE, 5.4 -RELENG, -RELEASE, 5.3 -STABLE, -RELENG, -RELEASE, 5.3, 5.2.1 -RELEASE, -RELENG, 5.2 -RELEASE, 5.2, 5.1 -RELENG, -RELEASE/Alpha, 5.1 -RELEASE-p5, -RELEASE, 5.1, 5.0 -RELENG, 5.0, 4.11 -STABLE, -RELENG, 4.10 -RELENG, -RELEASE, 4.10 | A vulnerability has been reported due to the implementation of the 'SSL_OP_MSIE_SSLV2_ RSA_PADDING' option that maintains compatibility with third party software, which could let a remote malicious user bypass security. OpenSSL: FreeBSD: RedHat: Mandriva: Gentoo: Slackware: Fedora: Sun: Ubuntu: OpenPKG: SUSE: Trustix: SGI: Debian: NetBSD: BlueCoat Systems: Debian: Astaro Security Linux: SCO: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors OpenSSL Insecure Protocol Negotiation | Medium | OpenSSL Security Advisory, October 11, 2005 FreeBSD Security Advisory, FreeBSD-SA-05:21, October 11, 2005 RedHat Security Advisory, RHSA-2005:800-8, October 11, 2005 Mandriva Security Advisory, MDKSA-2005:179, October 11, 2005 Gentoo Linux Security Advisory, GLSA 200510-11, October 12, 2005 Slackware Security Advisory, SSA:2005-286-01, October 13, 2005 Fedora Update Notifications, Sun(sm) Alert Notification Ubuntu Security Notice, USN-204-1, October 14, 2005 OpenPKG Security Advisory, OpenPKG-SA-2005.022, October 17, 2005 SUSE Security Announcement, SUSE-SA:2005:061, October 19, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0059, October 21, 2005 SGI Security Advisory, 20051003-01-U, October 26, 2005 Debian Security Advisory DSA 875-1, October 27, 2005 NetBSD Security Update, November 1, 2005 BlueCoat Systems Advisory, November 3, 2005 Debian Security Advisory, DSA 888-1, November 7, 2005 Astaro Security Linux Announce-ment, November 9, 2005 SCO Security Advisory, SCOSA-2005.48, November 15, 2005 Astaro Security Linux Update, November 16, 2005 |
SpamAssassin 3.0.4; | A vulnerability has been reported due to a failure to handle exceptional conditions, which could let a remote malicious user bypass spam detection.
SpamAssassin: Fedora: SUSE: Trustix: There is no exploit code required. | SpamAssassin Spam Detection Bypass | Medium | Fedora Update Notification, SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0064, November 22, 2005 |
Ubuntu Linux 5.10 powerpc, i386, amd64, 5.0 4 powerpc, i386, amd64, 4.1 ppc, ia64, ia32; Netpbm 10.0, 9.20 -9.25; libpng pnmtopng 2.38, 2.37.3-2.37.6; | A buffer overflow vulnerability has been reported due to insufficient bounds checking of user-supplied data prior to copying it to an insufficiently sized memory buffer, which could let a remote malicious user execute arbitrary code. libpng: Debian: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | NetPBM PNMToPNG Remote Buffer Overflow | High | Debian Security Advisory DSA 904-1, November 21, 2005 Ubuntu Security Notice, USN-218-1 November 21, 2005 |
Ubuntu Linux 5.10 powerpc, i386, amd64; | An information disclosure vulnerability has been reported in 'SYS_GET_THREAD_AREA,' which could let a malicious user obtain sensitive information. Kernel versions 2.6.12.4 and 2.6.13 are not affected by this issue. Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel Information Disclosure | Medium | Ubuntu Security Notice, USN-219-1, November 22, 2005 |
Net-SNMP 5.2.1, 5.2, 5.1-5.1.2, 5.0.3 -5.0.9, 5.0.1 | A remote Denial of Service vulnerability has been reported when handling stream-based protocols. Upgrades available at: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Fedora: RedHat: Mandriva: Ubuntu: RedHat: Conectiva: Avaya: SUSE: Debian: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Net-SNMP | Low | Secunia Trustix Secure Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:720-04, August 9, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:137, August 11, 2005 Ubuntu Security Notice, USN-190-1, September 29, 2005 RedHat Security Advisory, RHSA-2005:395-18, October 5, 2005 Conectiva Linux Announcement, CLSA-2005:1032, October 13, 2005 Avaya Security Advisory, ASA-2005-225, October 18, 200 SUSE Security Summary Report, Announcement ID: SUSE-SR:2005:024, October 21, 2005 Debian Security Advisory, DSA 873-1, October 26, 2005 Ubuntu Security Notice, USN-190-2, November 21, 2005 |
Openswan 2.2-2.4, 2.1.4-2.1.6, 2.1.2, 2.1.1 | Several vulnerabilities have been reported: a remote Denial of Service vulnerability was reported when handling IKE packets that have an invalid 3DES key length; and a remote Denial of Service vulnerability was reported when handling certain specially crafted IKE packets. Upgrades available at: Astaro Security Linux: Fedora: Vulnerabilities can be reproduced using the PROTOS ISAKMP Test Suite. | Openswan IKE Message Remote Denials of Service | Low | CERT-FI & NISCC Joint Vulnerability Advisory, November 15, 2005 Astaro Security Linux Update, November 16, 2005 Fedora Update Notifications, |
Opera Web Browser 8.5, 8.0-8.0 2 | A vulnerability has been reported due to insufficient sanitization of user-supplied data passed through a URI, which could let a remote malicious user execute arbitrary code. Upgrades available at: There is no exploit code required. | Opera Web Browser Arbitrary Command Execution | High | Secunia Advisory: SA16907, November 22, 2005 |
