-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Summary of Security Items from July 21 through August 3, 2004 This bulletin provides a summary of new or updated vulnerabilities, exploits, trends and viruses identified between July 21 and August 3, 2004. The current version of this document can be found here <http://www.us-cert.gov/cas/bulletins/SB04-217.html> Bugs, Holes, & Patches * Windows Operating Systems * UNIX Operating Systems * Multiple Operating Systems Recent Exploit Scripts/Techniques Trends Viruses/Trojans _________________________________________________________________ Bugs, Holes, & Patches The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Updates to items appearing in previous bulletins are listed in bold. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section. Note: All the information included in the following tables has been discussed in newsgroups and on web sites. Risk is defined as follows: * High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges. * Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file. * Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat. Windows Operating Systems Only Layton Technology HelpBox 3.0.1 An input verification vulnerability exists that could allow an attacker to conduct SQL injection attacks. Various scripts fail to verify input passed to certain parameters properly before it is used in a SQL query. No solution is available at this time. A Proof of Concept exploit has been published. Layton HelpBox Multiple SQL Injection Vulnerabilities High Secunia, SA12118, July 22, 2004 SecuriTeam, July 21, 2004 Microsoft MS Windows NT Workstation 4.0 SP 6a; MS Windows NT Server 4.0 SP 6a; MS Windows NT Server 4.0 Terminal Server Edition SP 6; MS Windows 2000 SP2, SP3, SP4; MS Windows XP / XP SP1; MS Windows XP 64-Bit Edition SP1; MS Windows XP 64-Bit Edition Version 2003; MS Windows Server 2003 / 2003 64-Bit Edition; MS Windows 98, 98 SE, and Me Internet Explorer 5.01 SP2, 3, 4 Internet Explorer 5.5 SP2 Internet Explorer 6, SP1, SP1 (64-Bit Edition), Windows Server 2003, Windows Server 2003 (64-Bit Edition) Cross-site scripting and remote code execution vulnerabilities exist. This security patch fixes three vulnerabilities: * A double-free vulnerability in the processing of GIF files * An integer overflow in the processing of bitmap files * Internet Explorer does not adequately validate the security context of a frame that has been redirected by a web server. An attacker can use malicious images on a web page or in HTML-formatted email messages. If the attacker can convince a user to visit the web page, open the message, or otherwise view the image, the attacker may be able to gain control of the user's machine. An attacker also may be able to take advantage of frames to redirect users to a malicious web site. Verify Windows is updated and download updates at: http://v4.windowsupdate.microsoft.com/en/default.asp We are not aware of any exploits for this vulnerability. Cumulative Security Update for Internet Explorer (867801) CVE Name: CAN-2004-0549 CAN-2004-0566 CAN-2003-1048 High Microsoft Security Bulletin MS04-025, July 30, 2004 US-CERT Cyber Security Alert SA04-212A, July 30, 2004 US-CERT VU#685364 and VU#266926, July 30, 2004 NetSupport DNA Helpdesk 1.01 An input verification vulnerability exists which could allow an attacker to conduct SQL injection attacks. The script "problist.asp" fails to verify input passed to the "where" parameter properly before it is used in a SQL query. No solution is available at this time. A working exploit has been published. DNA HelpDesk SQL Injection Vulnerability High Secunia, SA12119, July 22, 2004 OllyDbg version 1.10 A Denial of Service vulnerability exists that could allow an attacker to crash OllyDbg and execute machine code. This vulnerability is due to a format string bug in the code that handles Debugger Messages. No solution is available at this time. A working exploit has been published. OllyDbg Format String Bug High SecuriTeam, July 20, 2004 SapporoWorks BlackJumboDog FTP Server 3.6.1 A buffer overflow vulnerability exists in which a remote user can execute arbitrary code on the target system. A remote user can send a specially crafted FTP command with a long parameter string to trigger the flaw. The USER, PASS, RETR, CWD, XMKD, XRMD, and other commands are affected. The software reportedly copies the user-supplied parameter string to a 256 byte buffer. Update to version 3.6.2, available at: http://homepage2.nifty.com/spw/software/bjd/ We are not aware of any exploits for this vulnerability. BlackJumboDog Has Buffer Overflow in the FTP Service High US-CERT VU#714584, August 3, 2004 Webcam Corp. Webcam Watchdog 4.0.1a An input validation vulnerability exists that could allow an attacker to conduct cross-site scripting attacks. 'sresult.exe' does not properly filter HTML code from user-supplied input in the 'cam' variable before displaying the input. A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Watchdog software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. No solution is available at this time. A Proof of Concept exploit has been published. Webcam Watchdog Input Validation Hole in 'sresult.exe' Permits Cross-Site Scripting Attacks High SecurityTracker Alert ID: 1010824, July 30, 2004 Whisper Technology Limited FTP Surfer 1.0.7 A buffer overflow vulnerability exists due to a boundary error when handling filenames that could allow an attacker to execute arbitrary code. This can be exploited to cause a buffer overflow, which is triggered when the application is closed, by tricking a user into opening a file with an overly long filename from a malicious FTP server. No solution is available at this time. We are not aware of any exploits for this vulnerability. FTP Surfer File Handling Buffer Overflow Vulnerability High Secunia, SA12107, July 27, 2004 XLineSoft ASPRunner 2.4 and prior Multiple vulnerabilities exist in ASPRunner due to improper input validation. A remote user can inject SQL commands, conduct cross-site scripting attacks, and download the underlying database. Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted HTTP POST request that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the ASPRunner scripts and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. No solution is available at this time. A Proof of Concept exploit has been published. ASPRunner Input Validation Holes Permit SQL Injection and Cross-Site Scripting Attacks High SecurityTracker Alert ID: 1010777, July 26, 2004 SecuriTeam, July 27, 2004 Innovative Technology Consulting FTP GLIDE 2.43 A vulnerability exists in the FTP GLIDE client software in which a local user can view passwords. FTP GLIDE client stores usernames and passwords in clear text. No solution is available at this time. No exploit code required. FTP GLIDE Discloses Passwords to Local Users Medium SecurityTracker Alert ID: 1010776, July 26, 2004 Leigh Business Enterprises Ltd. LBE Web HelpDesk 4.0.80 An input verification vulnerability exists in the "jobedit.asp" script that an attacker could use to manipulate SQL queries. Update to version 4.0.0.81 available at: http://www.lbehelpdesk.com/helpdesk-latest.htm A working exploit has been published. LBE Web HelpDesk SQL Injection Medium Secunia, SA12123, July 22, 2004 SecuriTeam, July 21, 2004 Microsoft Microsoft Systems Management Server (SMS) 2.50.2726.0 A Denial of Service vulnerability exists due to an error within the client SMS Remote Control service when processing specially crafted packets containing the string "RCH0####RCHE" followed by about 130 characters. Successful exploitation crashes the service. Restrict access to ports 2701/TCP and 2702/TCP. A working exploit has been published. Microsoft Systems Management Server Remote Control Service Vulnerability Medium Secunia, SA11814, July 27, 2004 NET2SOFT Inc. Flash FTP Server 1.0 (banner version 2.1) A vulnerability exists in the Flash FTP Server which could allow a remote user can view files on the target system that are located outside of the FTP root directory. A remote authenticated user, including an anonymous user, can generate a 'CWD ...' command followed by a 'CWD /' command to gain access to the root directory on the target system. No solution is available at this time. A working exploit has been published. Flash FTP Server Lets Remote Users Traverse the Directory With CWD Command Medium SecurityTracker Alert, 1010750, July 21, 2004 Opera Software Opera 7.53 A spoofing vulnerability exists that could be exploited by an attacker to conduct phishing attacks against a user. Opera fails to update the address bar if a web page is opened using the "window.open" function and then "replaced" using the "location.replace" function. This causes Opera to display the URL of the first website while loading the content of the second website. Workaround: Do not follow links from untrusted websites. A Proof of Concept exploit has been published. Opera Browser Spoofing Vulnerability Medium Secunia, SA12162, July 27, 2004 Polar Polar HelpDesk 3.0 An authentication vulnerability exists because the system does not verify if a user is logged on. It only checks if a cookie with the appropriate "UserId" and "UserType" is set. An attacker could log on as any user with arbitrary privileges. Solution: Restrict access using a different authentication mechanism or upgrade to latest version. A working exploit has been published. Polar HelpDesk Authentication Bypass and Inadequate Security Checks Medium Secunia, SA12120, July 22, 2004 SecuriTeam, July 21, 2004 [back to top] UNIX Operating Systems Only Vendor & Software Name Vulnerability - Impact Patches - Workarounds Attacks Scripts Common Name Risk Source Citadel/UX Citadel/UX 6.23 and prior Citadel/UX "USER" Command Buffer Overflow Vulnerability A buffer overflow vulnerability exists in Citadel/UX, which could allow a Denial of Service attack or remote code execution. The vulnerability is caused due to a boundary error within the citadel service when processing "USER" commands. This can be exploited to cause a stack-based buffer overflow by passing an overly long argument (about 94 bytes) to the "USER" command. A patch is available in the CVS repository available at: http://www.citadel.org/cvs.php A Proof of Concept exploit has been published. Citadel/UX Remote Buffer Overflow Vulnerability High No System Group - Advisory #04 - July 28, 2004 Debian libapache-mod-ssl, courier (sqwebmail), mailreader Multiple vulnerabilities including cross-site scripting exist in Linux modules. Debian has issued updates for libapache-mod-ssl, courier, and mailreader. This fixes Denial of Service and other vulnerabilities. Update to Debian GNU/Linux 3.0 alias woody. Details available at: http://lists.debian.org/debian-security-announce/debian-security-annou nce-2004/msg00134.html http://lists.debian.org/debian-security-announce/debian-security-annou nce-2004/msg00136.html http://lists.debian.org/debian-security-announce/debian-security-annou nce-2004/msg00135.html We are not aware of any exploits for this vulnerability. Debian updates for libapache-mod-ssl , courier, and mailreader High Debian Security Advisories: DSA 532-1, DSA 533-1, DSA 534-1, July 22, 2004 GNU / GPL Conectiva Gentoo Mandrake RedHat SuSE Trustix Samba 3.0.0 - 3.0.4 and 2.2.9 and prior Multiple buffer overflow vulnerabilities exist in Samba that could allow a remote user to execute arbitrary code on the target system. These are caused by boundary errors when decoding base64 data and when handling "mangling method = hash". Upgrade to version 3.0.5 or 2.2.10 available at: http://us2.samba.org/samba/ftp/ Conectiva: ftp://atualizacoes.conectiva.com.br RedHat: RedHat Enterprise Linux AS 3, ES 3, WS 3: http://rhn.redhat.com/ Gentoo: http://security.gentoo.org/glsa/glsa-200407-21.xml Mandrakesoft: Mandrake Multi Network Firewall 8.x, 9.x; Mandrake Corporate Server 2.x http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:071 SuSE: SuSE Linux, Email, Database, and Enterprise Servers http://www.suse.de/de/security/2004_22_samba.html Trustix: http://http.trustix.org/pub/trustix/updates/ A working exploit has been published. Samba Buffer Overflow Vulnerabilities CVE Names: CAN-2004-0600 CAN-2004-0686 High Samba Release Notes 3.0.5, July 20, 2004 Gentoo, RedHat, Mandrakesoft, SuSE, Trustix, Conectiva Advisories Internet Software Sciences Web+Center 4.0.1 An input verification vulnerability exists that could allow an attacker to conduct SQL injection attacks. Various scripts fail to verify input passed to certain parameters through cookies properly, before it is used in a SQL query. No solution is available at this time. A working exploit has been published. Web+Center SQL Injection Vulnerability High Secunia, SA12121, July 22, 2004 SecuriTeam, July 21, 2004 Oracle Oracle 8i, 9i Multiple Implementations