PCRE 6.1, 6.0, 5.0 | A vulnerability has been reported in 'pcre_compile.c' due to an integer overflow, which could let a remote/local malicious user potentially execute arbitrary code. Updates available at: Ubuntu: Ubuntu: Fedora: Gentoo: Mandriva: SUSE: Slackware: Ubuntu: Debian: SUSE: Gentoo: Conectiva: Gentoo: Debian: Gentoo: Debian: Conectiva: TurboLinux: Avaya: Trustix: HP: Trustix: Currently we are not aware of any exploits for this vulnerability. | PCRE Regular Expression Heap Overflow | High | Secunia Advisory: SA16502, August 22, 2005 Ubuntu Security Notice, USN-173-1, August 23, 2005 Ubuntu Security Notices, USN-173-1 & 173-2, August 24, 2005 Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200508-17, August 25, 2005 Mandriva Linux Security Update Advisories, MDKSA-2005:151-155, August 25, 26, & 29, 2005 SUSE Security Announcements, SUSE-SA:2005:048 & 049, August 30, 2005 Slackware Security Advisories, SSA:2005-242-01 & 242-02, August 31, 2005 Ubuntu Security Notices, USN-173-3, 173-4 August 30 & 31, 2005 Debian Security Advisory, DSA 800-1, September 2, 2005 SUSE Security Announcement, SUSE-SA:2005:051, September 5, 2005 Slackware Security Advisory, SSA:2005-251-04, September 9, 2005 Gentoo Linux Security Advisory, GLSA 200509-08, September 12, 2005 Conectiva Linux Announce- Gentoo Linux Security Advisory, GLSA 200509-12, September 19, 2005 Debian Security Advisory, DSA 817-1 & DSA 819-1, September 22 & 23, 2005 Gentoo Linux Security Advisory, GLSA 200509-19, September 27, 2005 Debian Security Advisory, DSA 821-1, September 28, 2005 Conectiva Linux Announcement, CLSA-2005:1013, September 27, 2005 Turbolinux Security Advisory, TLSA-2005-92, October 3, 2005 Avaya Security Advisory, ASA-2005-216, October 18, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0059, October 21, 2005 HP Security Bulletin, HPSBUX02074, November 16, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0062, November 22, 2005 |
PHP 5.0 .0-5.0.5, 4.4 .0, 4.3.1 -4.3.11, 4.2-4.2.3, 4.1.0-4.1.2, 4.0 0-4.0.7 | A Denial of Service vulnerability has been reported in the 'sapi_apache2.c' file. PHP 5.1.0 final and 4.4.1 final are not affected by this issue. Please contact the vendor to obtain fixes. Gentoo: Mandriva: Trustix: There is no exploit code required. | PHP Apache 2 Denial of Service | Low | Security Focus, Bugtraq ID: 15177, October 24, 2005 Gentoo Linux Security Advisory, GLSA 200511-08, November 14, 2005 Mandriva Linux Security Advisory, MDKSA-2005:213, November 16, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0062, November 22, 2005 |
phpMyAdmin 2.6 .0-2.6.3, 2.5 .0-2.5.7, 2.4 .0, 2.3.2, 2.3.1, 2.2 -2.2.6, 2.1-2.1 .2, 2.0-2.0.5 | Several vulnerabilities have been reported: a Cross-Site Scripting vulnerability has been reported in 'libraries/auth/cookie. Upgrades available at: Debian: SUSE: There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPMyAdmin Cross-Site Scripting | Medium | Secunia Advisory: SA16605, August 29, 2005 Debian Security Advisory, DSA 880-1, November 2, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 SUSE Security Announcement, SUSE-SA:2005:066, November 18, 2005 |
phpMyAdmin 2.x | Several vulnerabilities have been reported: a vulnerability was reported due to insufficient verification of certain configuration parameters, which could let a remote malicious user include arbitrary files; and a Cross-Site Scripting vulnerability was reported in 'left.php,' 'queryframe.php,' and 'server_databases.php' due to insufficient sanitization of unspecified input, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: Gentoo: Debian: SUSE: There is no exploit code required; however, a Proof of Concept exploit has been published. | phpMyAdmin Local File Inclusion & Cross-Site Scripting | Medium | Secunia Advisory: SA17289, October 24, 2005 Gentoo Linux Security Advisory, GLSA 200510-21, October 25, 2005 Debian Security Advisory, DSA 880-1, November 2, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 SUSE Security Announcement, SUSE-SA:2005:066, November 18, 2005 |
Smb4k 0.4-0.6 | A vulnerability has been reported due to the insecure creation of temporary files, which could let a malicious user obtain sensitive information. Patches available at: Upgrades available at: Mandriva: Gentoo: There is no exploit code required. | Smb4k Insecure Temporary File Creation | Medium | Security Focus, Bugtraq ID: 14756, September 7, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:157, September 6, 2005 Gentoo Linux Security Advisory, GLSA 200511-15, November 18, 2005 |
Squid 2.x | A remote Denial of Service vulnerability has been reported when handling certain FTP server responses. Patches available at: Fedora: Mandriva: SCO: SUSE: IPCop: There is no exploit code required. | Squid FTP Server Response Handling Remote Denial of Service | Low | Secunia Advisory: SA17271, October 20, 2005 Fedora Update Notifications, Mandriva Linux Security Advisory, MDKSA-2005:195, October 26, 2005 SCO Security Advisory, SCOSA-2005.44, November 1, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 Security Focus, Bugtraq ID: 15157, November 10, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
Sylpheed 2.0-2.0.3, 1.0.0-1.0.5 | A buffer overflow vulnerability has been reported in 'ldif.c' due to a boundary error in the 'ldif_ Upgrades available at: Fedora: Gentoo: Debian: Currently we are not aware of any exploits for this vulnerability. | Sylpheed LDIF Import Buffer Overflow | Medium | Bugtraq ID: 15363, November 9, 2005 Fedora Update Notification, Gentoo Linux Security Advisory, GLSA 200511-13, November 15, 2005 Debian Security Advisory, DSA 906-1, November 22, 2005 |
Sudo 1.x | A vulnerability has been reported in the environment cleaning due to insufficient sanitization, which could let a malicious user obtain elevated privileges. Debian: Mandriva: Ubuntu: SUSE: Trustix: An exploit script has been published. | Todd Miller Sudo Local Elevated Privileges | Medium | Debian Security Advisory, DSA 870-1, October 25, 2005 Mandriva Linux Security Advisory, MDKSA-2005:201, October 27, 2005 Ubuntu Security Notice, USN-213-1, October 28, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 Security Focus, Bugtraq ID: 15191, November 10, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0062, November 22, 2005 |
WHM Autopilot 2.5.20, 2.5 .0, 2.4.7, 2.4.6 .5, 2.4.6, 2.4.5 | A vulnerability has been reported due to a failure to ensure that cancellation requests from users are performed only by authorized users, which could let a remote malicious user issue cancel requests and potentially cause a Denial of Service.