A privilege escalation vulnerability exists in the default library directory. This is due to a default configuration error that could allow an attacker to replace libraries required by setuid root applications with arbitrary code. This issue would allow an Oracle software owner to execute code as the superuser, taking control of the entire system. No solution is available at this time. An untested workaround is available at: http://www.securityfocus.com/bid/10829/solution/ A Proof of Concept exploit has been published. Oracle Database Default Library Directory Privilege Escalation Vulnerability High Security Focus ID 10829, July 30, 2004 PHP Group Debian Slackware Fedora pp 4.3.7 and prior Updates to fix multiple vulnerabilities with php4 which could allow remote code execution. Debian: Update to Debian GNU/Linux 3.0 alias woody at http://www.debian.org/releases/stable/ Slackware: http://www.slackware.com/security/viewer.php?l=slackware- security&y=2004&m=slackware-security.406480 Fedora: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/ http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ PHP 'memory_limit' and strip_tags() Remote Vulnerabilities CVE Name: CAN-2004-0594 CAN-2004-0595 High Secunia, SA12113 and SA12116, July 21, 2004 Debian, Slackware, and Fedora Security Advisories phpBB Group phpBB 2.0.9 and prior Multiple vulnerabilities including cross-site scripting and full path disclosure exist due to improper input sanitization in the search.php, privmsg.php, and login.php scripts and uninitialized arrays. Upgrade to version 2.0.10 available at: http://www.phpbb.com/downloads.php A Proof of Concept exploit has been published. phpBB Cross Site Scripting, Full Path, and XSS Vulnerabilities High Secunia, SA12114, July 22, 2004 SecuriTeam, July 22, 2004 SCO UnixWare 7.1.3 / Open UNIX 8.0.0: A buffer overflow exists in ReadFontAlias from dirfile.c of Xsco that may allow local users and remote attackers to execute arbitrary code via a font alias file with a long token. There are also multiple vulnerabilities reading font files. Apply updated packages available at: ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.2/erg712546.pkg.Z We are not aware of any exploits for this vulnerability. UnixWare / Open UNIX Xsco Buffer Overflow Vulnerabilities CVE Name: CAN-2004-0083 CAN-2004-0106 High SCO Security Advisory, SCOSA-2004.2, July 29, 2004 SCO SCO OpenServer 5.0.6 and 5.0.7 A buffer overflow exists in ReadFontAlias from dirfile.c of Xsco that may allow local users and remote attackers to execute arbitrary code via a font alias file with a long token. There are also multiple vulnerabilities reading font files. Apply updated packages available at: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.3/VOL.000.000 ftp://ftp.sco.com/pub/openserver5/507/mp/mp3/507mp3_vol.tar We are not aware of any exploits for this vulnerability. OpenServer Xsco Buffer Overflow Vulnerabilities CVE Name: CAN-2004-0083 CAN-2004-0106 High SCO Security Advisory, SCOSA-2004.3, July 29, 2004 Sourceforge.net Gentoo Linux Pavuk 0.x Multiple vulnerabilities exist which could allow an attacker to run arbitrary code. The vulnerabilities are caused due to boundary errors within the handling of digest authentication. Gentoo: http://www.gentoo.org/security/en/glsa/glsa-200407-19.xml We are not aware of any exploits for this vulnerability. Pavuk Digest Authentication Buffer Overflow Vulnerabilities High Gentoo Security Advisory, GLSA 200407-19 / Pavuk Release Date July 26, 2004 sox.sourceforge.net Fedora Mandrakesoft Gentoo Conectiva RedHat SoX 12.17.4, 12.17.3, and 12.17.2 Multiple vulnerabilities exist that could allow a remote attacker to execute arbitrary code This is due to boundary errors within the "st_wavstartread()" function when processing ".WAV" file headers and can be exploited to cause stack-based buffer overflows. Successful exploitation requires that a user is tricked into playing a malicious ".WAV" file with a large value in a length field. Fedora: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/ http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ Mandrakesoft: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:076 Gentoo: http://security.gentoo.org/glsa/glsa-200407-23.xml Conectiva: ftp://atualizacoes.conectiva.com.br RedHat: http://rhn.redhat.com/errata/RHSA-2004-409.html A working exploit has been published. SoX ".WAV" File Processing Buffer Overflow Vulnerabilities CVE Name: CAN-2004-0557 High Secunia, SA12175, 12176, 12180, July 29, 2004 SecurityTracker Alerts 1010800 and 1010801, July 28/29, 2004 Mandrakesoft Security Advisory MDKSA-2004:076, July 28, 2004 SquirrelMail Project Team SquirrelMail 1.4.2 An input validation vulnerability was reported in SquirrelMail. A remote user may be able to execute SQL statements on the target system. The flaw resides in 'abook_database.php' where the $alias variable is not properly filtered. Update to version 1.4.3 RC1 and later versions, available at: http://www.squirrelmail.org/download.php We are not aware of any exploits for this vulnerability. SquirrelMail Input Validation Flaw in 'abook_database.php' CVE Name: CAN-2004-0521 High SecurityTracker Alert ID: 1010842, August 3, 2004 Team OpenFTPD OpenFTPD 0.30.2 prior to July 16, 2004, and prior versions A vulnerability exists that could allow a remote attacker to execute arbitrary code on the target system. A remote authenticated user can send a specially crafted message to another FTP user to trigger a format string flaw and execute arbitrary code on the FTP server due to a flaw in 'misc/msg.c'. Update available at: http://www.openftpd.org:9673/openftpd/download_page.html A Proof of Concept exploit has been published. OpenFTPD Format String Flaw Lets Remote Authenticated Users Execute Arbitrary Code High VSA0402 - openftpd - void.at security notice, July 31, 2004 Apple Computer Panther 10.3.4 - Internet Connect 1.3 A privilege and Denial of Service vulnerability exist which could allow a local user to can gain root privileges. An attacker could also render the machine unusable by corrupting important system files.The application creates a log file in an unsafe manner and a local user can create a symbolic link (symlink) from a critical file on the system to the temporary file. When Internet Connect is run the symlinked file will be written to with 'root' user privileges. Workaround: Ensure that the temporary file already exists (preventing the creation of a symlink) with the following commands: /usr/bin/touch /tmp/ppp.log echo '/usr/bin/touch /tmp/ppp.log' >> /etc/daily echo '/usr/bin/touch /tmp/ppp.log' >> /etc/rc.common Proof of Concepts have been published. Apple 'Internet Connect.app' Uses and Unsafe Temporary File That Lets Local Users Gain Root Privileges Medium SecurityTracker Alert ID: 1010771, July 25, 2004 SecuriTeam, July 27, 2004 eSeSIX Computer GmbH Thintune OS 2.4.38 Multiple vulnerabilities exist that could allow a remote attacker to gain system access and local users to escalate their privileges. A process is listening on port 25702/TCP allowing an attacker to connect using a certain password. The process provides access to certain administrative functionality including a root shell. Certain usernames and passwords used for connecting to remote servers are stored incorrectly. It is possible to open a local root shell "lshell" on the client by pressing a certain keystroke combination and password. The Phoenix browser is executed as "root". Update to Thintune OS version 2.4.39. No exploit code required. Thintune Client Multiple Vulnerabilities Medium Secunia, SA12154, July 26, 2004 SecuriTeam, July 25, 2004 Hewlett-Packard HP-UX B.11.23 HP-UX B.11.22 HP-UX B.11.11 HP-UX B.11.00 A vulnerability exists in HP-UX when running xfs and stmkfont. A a remote user can gain 'bin' group privileges. Updates to the following patches available at: http://itrc.hp.com PHSS_31181 - B.11.23 PHSS_31180 - B.11.22 PHSS_31179 - B.11.11 PHSS_31178 - B.11.00 We are not aware of any exploits for this vulnerability. HP-UX Unspecified Flaw in Xfs and stmkfont May Grant Access to Remote Users Medium HP Security Bulletin, HPSBUX01061, July 21, 2004 Jamie Cameron Mandrakesoft Webmin 1.140 Usermin A vulnerability exists in the account lockout mechanism due to insufficient validation of user supplied input and improper parsing of certain characters, which could let a remote attacker attempt to guess IDs and passwords continuously and prevent legitimate users from logging on. Usermin: http://www.webmin.com/udownload.html Webmin: http://prdownloads.sourceforge.net/webadmin/webmin-1.150.tar.gz Mandrakesoft: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:074 There is no exploit code required. Webmin & Usermin Account Lockout Bypass CVE Name: CAN-2004-0582 CAN-2004-0583 Medium US-CERT Cyber Security Bulletin SB04-173, July 23, 2004 Mandrakesoft Security Advisory, MDKSA-2004:074, July 27, 2004 Nessus prior to version 2.0.12 A vulnerability exists in the 'nessus-adduser' function which may allow a local user to gain elevated privileges. There is a race condition that can be exploited when the TMPDIR variable has not been specified. Update to version 2.0.12, available at: http://nessus.org/download.html We are not aware of any exploit for this vulnerability. Nessus Race Condition in 'nessus-adduser' May Let Local Users Gain Elevated Privileges Medium SecurityTracker Alert ID: 1010758, July 22 2004 Polar HelpDesk 3.0 An authentication vulnerability exists because the the system does not verify if a user is logged on. It merely checks if a cookie with the appropriate "UserId" and "UserType" is set. This could allow an attacker to log on as any user with arbitrary privileges. No solution is available at this time. A working exploit has been published. Polar HelpDesk Authentication Bypass Medium Secunia, SA12120, July 22, 2004 SERENA Software, Inc. Serena TeamTrack 6.1.1 and prior Cross Site Scripting vulnerabilities exists due to improper input validation that an attacker could use to view sensitive information without authentication. Workaround: Restrict access using a different authentication mechanism such as ".htaccess" or similar. A working exploit has been published. Serena TeamTrack Multiple Vulnerabilities Medium Secunia, SA12122, July 22, 2004 Opera Gentoo Opera 5.x, 6.x, 7.x Due to a race condition in Opera it is possible to spoof the contents of the address bar using a specially crafted HTML page. Solution: Disable support for Javascript or update as follows: Gentoo: http://www.gentoo.org/security/en/glsa/glsa-200407-15.xml A Proof of Concept exploit has been published. Opera Address Bar Spoofing Condition High SecuriTeam, July 11, 2004 Gentoo Linux Security Advisory, GLSA 200407-15 / opera, July 20, 2004 PostgreSQL Global Development Group Mandrakesoft PostgreSQL A buffer overflow vulnerability exists in the ODBC driver of PostgreSQL. It is possible to exploit this problem and crash the surrounding application. Mandrakesoft: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:072 We are not aware of any exploits for this vulnerability. Updated postgresql Packages Fix Buffer Overflow Low Mandrakesoft Security Advisory, MDKSA-2004:072, July 27, 2004 Tigris.org Fedora Gentoo Subversion 1.0.5 and prior A vulnerability exists in Subversion that could allow an attacker to read protected files. This is because the Apache module "mod_authz_svn" allows users to copy files from a read protected part of the repo into a part which the user can read. Update to version 1.0.6 available at: http://subversion.tigris.org/servlets/ProjectDocumentList?folderID=260 Fedora Core 2: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ Gentoo: http://www.gentoo.org/security/en/glsa/glsa-200407-20.xml We are not aware of any exploits for this vulnerability. Subversion File Restriction Bypass Low Tigris.org Advisory: mod_authz_svn-copy-advisory.txt Gentoo and Fedora Security Advisories [back to top] Multiple Operating Systems - Windows / UNIX / Other Vendor & Software Name Vulnerability - Impact Patches - Workarounds Attacks Scripts Common Name Risk Source Check Point Software Technologies Check Point VPN-1/FireWall-1 VSX NG; Check Point VPN-1/FireWall-1 NG with Application Intelligence (AI); Check Point VPN-1/Firewall-1 NG; Check Point VPN-1 SecuRemote; Check Point VPN-1 SecureClient; Check Point SSL Network Extender; Check Point Provider-1; Check Point FireWall-1 GX 2.x A vulnerability exists in in various Check Point VPN-1 products, which an attacker can exploit to execute arbitrary code. The vulnerability is caused due to a boundary error in the ASN.1 decoding library during setup of the initial encrypted connection. This can be exploited to cause a heap overflow by establishing a VPN connection and sending a malicious packet containing specially crafted fields. Updates available at: http://www.checkpoint.com/techsupport/alerts/asn1.html We are not aware of any exploits for this vulnerability. Check Point VPN-1 ASN.1 Decoding Heap Overflow Vulnerability High Check Point ASN.1 Alert, July 28, 2004 US-CERT VU#435358 Cisco Cisco ONS 15327, 15454, and 15454 SDH; prior to 4.6(2) Cisco ONS 15600 Multiple vulnerabilities exist on Cisco control cards that could allow a remote user to gain access to an account on the system or cause the cards to reset. Cisco reported that if an account on the system has a blank password, then a remote user can login to the device with an arbitrary password that is longer than 10 characters. This authentication vulnerability only affects the TL1 login interface. A Denial of Service vulnerability also exists. A remote user can send malformed SNMP, UDP, TCP, ICMP, or IP packets to potentially cause the XTC, TCC/TCC+/TCC2 and TCCi/TCC2 control cards to reset. A detailed patch matrix is available at: www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml No exploit script required. Cisco ONS Control Cards Malformed Packet Vulnerabilities High SecurityTracker, 1010748 and 1010749, July 21, 2004 Cisco Security Advisory: Document ID: 60322, Revision 1.0, July 21, 2004 Cisco ServletExec 3.x, 2.x Cisco Collaboration Server (CSS) 3.x, 4.x A vulnerability exists in the ServletExec subcomponent that could allow an attacker to upload and execute arbitrary files.The vulnerability affects CCS (prior to 5.0) using a ServletExec version prior to 3.0E. Update instructions available at: http://www.cisco.com/warp/public/707/cisco-sa-20040630-CCS.shtml We are not aware of any exploits for this vulnerability. Cisco Collaboration Server ServletExec Arbitrary File Upload Vulnerability High US-CERT VU#718896 Comersus Open Technologies Comersus Shopping Cart 5.098 Input validation vulnerabilities exist in Comersus that could allow an attacker to conduct SQL injection and cross-site scripting attacks. Comersus fails to verify input passed to the "email" parameter properly before it is used in a SQL query. Also, input passed to the "message" parameter in "comersus_message.asp" and "comersus_backoffice_message.asp" is not properly sanitized before being returned to the user. Workaround: Edit the source code to ensure that input is properly sanitized. We are not aware of any exploits for this vulnerability. Comersus SQL Injection and Cross-Site Scripting Vulnerabilities High Secunia, SA12183, August 3, 2004 GNU 0.75-RC3 and 0.726PostNuke-3 with Xanthia module Full path disclosure and cross site scripting vulnerabilities exists in PostNuke's Xanthia module due to an unvalidated input error and an error in the showcontent() function. No solution is available at this time. A Proof of Concept exploit is available. PostNuke Multiple Vulnerabilities In Xanthia Module High Securiteam, July 27, 2004 GNU / GPL Nucleus prior to 3.0.1 An input validation vulnerability exists because the input used to include files isn't properly validated. This may allow an attacker to include arbitrary files from local and external resources if "register_globals" is set to "On" and gain system access. Upgrade to Nucleus 3.0.1 available at: http://nucleuscms.org/ A Proof of Concept exploit has been published. Nucleus Inclusion of Arbitrary Files High SecurityTracker Alert, 1010746, July 21, 2004 Secunia, SA12097, July 20, 2004 GNU / GPL AntiBoard 0.7.2 and prior Multiple vulnerabilities exist that could allow an attacker to conduct cross-site scripting and SQL injection attacks. The vulnerabilities are caused due to missing validation of various parameters in the "antiboard.php" script. No updates available. Edit the source code to ensure that user input is properly sanitized. We are not aware of any exploits for this vulnerability. AntiBoard Cross-Site Scripting and SQL Injection Vulnerabilities High Secunia, SA12137, July 29, 2004 SecurityTracker Alert ID: 1010803, July 29, 2004 GNU / GPL BLOG:CMS prior to 3.1.4 An input validation vulnerability in BLOG:CMS exists because the input used to include files isn't properly validated. This may allow an attacker to include arbitrary files from local and external resources if "register_globals" is set to "On" and gain system access. Upgrade to BLOG:CMS 3.1.4 available at: http://forum.blogcms.com/viewtopic.php?id=324 A Proof of Concept exploit has been published. BLOG:CMS Inclusion of Arbitrary Files High SecurityTracker Alert, 1010746, July 21, 2004 Secunia, SA12097, July 20, 2004 GNU / GPL PunBB prior to 1.1.5 An input validation vulnerability exists because the input used to include files isn't properly validated. This may allow an attacker to include arbitrary files from local and external resources if "register_globals" is set to "On" and gain system access. Upgrade to PunBB 1.1.5 available at: http://www.punbb.org/ A Proof of Concept exploit has been published. PunBB Inclusion of Arbitrary Files High Secunia, SA12097, July 20, 2004 GNU / GPL Nucleus 3.01 An input verification vulnerability exists that could allow an attacker to conduct SQL injection attacks. Nucleus fails to verify input passed to the "itemid" parameter properly before it is used in SQL queries. No updates available. Edit the source code to ensure that input is properly sanitized. We are not aware of any exploits for this vulnerability. Nucleus "itemid" SQL Injection Vulnerability High Secunia, SA12166, July 28, 2004 Hewlett-Packard dced A buffer overflow vulnerability exists in HP's DCED implementation that listens by default on TCP port 135. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary commands on the targeted system with the privileges of the DCED process which is typically run as the root user. Disable dced or update as follows: OS: HP HP-UX 11 update available at: http://itrc.hp.com OS: HP Tru64 update available at: http://support.entegrity.com/private/patches/dce/ssrt4741.asp OS: HP OpenVMS update available at: http://www2.itrc.hp.com/service/patch/mainPage.do We are not aware of any exploits for this vulnerability. HP dced Remote Command Execution CVE Name: CAN-2004-0716 High atstake.com, July 22, 2004 SecuriTeam, July 25, 2004 HP Bulletins: HPSBUX0311-299, HPSBUX0311-299: SSRT3660 DCE (Rev.01), SSRT4741 rev.0 DCE Hitachi Web Page Generator 1.x, 2.x, 3.x, 4.x Multiple vulnerabilities exist in Web Page Generator, which could allow an attacker to cause a Denial of Service, disclose content of directories, or conduct cross-site scripting attacks. These are due to an unspecified error which can stop the website service by accessing the website "improperly" multiple times (Windows platforms only) and errors in the error transactions of the Web Page Generator templates. Update to Web Page Generator Enterprise version 03-03-/D or 04-02-/L, and set the "DEBUG_MODE" property to "off". We are not aware of any exploits for this vulnerability. Hitachi Web Page Generator Multiple Vulnerabilities High Hitachi Vulnerability Notice HS04-002 and HS04-003, July 28, 2004 Invision Power Services Invision Power Board 2.0 Cross site scripting and input validation vulnerabilities exists because the URL (QUERY_STRING) is used in "index.php" and isn't properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site. No updates available. Edit the source code to ensure that input is properly sanitized. We are not aware of any exploits for this vulnerability. Invision Power Board "index.php" Cross Site Scripting Vulnerability High Secunia, SA12105, July 20, 2004 l2tpd.org Debian Gentoo l2tpd 0.62 0.69 A buffer overflow vulnerability exists in the `write_packet()' function due to a failure of the application to properly validate user supplied string lengths, which could let a remote malicious user cause a Denial of Service and potentially execute arbitrary code. Debian: http://www.debian.org/security/2004/dsa-530 Gentoo: http://www.gentoo.org/security/en/glsa/glsa-200407-17.xml We are not aware of any exploits for this vulnerability. L2TPD Buffer Overflow High Gentoo Linux Security Advisory, GLSA 200407-17 / net-dialup/l2tpd, July, 22, 2004 Mateo & Mewis AG EasyIns Stadtportal 4 and prior A vulnerability was reported in EasyIns Stadtportal. A remote user can supply a URL with a specially crafted 'site' parameter to cause the target system to include and execute PHP code from a remote site. No solution is available at this time. A working exploit has been published. EasyIns Stadtportal Include File Bug Lets Remote Users Execute Arbitrary Code High SecurityTracker Alert ID: 1010769, July 24, 2004 Matt Johnston Dropbear SSH Server 0.42 A vulnerability exists that could allow a remote attacker to execute arbitrary code. This vulnerability is caused due to freeing of uninitialized variables in the DSS verification code. Update to version 0.43 available at: http://matt.ucc.asn.au/dropbear/ We are not aware of any exploits for this vulnerability. Dropbear SSH Server DSS Verification Vulnerability High Secunia, SA12153, July 26, 2004 Dropbear Security Update mod SSL Project Gentoo Slackware Mandrake mod_ssl 2.x A vulnerability exists in mod_ssl, which may allow an attacker to compromise a vulnerable system. The vulnerability is reportedly due to a "ssl_log()" related format string error within the "mod_proxy" hook functions. Update to version 2.8.19-1.3.31 available at: http://www.modssl.org/source/mod_ssl-2.8.19-1.3.31.tar.gz OpenPKG: ftp://ftp.openpkg.org/release/1.3/UPD/apache-1.3.28-1.3.6.src.rpm Gentoo: http://www.gentoo.org/security/en/glsa/glsa-200407-18.xml Slackware: http://www.slackware.com/security/viewer.php?l=slackware- security&y=2004&m=slackware-security.419544 Mandrakesoft: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:075 We are not aware of any exploits for this vulnerability. mod_proxy" Hook Functions Format String Vulnerability in mod_ssl High modSSL Notice, July 16, 2004 Secunia, SA12077, July 19, 2004 Gentoo, Mandrakesoft and Slackware Security Advisories Mozilla Organization Mozilla 1.6 and prior Netscape 7.0, 7.1, and prior A input validation vulnerability exists in the SOAPParameter object constructor in Netscape and Mozilla which allows execution of arbitrary code. The SOAPParameter object's constructor contains an integer overflow which allows controllable heap corruption. A web page can be constructed to leverage this into remote execution of arbitrary code. Upgrade to Mozilla 1.7.1 available at: http://www.mozilla.org/products/mozilla1.x/ We are not aware of any exploits for this vulnerability. Netscape/Mozilla SOAPParameter Constructor Integer Overflow Vulnerability CVE Name: CAN-2004-0722 High iDEFENSE Security Advisory, August 2, 2004 Bugzilla Bug 236618 MyServer.org MyServer 0.6.2 Multiple vulnerabilities exist in the math_sum.mscgi sample script. A remote user may be able to execute arbitrary code or conduct cross-site scripting attacks. This is because the 'a' and 'b' parameters are not filtered to remove HTML code from user-supplied input before the input is displayed. A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the MyServer software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. Workaround: Remove the math_sum.mscgi sample script. A working exploit is available. MyServer Bugs in math_sum.mscgi May Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks High SecurityTracker Alert ID: 1010808, July 29, 2004 powerportal.sourceforge.net PowerPortal 1.3 A cross-site scripting vulnerability exists in the private_messages module that could allow a remote user to execute arbitrary code. T the private_messages module does not properly filter HTML code from user-supplied input in the message title field. Cookies and passwords are also vulnerable as they are stored in clear text. No solution is available at this time. A Proof of Concept exploit has been published. PowerPortal Input Validation Hole in Private Message Title Permits Cross-Site Scripting Attacks High SecurityTracker Alert ID: 1010802, July 29, 2004 Sourceforge.net Jaws 0.4 An input validation vulnerability exists which could allow an attacker to can gain administrative access to the application. This is because 'config.php' disables magic quotes and 'controlpanel.php' contains an input validation error, allowing a remote user to inject SQL commands via the "crypted_password" variable. Replace the 'gadgets/controlpanel.php' file with this file: http://jaws.com.mx/files/controlpanel.php.txt A working exploit has been published. Jaws 'controlpanel.php' Input Validation Error High SecurityTracker Alert ID: 1010815, July 30, 2004 U.S. Robotics Wireless Router Model 8054 A Denial of Service vulnerability exists in U.S. Robotics wireless router (model 8054). A remote user can cause the router to crash and may be able to execute arbitrary code on the router by connecting to the router's web administration port and issuing a specially crafted HTTP GET request to trigger an overflow and cause the device to crash. No solution is available at this time. A Proof of Concept exploit has been published. U.S. Robotics Wireless Router Can Be Crashed By Remote Users High SecurityTracker Alert ID: 1010839, August 2, 2004 4D Portal 1.5 A configuration vulnerability exists that could allow a remote attacker to gain access to the system if the default password has not been changed. Solution: Change the "super-user" default username and password. No exploit script required. 