No workaround or patch available at time of publishing. There is no exploit code required. | WHM AutoPilot Account Cancellation Access Validation | Low | Security Focus, Bugtraq ID: 15483, November 17, 2005 |
Zope 2.6-2.8.1 | A vulnerability has been reported in 'docutils' due to an unspecified error and affects all instances which exposes 'Restructured Hotfix available at: Gentoo: SUSE: Currently we are not aware of any exploits for this vulnerability. | Zope 'Restructured | Not Specified | Zope Security Alert, October 12, 2005 Gentoo Linux Security Advisory, GLSA 200510-20, October 25, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attack Scripts | Common Name / CVE Reference | Risk | Source |
Advanced Poll 2.0.3, 2.0.2 | A Cross-Site Scripting vulnerability has been reported in 'popup.php' due to insufficient sanitization of the 'poll_ident' parameter, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proof of Concept exploits have been published. | Advanced Poll Cross-Site Scripting | Medium | Security Focus, Bugtraq ID: 15506, November 21, 2005 |
Almond Classifieds | A vulnerability has been reported due to a failure to verify that the password supplied matches the given entry, which could let a remote malicious user obtain unauthorized access.
No workaround or patch available at time of publishing. There is no exploit code required. | Almond Classifieds Remote Unauthorized Access | Medium | Security Focus, Bugtraq ID: 15505, November 21, 2005 |
Struts 1.2.7 | A Cross-Site Scripting vulnerability has been reported in error response due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. Upgrade available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Apache Struts Cross-Site Scripting | Medium | Security Focus, Bugtraq ID: 15512, November 21, 2005 |
APBoard | An SQL injection vulnerability was reported in 'thread.php' due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | APBoard SQL Injection | Medium | Security Focus, Bugtraq ID: 15513, November 21, 2005 |
Arki-DB 2.0, 1.0 | An SQL injection vulnerability has been reported in 'index.php' due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Arki-DB SQL Injection | Medium | Security Focus, Bugtraq ID: 15467, November 16, 2005 |
VPN-1/Firewall-1 NG with AI R55W, VPN-1/Firewall-1 NG with AI R55P, VPN-1/Firewall-1 NG with AI R55, VPN-1/Firewall-1 NG with AI R54, VPN-1 Pro NGX R60, FireWall-1 GX 3.0, Express CI R57 | A remote Denial of Service vulnerability has been reported due to unspecified vulnerabilities in the IPSec implementation. Check Point has addressed these issues in the latest Hotfix Accumulators. Vulnerability can be reproduced with the PROTOS IPSec Test Suite. | Check Point Firewall-1 & VPN-1 ISAKMP IKE Remote Denial of Service | Low | Security Focus, Bugtraq ID: 15479, November 17, 2005 |
Cisco PIX/ASA 7.0.1.4, 7.0, PIX OS, PIX Firewall 535, 525 6.3, 525, 520, 515E, 515, 506, 501, 6.3.3 (133), 6.3.2, 6.3.1, 6.3 (5), 6.3 (3.109), 6.3 (3.102), 6.3 (3), 6.3 (1), 6.3, 6.2.3 (110), 6.2.3, 6.2.2 .111, 6.2.2, 6.2., 6.2 (3.100), 6.2 (3), 6.2 (2), 6.2 (1), 6.2, 6.1.5 (104), 6.1.5, 6.1.4, 6.1.3, 6.1 (1-5), 6.1, 6.0.4, 6.0.3, 6.0 (4.101), 6.0 (4), 6.0 (2), 6.0 (1), 6.0, 5.3 (3), 5.3 (2), 5.3 (1.200), 5.3 (1), 5.3, 5.2 (9), 5.2 (7), 5.2 (6), 5.2 (5), 5.2 (3.210), 5.2 (2), 5.2 (1), 5.2, 5.1.4, 5.1 (4.206), 5.1, 5.0, 4.4 (8), 4.4 (7.202), 4.4 (4), 4.4, 4.3, 4.2.2, 4.2.1, 4.2 (5), 4.2, 4.1.6 b, 4.1.6, 4.0, 3.1, 3.0, 2.7 | A remote Denial of Service vulnerability has been reported when handling TCP SYN packets with invalid checksums. No workaround or patch available at time of publishing. There is no exploit code required; however, an exploit has been published. | Cisco PIX Invalid TCP Checksum Remote Denial of Service | Low | Arhont Ltd.- Information Security Advisory, November 22, 2005 |
PHP-Fusion 6.00.206 & prior
| Several vulnerabilities have been reported: an SQL injection vulnerability was reported in 'options.php' due to insufficient sanitization of the 'forum_id' and 'thread_id' parameters and in 'viewforum.php' and 'index.php' due to insufficient sanitization of the 'lastvisite' parameter, which could let a remote malicious user execute arbitrary SQL code; and a path disclosure vulnerability was reported in 'subheader.php.' Patches available at: There is no exploit code required; however, Proof of Concept exploits have been published. | PHP-Fusion SQL Injection & Path Disclosure | Medium | Secunia Advisory: SA17664 , November 21, 2005 |
Exponent Content Management System 0.96.4, 0.96.1, 0.95, 0.94 | Several vulnerabilities have been reported because file permissions on user files are incorrectly set, which could let a remote malicious obtain sensitive information or execute arbitrary script code.
No workaround or patch available at time of publishing. There is no exploit code required. | Exponent Content Management System Multiple Improper File Permission CVE-2005-3761 | Medium | Security Focus, Bugtraq ID: 15503, November 19, 2005 |
Google Search Appliance, Mini Search Appliance | Several vulnerabilities have been reported: a vulnerability was reported in the 'proxystyle sheet' parameter due to insufficient sanitization before returned to the user in an error message, which could let a remote malicious user execute arbitrary HTML and script code; a vulnerability was reported in 'XSLT style sheets due to insufficient sanitization of the 'proxystylesheet' parameter, which could let a remote malicious user execute arbitrary Java class methods; and a vulnerability was reported because it is possible to enumerate open ports on other systems by providing the full URL containing hostname and port number. A patch is reportedly available from the vendor. There is no exploit code required; however, Proof of Concept exploits and an exploit script have been published. | Google Mini Search Appliance Multiple Vulnerabilities CVE-2005-3754 | Medium | Secunia Advisory: SA17644, November 21, 2005 |
Jetdirect 635n IPv6/IPsec Print Server (J7961A) | A remote Denial of Service vulnerability has been reported due to a security flaw in HP's IPSec implementation. Update available at: Vulnerability can be reproduced using the PROTOS ISAKMP Test Suite. | HP Jetdirect 635n IPv6/IPsec Print Server IKE Exchange Remote Denial of Service | Low | HP Security Bulletin, HPSBPI02078, November 16, 2005 |
WirelessIP5000 2.0.1, 2.0, 1.5.10, 1.5.8, 1.5.6, 1.5.5, 1.5.4, 1.5.2, 1.5 | Multiple vulnerabilities have been reported: a vulnerability was reported because the SNMP service allows read-write access using any credentials, which could let a remote/local malicious user retrieve and modify the device configuration; a vulnerability was reported due to an undocumented open port 3390/tcp that allows access to the Unidata Shell upon connection, which could let a remote/local malicious user obtain sensitive information and cause a Denial of Service; a vulnerability was reported due to a hardcoded administrative password, which could let a remote/local malicious user obtain unauthorized access; and a vulnerability was reported because the default index page of the phone's HTTP server (8080/tcp) discloses sensitive information. Users are advised to contact the vendor for details on obtaining the appropriate updates. There is no exploit code required. | Hitachi WirelessIP5000 IP Phone Multiple Vulnerabilities CVE-2005-3719 | Medium | Secunia Advisory: SA17628, November 17, 2005 |
Revize CMS | Multiple vulnerabilities have been reported: an SQL injection vulnerability was reported in 'query_results.jsp' due to insufficient sanitization of the 'query' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; a vulnerability was reported in 'conf/revize.xml' because configuration data is stored inside the web root; a vulnerability was reported because a remote malicious user can obtain sensitive information by accessing 'debug/,' and a Cross-Site Scripting vulnerability was reported in 'HTTPTranslator No workaround or patch available at time of publishing. There is no exploit code required; however, Proof of Concept exploits have been published. | Revize CMS Cross-Site Scripting, SQL Injection, & Information Disclosure | Medium | Security Tracker Alert ID: 1015231, November 16, 2005 |
FUDForum 2.6.15 | A vulnerability has been reported in the 'mid' parameter due to insufficient validation before retrieving a forum post, which could let a remote malicious user bypass certain security restrictions and obtain sensitive information. PHPGroupWare: Gentoo: Debian: Debian: There is no exploit code required. | FUDForum Security Restriction Bypass | Medium | Secunia Advisory: SA16414, August 12, 2005 Security Focus, Bugtraq ID: 14556, August 25, 2005 Gentoo Linux Security Advisory, GLSA 200508-20, August 30, 2005 Debian Security Advisory , DSA 798-1, September 2, 2005 Debian Security Advisory, DSA 899-1, November 17, 2005 |
ArticleLive NX 0.3, ArticleLive NX | An SQL injection vulnerability has been reported due to insufficient sanitization of the 'Query' parameter, which could let a remote malicious user execute arbitrary SQL code. Update to Interspire ArticleLive NX.0.4. There is no exploit code required. | Interspire ArticleLive NX SQL Injection | Medium | Secunia Advisory: SA17585, November 17, 2005 |
Joomla 1.0-1.0.3 | Multiple vulnerabilities have been reported: a Cross-Site Scripting vulnerability was reported due to insufficient sanitization of certain unspecified input before returning to the user, which could let a remote malicious user execute arbitrary HTML and script code; an SQL injection vulnerability was reported in the 'mod_poll' module due to insufficient sanitization of the 'Itemid' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and an SQL injection vulnerability was reported due to insufficient sanitization of several methods in the in 'mosDBTable' class before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. Upgrades available at: There is no exploit code required. | Joomla Multiple Input Validation | Medium | Secunia Advisory: SA17675, November 22, 2005 |
Flash 7.0.19 .0, 7.0 r19, 6.0.79 .0, 6.0.65 .0, 6.0.47 .0, 6.0.40 .0, 6.0.29 .0, 6.0 | A vulnerability has been reported due to insufficient validation of the frame type identifier that is read from a SWF file, which could let a remote malicious user execute arbitrary code. Update information available at: Microsoft: SUSE: An exploit has been published. | Macromedia Flash Array Index Remote Arbitrary Code Execution | High | Macromedia Security Advisory, MPSB05-07, November 5, 2005 Microsoft Security Advisory (910550), November 10, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 |
Flash 7.0.19 .0 & prior | An input validation vulnerability has been reported in 'ActionDefineFunction' due to an error for a critical array index value, which could let a remote malicious user cause a Denial of Service or execute arbitrary code. Update information available at: Microsoft: Proof of Concept exploit scripts have been published. | Macromedia Flash Input Validation | High | Macromedia Security Bulletin, MPSB05-07, November 7, 2005 Microsoft Security Advisory (910550), November 10, 2005 Security Focus, Bugtraq ID: 15334, November 21, 2005 |
Mambo Site Server 4.0.14, 4.0.12 RC1-RC3, BETA & BETA 2, 4.0.10-4.0.12, 4.0 | A remote file include vulnerability has been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary remote PHP code.