4D Portal Default Password May Let Remote Users Access the System Medium SecurityTracker Alert, 1010747, July 21, 2004 artmedic webdesign artmedic kleinanzeigen An input verification vulnerability exists in artmedic kleinanzeigen because the "id" parameter isn't properly verified in "index.php" before it is used to include a file. This could allow an attacker to supply arbitrary paths to local and external resources. Upgrade to the latest release available at: http://www.artmedic.de/index.php A working exploit has been published. artmedic kleinanzeigen Inclusion of Arbitrary Files Medium Secunia, SA12099, July 21, 2004 Dom Lachowicz Fedora AbiWord 2.0.7 and prior A vulnerability exists in the "wv" library of AbiWord, which could be exploited by an attacker to compromise a user's system. Update to version 2.0.8 or later available at: http://www.abisource.com/download/ Fedora: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/ http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ We are not aware of any exploits for this vulnerability. AbiWord "wv" Library Buffer Overflow Vulnerability Medium AbiWord 2.0.7-2.0.9 Changes Secunia, SA12136 and SA12146, July 26, 2004 EasyWeb FileManager 1.0 RC-1 for PostNuke An input validation vulnerability exists that could allow an attacker to retrieve arbitrary files. An input validation error in the "ew_filemanager" module can be exploited to access directories outside the web root via the "../" directory traversal character sequence using the "pathext" parameter. No solution is available at this time. A Proof of Concept exploit has been published. EasyWeb FileManager "pathext" Directory Traversal Medium cirt.net, CIRT-200404: EasyWeb (EW) FileManager Directory Traversal, July 23, 2004 Fusion News 3.6.1 and prior A vulnerability exists that could allow a remote attacker to create a specially crafted URL that, when loaded by a target administrator, will cause a user account to be added to Fusion News. The malicious URL can be placed in a BBCode image tag within a comment and then executed when the target administrator views the comment, for example. No solution is available at this time. A Proof of Concept exploit has been published. Fusion News Lets Remote Users Add User Accounts on the Application Medium SecurityTracker Alert ID: 1010829, July 31, 2004 GNU PostNuke 0.73x - 0.75 GOLD An installation vulnerability exists that could allow a remote user to determine the administrator's username and password on affected sites. PostNuke does not remove the 'install.php' file after installation. A remote user can request the file and accept the terms to view the password information. Workaround: Rename or delete the 'install.php' file. A Proof of Concept exploit has been published. PostNuke 'install.php' Discloses Administrator Password to Remote Users Medium SecurityTracker Alert ID: 1010755, July 22, 2004 Hewlett-Packard HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 with CIFS Server A.01.11.01 installed A buffer overflow vulnerability exists which could be exploited by an attacker to gain root access. Set "mangling method = hash2" or "mangled names = no" in the "smb.conf" configuration file. We are not aware of any exploits for this vulnerability. HP-UX CIFS Server Buffer Overflow Vulnerability CVE Name: CAN-2004-0686 Medium Secunia, SA12168, July 28, 2004 HP SECURITY BULLETIN, HPSBUX01062, July 26, 2004 IBM IBM Directory Server 4.1 and prior An input verification vulnerability exists in the IBM Directory Server in 'ldacgi.exe'. A remote user can view files on the target system with the privileges of the web service. The script does not properly validate user-supplied input in the 'Template' parameter. A remote user can supply a path containing directory traversal characters ('../') to view arbitrary files on the target system. Update to 3.2.2 Fix Pack 4 available at: http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg24006917 or 4.1 Fix Pack 3 available at: http://www-1.ibm.com/support/docview.wss?rs=0&q1=directory+server&uid= swg24006667&loc=en_US&cs=utf-8&cc=us</=en A Proof of Concept exploit has been published. IBM Directory Server 'ldacgi' Discloses Files to Remote Users Medium SecurityTracker Alert ID: 1010834, August 2, 2004 IBM APAR IR52692 and IR 53631 Mozilla Organization Mozilla Firefox 0.9.2 and Mozilla 1.7.1 on Windows Mozilla Firefox 0.9.2 on Linux A spoofing vulnerability exists that could allow malicious sites to abuse SSL certificates of other sites. An attacker could make the browser load a valid certificate from a trusted website by using a specially crafted "onunload" event. The problem is that Mozilla loads the certificate from a trusted website and shows the "secure padlock" while actually displaying the content of the malicious website. The URL shown in the address bar correctly reads that of the malicious website. An additional cause has been noted due to Mozilla not restricting websites from including arbitrary, remote XUL (XML User Interface Language) files. Workaround: Do not follow links from untrusted websites and verify the correct URL in the address bar with the one in the SSL certificate. A Proof of Concept exploit has been published. Mozilla / Mozilla Firefox "onunload" SSL Certificate Spoofing Medium Cipher.org, July 25, 2004 Secunia, SA12160, July 26, 2004; SA12180, July 30, 2004 Open Source Development Network OpenDocMan 1.x An authentication vulnerability exists which can be exploited by an attacker to bypass certain security restrictions and make unauthorized changes. The vulnerability is caused due to a missing authentication check in "commitchange.php" when committing changes. Update to version 1.2-Final available at: http://prdownloads.sourceforge.net/opendocman/opendocman-1.2.tar.gz?do wnload No exploit code required. OpenDocMan "commitchange.php" Unauthorized Commitment of Changes Medium Secunia, SA12159, July 26, 2004 OpenDocMan 1.2 Final Release Notes