No workaround or patch available at time of publishing. An exploit script has been published. | Mambo Open Source Remote File Include | High | Security Focus, Bugtraq ID: 15461, November 16, 2005 Security Focus, Bugtraq ID: 15461, November 21, 2005 |
Mantis 1.0.0RC2, 0.19.2 | Several vulnerabilities have been reported: a vulnerability was reported in 'bug_ Upgrades available at: Gentoo: Debian: There is no exploit code required; however, Proof of Concept exploits have been published. | Mantis Multiple Vulnerabilities CVE-2005-3335 | High | Secunia Advisory: SA16818, October 26, 2005 Gentoo Linux Security Advisory, GLSA 200510-24, October 28, 2005 Debian Security Advisory, DSA 905-1, November 22, 2005 |
MediaWiki 1.5 alpha1&2, bet1-beta3, 1.4-1.4.10, 1.3.13, 1.3-1.3.11 | A Cross-Site Scripting vulnerability has been reported in inline style attributes due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: SUSE: There is no exploit code required. | Medium | Security Focus, Bugtraq ID: 15024, October 6, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 | |
Ubuntu Linux 5.10 powerpc, i386, amd64; | A buffer overflow vulnerability has been reported in the SVG importer due to a boundary error, which could let a remote malicious user execute arbitrary code. Ubuntu: A Proof of Concept Denial of Service exploit has been published. | Inkscape SVG Image Buffer Overflow | High | Ubuntu Security Notice, USN-217-1, November 21, 2005 |
University of Kansas Lynx 2.8.5 & prior | A vulnerability has been reported in the 'lynxcgi:' URI handler, which could let a remote malicious user execute arbitrary commands. Upgrades available at: RedHat: Mandriva: Gentoo: Trustix: There is no exploit code required. | Lynx URI Handlers Arbitrary Command Execution | High | Security Tracker Alert ID: 1015195, November 11, 2005 RedHat Security Advisory, RHSA-2005:839-3, November 11, 2005 Mandriva Linux Security Advisory, MDKSA-2005:211, November 12, 2005 Gentoo Linux Security Advisory, GLSA 200511-09, November 13, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0066, November 22, 2005 |
IETF RFC 793: TCP | A remote Denial of Service vulnerability has been reported in the TCP congestion control mechanism when the remote peer forges acknowledgment packets prior to actually receiving packets from the sending host.
No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Multiple Vendor TCP Acknowledgements Remote Denial of Service | Low | US-CERT VU#102014 |
phpSysInfo 2.0-2.3 | Multiple input validation vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user conduct Cross-Site Scripting attacks, phishing style attacks, and retrieve privileged or sensitive information.
Upgrades available at: Debian: Debian: http://security.debian. Mandriva: There is no exploit code required; however, Proof of Concept exploits have been published. | phpSysInfo Multiple Vulnerabilities | Medium | Hardened PHP Project Security Advisory, November 13, 2005 Debian Security Advisory, DSA 897-1, November 15, 2005 Debian Securities, Advisory DSA 898-1 & 899-1, November 17, 2005 Mandriva Linux Security Advisory, MDKSA-2005:212, November 16, 2005 |
RedHat Fedora Core4, Core3; PHP 5.0.4, 4.3.9 | A remote Denial of Service vulnerability has been reported when parsing EXIF image data contained in corrupt JPEG files. Fedora: RedHat: Mandriva: Currently we are not aware of any exploits for this vulnerability. | PHP Group Exif Module Remote Denial of Service | Low | Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:831-15, November 10, 2005 Mandriva Linux Security Advisory, MDKSA-2005:213, November 16, 2005 |
NetMail 3.52 D | A buffer overflow vulnerability has been reported in the IMAP server when parsing certain long verb arguments, which could let a remote malicious user execute arbitrary code. Patches available at: Currently we are not aware of any exploits for this vulnerability. | Novell NetMail IMAP Buffer Overflow | High | ZDI-05-003 Advisory, November 18, 2005 |
Opera Web Browser 8.50, 8.0-8.0 2 | A vulnerability has been reported due to a failure to show the correct URL in the status bar if an image control with a 'title' attribute has been enclosed in a hyperlink and uses a form to specify the destination URL, which could let a remote malicious user trick users into visiting a malicious website. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Opera Image Control Status Bar Spoofing | Medium | Secunia Advisory: SA17571, November 16, 2005 |
PHP Download Manager1.1-1.1.3 | An SQL injection vulnerability has been reported in 'files.php' due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required.; however a Proof of Concept exploit has been published. | PHP Download Manager SQL Injection | Medium | Security Focus, Bugtraq ID: 15517, November 21, 2005 |
PHP Easy Download | A vulnerability has been reported in 'edit.php' which could let a remote malicious user obtain authentication to obtain administrative access. No workaround or patch available at time of publishing. There is no exploit code required. | PHP Easy Download Authentication Bypass | High | Security Focus, Bugtraq ID: 15470, November 16, 2005 |
PHP 5.0.5, 4.4.0 | A vulnerability has been reported in the 'open_basedir' directive due to the way PHP handles it, which could let a remote malicious user obtain sensitive information. Ubuntu: Trustix: Upgrades available at: Gentoo: Mandriva: Trustix: There is no exploit code required. | PHP 'Open_BaseDir' Information Disclosure | Medium | Security Focus, Bugtraq ID: 14957, September 27, 2005 Ubuntu Security Notice, USN-207-1, October 17, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0059, October 21, 2005 Security Focus, Bugtraq ID: 14957, October 31, 2005 Gentoo Linux Security Advisory, GLSA 200511-08, November 13, 2005 Mandriva Linux Security Advisory, MDKSA-2005:213, November 16, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0062, November 22, 2005 |
PHP 4.0.x, 4.1.x, 4.2.x, 4.3.x, 4.4.x, 5.0.x | Multiple vulnerabilities have been reported: a vulnerability was reported due to insufficient protection of the 'GLOBALS' array, which could let a remote malicious user define global variables; a vulnerability was reported in the 'parse_str()' PHP function when handling an unexpected termination, which could let a remote malicious user enable the 'register_ Upgrades available at: SUSE: TurboLinux: Fedora: RedHat: http://rhn.redhat. Gentoo: Mandriva: SUSE: Trustix: There is no exploit code required. | PHP Multiple Vulnerabilities CVE-2005-3388 | Medium | Secunia Advisory: SA17371, October 31, 2005 SUSE Security Summary Report, SUSE-SR:2005:025, November 4, 2005 Turbolinux Security Advisory TLSA-2005-97, November 5, 2005 Fedora Update Notifications, RedHat Security Advisories, RHSA-2005:838-3 & RHSA-2005:831-15, November 10, 2005 Gentoo Linux Security Advisory, GLSA 200511-08, November 13, 2005 Mandriva Linux Security Advisory, MDKSA-2005:213, November 16, 2005 SUSE Security Summary Report, SUSE-SR:2005:027, November 18, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0062, November 22, 2005
|
phpComasy 0.7.5, 0.7.4 | An SQL injection vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'id' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required. | PHPComasy SQL Injection | Medium | Security Focus, Bugtraq ID: 15511, November 21, 2005 |
phpldapadmin 0.9.6 - 0.9.7/alpha5 | Multiple vulnerabilities have been reported: a Cross-Site Scripting vulnerability was reported due to insufficient user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code; a Directory Traversal vulnerability was reported which could let a remote malicious user obtain sensitive information; and a file include vulnerability was reported, which could let a remote malicious user execute arbitrary PHP script code. Debian: Gentoo: Mandriva: An exploit script has been published. | phpLDAPadmin Multiple Vulnerabilities | Medium | Security Focus, Bugtraq ID: 14695, August 30, 2005 Security Focus, Bugtraq ID: 14695, September 7, 2005 Mandriva Linux Security Advisory, MDKSA-2005:212, November 16, 2005 |
phpmyFAQ 1.5.3 & prior | Cross-Site Scripting vulnerabilities have been reported in the 'add content' page due to insufficient sanitization of the 'thema,' 'username,' and 'usermail' parameters, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: There is no exploit code required. | PHPMyFAQ Multiple Cross-Site Scripting | Medium | TKADV2005-11-004 Advisory, November 19, 2005 |
PHPPost 1.0 | Multiple Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPPost Multiple Cross-Site Scripting | Medium | Security Focus, Bugtraq ID: 15524, November 22, 2005 |
phpSysInfo 2.3 | Multiple Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. It is also possible to obtain the full path to certain scripts. Debian: Debian: Debian: Mandriva: There is no exploit code required; however, Proofs of Concept exploits have been published. | High | Secunia Advisory, Debian Security Advisory, DSA 724-1, May 18, 2005 Debian Security Advisory, DSA 897-1, November 15, 2005 Mandriva Linux Security Advisory, MDKSA-2005:212, November 16, 2005 Debian Security Advisory, DSA 898-1, November 17, 2005
| |
PMachine Pro 2.4 | A vulnerability has been reported in 'mail_autocheck. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Pmachine Pro Email Remote File Include | High | Security Focus, Bugtraq ID: 15473, November 16, 2005 |
Saturn Innovation Mailing system | An SQL injection vulnerability has been reported due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required. | Saturn Innovation Mailing System SQL Injection | Medium | Security Focus, Bugtraq ID: 15518, November 21, 2005 |
SI-680H VOIP WIFI Phone 0.3 .0839 | A vulnerability has been reported because connections from VxWorks debugger on port 17185/udp are allowed, which could let a remote malicious user obtain sensitive information or cause a Denial of Service. No workaround or patch available at time of publishing. There is no exploit code required. | Senao SI-680H VOIP WIFI Phone VxWorks Remote Debugger Access | Medium | Secunia Advisory: SA17606, November 17, 2005 |
SimplePoll | An SQL injection vulnerability has been reported in 'results.php' due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | SimplePoll SQL Injection | Medium | Security Focus, Bugtraq ID: 15508, November 21, 2005 |
Gateway Security 5400 2.0.1, 5310 1.0, 5300 1.0, 5200 1.0, 5100, 5000, 400 2.0, 300 2.0, Firewall/VPN Appliance 200R, 200, 100, Enterprise Firewall 8.0 Solaris, 8.0 NT/2000 | A remote Denial of Service vulnerability has been reported due to a failure of the product's IPSec implementation to properly handle malformed IKE packets. Patch information available at: Vulnerability can be reproduced with the PROTOS IPSec Test Suite. | Symantec Dynamic VPN Services Remote Denial of Service | Low | Symantec Security Advisory, SYM05-025, November 21, 2005 |
NukeET 3.0-3.2 | An SQL injection vulnerability has been reported in the 'search' module due to insufficient sanitization of the 'query' variable before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. Fix available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | Tru-Zone Nuke ET SQL Injection | Medium | Security Focus, Bugtraq ID: 15519, November 21, 2005 |
Unclassified NewsBoard 1.5.3 a, 1.5.3 | An SQL injection vulnerability has been reported in 'forum.php' due to insufficient sanitization of user-supplied input before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, an exploit script has been published. | Unclassified NewsBoard SQL Injection | Medium | Security Focus, Bugtraq ID: 15466, November 16, 2005 |
Uresk Links 2.0 Lite | A vulnerability has been reported in 'index.php' which could let a remote malicious user bypass authentication to obtain administrative access. No workaround or patch available at time of publishing. There is no exploit code required. | Uresk Links Admin Authentication Bypass | High | Security Focus, Bugtraq ID: 15469, November 16, 2005 |
F1000 VOIP WIFI Phone s2.0 | Multiple vulnerabilities have been reported: a vulnerability was reported because the SNMP service that runs on the IP phone allows read access using default public credential, which could let a remote malicious user obtain sensitive information; and a vulnerability was reported in the rlogin service due to insufficient access controls, which could let a remote malicious user obtain unauthorized access. Users of affected packages should contact the vendor for further information on obtaining fixes. There is no exploit code required. | UTStarcom F1000 Wi-Fi Handset Multiple Vulnerabilities | Medium | Secunia Advisory: SA17629, November 17, 2005 |
XMail 1.21 | A buffer overflow vulnerability has been reported in the 'AddressFromAtPtr()' function due to a boundary error when copying the hostname portion of an e-mail address to a 256-byte buffer, which could let a malicious user execute arbitrary code. Upgrade available at: Debian: An exploit script has been published. | XMail Command Line Buffer Overflow | High | Security Tracker Alert ID: 1015055, October 13, 2005 Security Focus, Bugtraq ID: 15103, October 22, 2005 Debian Security Advisory, DSA 902-1, November 21, 2005 |
XMB Forum, 1.9.3, 1.9.2 | Several vulnerabilities have been reported: a vulnerability was reported in 'member.php' due to insufficient sanitization of 'Your Current Mood' field when registering for an account, which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability was reported because a remote malicious user can submit a specially crafted URL to cause the system to display an error message that No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | XMB Forum HTML Injection & Path Disclosure | Medium | KAPDA::#13 Advisory, November 17, 2005 |
yaSSL 1.0-1.0.5, 0.x | A vulnerability has been reported due to an unspecified error when processing the certification chain, which could allow improper certificates to be used when authenticating connections. Upgrades available at: http://yassl.com/yassl-1.0.6.zip Currently we are not aware of any exploits for this vulnerability. | yaSSL Certification Chain Processing | Medium | Security Focus, Bugtraq ID: 15487, November 17, 2005 |
Prestige 2000W v.1VoIP Wi-Fi Phone | An information disclosure vulnerability was reported, which could let a remote malicious user obtain sensitive information to perform a Denial of Service. No workaround or patch available at time of publishing. There is no exploit code required. | Zyxel P2000W v.1 VOIP WIFI Phone Information Disclosure | Low | Security Focus, Bugtraq ID: 15478, November 16, 2005 |
[back to top] Wireless
The section below contains wireless vulnerabilities, articles, and viruses/trojans identified during this reporting period.
- Mobile phones growing faster than ever: According to a principal analyst for mobile terminals research at Gartner, the international mobile phone market is experiencing its largest ever growth period. The third quarter of 2005 saw 205.4 million mobiles sold around the world, a 22 per cent increase on the same period of last year. Source: http://www.pcw.co.uk/computing/news/2146448/mobile-sales-biggest-ever.
- Panelists Weigh Potential RFID Security Threats:
TechBix Connection panelists that participated in a discussion on Radio Frequency identification technology (RFID) agree there are security risks for companies that don't secure their RFID network by using equipment with built in protocols such as secure shell and secure socket layer. Source: http://www.informationweek.com/story/
showArticle.jhtml?articleID=174400968&tid=6004.
Wireless Vulnerabilities
- Senao SI-680H VOIP WIFI Phone VxWorks Remote Debugger Access: A vulnerability has been reported due to the phone allowing connections from the VxWorks debugger on port 17185/udp.
- UTStarcom F1000 Wi-Fi Handset Multiple Vulnerabilities: Multiple vulnerabilities have been reported which could lead to the disclosure of sensitive information.
- Hitachi WirelessIP5000 IP Phone Multiple Vulnerabilities: Multiple vulnerabilities have been reported, which can be exploited by malicious people to gain access to potentially sensitive information, to modify certain information, and to cause a DoS.
- Zyxel P2000W v.1 VOIP WIFI Phone Information Disclosure: An information disclosure vulnerability has been reported.
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script | Script name | Workaround or Patch Available | Script Description |
November 22, 2005 | IEWindow0day.txt | Yes | Exploit for the Microsoft Internet Explorer Unauthorized Access vulnerability. |
November 21, 2005 | FileZillaDoS.cpp | No | Exploit for the FileZilla Server Terminal Privilege Elevation or Arbitrary Code Execution vulnerability. |
November 21, 2005 | freeftpd_user.pm | No | Proof of Concept exploit for the FreeFTPD User Command Buffer Overflow vulnerability. |
November 21, 2005 | mailenable_imap_w3c.pm mailenable154.pm.txt | Yes | Exploits for the MailEnable Arbitrary Code Execution vulnerability. |
November 21, 2005 | df.swf flash_dos_poc.c Flashosx.c | Yes | Proof of Concept exploit scripts for the Macromedia Flash Input Validation vulnerability. |
November 21, 2005 | Inkscape.svg | Yes | Proof of Concept Denial of Service exploit for the Inkscape SVG Image Buffer Overflow vulnerability. |
November 21, 2005 | google_proxystylesheet_exec.pm | Yes | Exploit for the Google Mini Search Appliance Multiple Vulnerabilities. |
November 20, 2005 | TKADV2005-11-004.txt | Yes | Exploit details for the PHPMyFAQ Multiple Cross-Site Scripting vulnerabilities. |
November 20, 2005 | nestea.tgz | N/A | A CGI scanner that also looks for forbidden files and directories and has a database of 2097 vulnerabilities. |
November 20, 2005 | phpwcms.txt | No | Exploit details for the phpwcms File Include, Information Disclosure & Cross-Site Scripting vulnerabilities. |
November 20, 2005 | SA027.txt | No | Exploit details for the PHPNuke SQL Injection vulnerability. |
November 20, 2005 | revizeSQL.txt | No | Exploit details for the Revize CMS Cross-Site Scripting, SQL Injection, & Information Disclosure vulnerabilities. |
November 20, 2005 | FTGate-expl.pl.txt | No | Proof of Concept exploit for the FTGate Denial of Service or Arbitrary Code Execution vulnerability. |
November 20, 2005 | ekin103_xpl.html | No | Exploit for the ekinboard Cross-Site Scripting & Script Injection vulnerabilities. |
November 20, 2005 | XH-FreeFTPD_remote_bof.c | No | Exploit for the freeFTPd Buffer Overflow vulnerability. |
November 20, 2005 | google.pm.txt | Yes | Exploit for the Google Mini Search Appliance Multiple Vulnerabilities. |
November 20, 2005 | 11.17.05.txt | No | Exploit details for the Qualcomm WorldMail IMAP Server Information Disclosure vulnerability. |
November 20, 2005 | eQuickSQLXSS.txt | No | Exploit details for the e-Quick Cart Multiple Vulnerabilities. |
November 20, 2005 | db-sec-tokens.pdf | N/A | "Snagging Security Tokens to Elevate Privileges" is a brief that details how a database server running as a low privileged user on Windows can still provide an attacker with the ability to gain elevated privilege. |
November 20, 2005 | mamboRumor.txt | No | Exploit for the Mambo Open Source Remote File Include vulnerability. |
November 18, 2005 | XH-freeFTPD_remote_bof.c | No | Exploit for the FreeFTPD Multiple Buffer Overflow Vulnerabilities. |
November 16, 2005 | UNB153pl3_xpl.php | No | Exploit for the Unclassified NewsBoard SQL Injection Vulnerability. |
[back to
top]
name=trends>Trends
- US-CERT VU#226364: Numerous vulnerabilities have been reported in various Internet Key Exchange version 1 (IKEv1) implementations. The impacts of these vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, or cause an IKEv1 implementation to behave in an unstable/unpredictable manner.
- W32/Sober Revisited: US-CERT is aware of several new variants of the W32/Sober virus that propagate via email. As with many viruses, these variants rely on social engineering to propagate. Specifically, the user must click on a link or open an attached file. Source: http://www.us-cert.gov/current/.
- Exploit for Vulnerability in Microsoft Internet Explorer window() object: US-CERT is aware of a vulnerability in the way Microsoft Internet Explorer handles requests to the window() object. Source: http://www.us-cert.gov/current/.
- The Twenty Most Critical Internet Security Vulnerabilities (Updated) ~ The Experts Consensus: The top 20 list is compiled by the SANS Institute in co-operation with security vendors has been released. It highlights the 20 most critical vulnerabilities currently facing organizations. In addition to identifying vulnerabilities in Windows and UNIX systems, this year's Top-20 list also includes cross-platform applications and networking products for the first time. Source: http://www.sans.org/top20/.
- Computer hackers target security products: According to research, computer hackers have stepped up efforts to exploit flaws in information security software. According to the SANS Institute Top 20 security vulnerability report, over the past 12 months cyber criminals have shifted their attention from targeting holes in Windows and Unix software to attacking data back-up, recovery and antivirus products. Source: http://www.vnunet.com/computing/news/2146422/computer-hackers-target.
- Web giants crack down on spyware: Several Internet firms, including Yahoo, AOL, and Verizon have joined together to reduce the spread of adware and spyware that is distributed by 'piggybacking' on legitimate downloads.
They have agreed to establish industry standards for monitoring and enforcing good behavior on websites which offer downloadable software.
Source: http://www.itweek.co.uk/vnunet/news/2146346/web-giants-crack-spyware.
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trend | Date |
face="Arial, Helvetica, sans-serif">Description |
1 | Netsky-P | Win32 Worm | Stable | March 2004 | A mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. The worm also tries to spread through various file-sharing programs by copying itself into various shared folders. |
2 | Mytob-BE | Win32 Worm | Stable | June 2005 | A slight variant of the mass-mailing worm that utilizes an IRC backdoor, LSASS vulnerability, and email to propagate. Harvesting addresses from the Windows address book, disabling anti virus, and modifying data. |
3 | Netsky-D | Win32 Worm | Stable | March 2004 | A simplified variant of the Netsky mass-mailing worm in that it does not contain many of the text strings that were present in NetSky.C and it does not copy itself to shared folders. Netsky.D spreads itself in e-mails as an executable attachment only. |
4 | Mytob-GH | Win32 Worm | Stable | November 2005 | A variant of the mass-mailing worm that disables security related programs and allows other to access the infected system. This version sends itself to email addresses harvested from the system, forging the sender’s address. |
5 | Mytob-AS | Win32 Worm | Stable | June 2005 | A slight variant of the mass-mailing worm that disables security related programs and processes, redirection various sites, and changing registry values. This version downloads code from the net and utilizes its own email engine. |
6 | Netsky-Z | Win32 Worm | Stable | April 2004 | A mass-mailing worm that is very close to previous variants. The worm spreads in e-mails, but does not spread to local network and P2P and does not uninstall Bagle worm. The worm has a backdoor that listens on port 665. |
7 | Lovgate.w | Win32 Worm | Stable | April 2004 | A mass-mailing worm that propagates via by using MAPI as a reply to messages, by using an internal SMTP, by dropping copies of itself on network shares, and through peer-to-peer networks. Attempts to access all machines in the local area network. |
8 | Zafi-D | Win32 Worm | Stable | December 2004 | A mass-mailing worm that sends itself to email addresses gathered from the infected computer. The worm may also attempt to lower security settings, terminate processes, and open a back door on the compromised computer. |
9 | Zafi-B | Win32 Worm | Stable | June 2004 | A mass-mailing worm that spreads via e-mail using several different languages, including English, Hungarian and Russian. When executed, the worm makes two copies of itself in the %System% directory with randomly generated file names. |
10 | Mytob.C | Win32 Worm | Stable | March 2004 | A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the Windows LSASS (MS04-011) exploit. The worm will attempt to harvest email addresses from the local hard disk by scanning files. |
Table updated November 21, 2005
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.