QualiTeam Litecommerce 2.0.0 A configuration vulnerability exists in Litecommerce. A remote user can invoke the installation script to gain administrative access on some sites. By default, the software leaves the 'install.php' installation file on the server after installation. A remote user can load the file to change the administrative password. On some systems, this requires authentication but on other systems, authentication is not required. Workaround: Remove the 'install.php' script manually after installation. A working exploit is available. Litecommerce Installation Script May Let Remote Users Gain Administrative Access Medium SecurityTracker Alert ID: 1010778, July 26, 2004 Sun Microsystems Sun Java System Portal Server 6.2 An authentication vulnerability exists which may allow an attacker to gain administrative credentials. The problem arises if the user changes the display options to a non-default view. This only affects the Calendar server. As a workaround, Sun indicates that you can prohibit end users from editing the calendar channels "calendar" or "view" display profile properties when Admin Proxy Authentication is enabled. SPARC updates: http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=116856&rev=10 X86 Platform updates: http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=117757&rev=09 We are not aware of any exploits for this vulnerability. Sun Java System Portal Server Proxy Authentication Failure Medium Sun Alert ID: 57586, July 21, 2004 US-CERT Vulnerability Note VU#881254 , July 23, 2004 Sun Microsystems SDK and JRE 1.4.2_04 or earlier; 1.4.1_07 or earlier; 1.4.0_04 or earlier A vulnerability exists in Sun Java JRE/SDK that could allow an attacker to gain escalated privileges on a vulnerable system. The vulnerability is caused due to an error within the XSLT processor. This allows applets to read data from other applets being processed or gain escalated privileges. Update to version 1.4.2_05 or later available at: http://java.sun.com/j2se/ We are not aware of any exploits for this vulnerability. Sun Java JRE/SDK XSLT Processor Vulnerability Medium Sun Alert ID: 57613, August 2, 2004 Conceptronic CADSLR1 Router with firmware version 3.04n A Denial of Service vulnerability exists in the router because the device fails to handle HTTP requests with a long username (65535 characters). This causes the device to reboot. Solution: Filter access to the device or disable the HTTP service. We are not aware of any exploits for this vulnerability. Conceptronic CADSLR1 Router Denial of Service Vulnerability Low Secunia, SA12110, July 21, 2004 phpMyFAQ Team phpMyFAQ 1.4.0 A user validation vulnerability exists in phpMyFaq, which could allow an attacker to upload or delete arbitrary images. The security issue is caused due to a missing user authentication check in the ImageManager plugin, which allows anyone to access the plugin's functionality. Update to version 1.4.0a available at: http://www.phpmyfaq.de/download.php We are not aware of any exploits for this vulnerability. phpMyFaq ImageManager Plugin Missing User Authentication Low phpMyFAQ Security Advisory, July 27, 2004 Sun Microsystems Solaris 9 A Denial of Service vulnerability exists in the Sun Solaris Volume Manager (SVM) that could allow a local user to cause a denial-of-service condition. There is a vulnerability in the way the Sun Volume Manager handles certain types of probe requests. By supplying an incorrectly formed probe request, a local user could cause a denial-of-service condition on a Solaris 9 system with this service configured. Update available at: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57598 We are not aware of any exploits for this vulnerability. Sun Solaris Volume Manager (SVM) fails to properly handle malformed probe requests Low US-CERT Vulnerability Note VU#390742 Sun Alert ID: 57598, July 16, 2004 Sun Sun Java System Web Server (Sun ONE/iPlanet) 6.x A Cross-Site Scripting vulnerability exists in the the sample application "webapps-simple". Sample scripts should not be installed on production systems. Update to Sun Java System Web Server 6.1 Service Pack 2 and later. We are not aware of any exploits for this vulnerability. Sun Java System Web Server Cross Site Scripting Vulnerability Low Sun Alert ID: 57605, July 21, 2004 WWW File Share Pro 2.60 A Denial of Service vulnerability exists due to an unspecified error during the handling of HTTP GET requests. This can be exploited to crash the process by sending an overly long request. Solution: Filter requests using a firewall or proxy server. A working exploit has been published. WWW File Share Pro HTTP Request Denial of Service Vulnerability Low Secunia, SA12111, July 21, 2004 [back to top] Recent Exploit Scripts/Techniques The table below contains a sample of exploit scripts and "how to" guides identified during this period. Note: At times, scripts/techniques may contain names or content that may be considered offensive. Date of Script (Reverse Chronological Order) Script name Script Description July 31, 2004 fusionphp.net A specially crafted URL that, when loaded by a target administrator, will cause a user account to be added. The malicious URL can be placed in a BBCode image tag within a comment and then executed when the target administrator views the comment. July 30, 2004 controlpanel.php An SQL injection vulnerability allowing a remote user administrative access. July 29, 2004 antiboard072txt SQL Injection and cross site scripting vulnerabilities exist in AntiBoard versions 0.7.2 and below due to a lack of input validation of various variables. July 29, 2004 citadel-advisory-04.txt Citadel/UX versions 6.23 and below are vulnerable to a buffer overflow that occurs when more than 97 bytes are sent with the USER directive to port 504. July 29, 2004 IRM-009.txt IRM Security Advisory 009 - RiSearch version 1.0.01 and RiSearch Pro 3.2.06 are susceptible to open FTP/HTTP proxying, directory listings, and file disclosure vulnerabilities. July 28,2004 bitlanceOpera.txt A vulnerability in the Opera 7.x series allows phishing attacks due to not updating the address bar if a web page is opened using the window.open function and then replaced using the location.replace function. July 27, 2004 taskShed.C Microsoft Windows 2K/XP Task Scheduler local exploit that will spawn notepad.exe. July 27, 2004 nucleusCMSSQL.txt Nucleus CMS version 3.01 addcoment/itemid SQL Injection Proof of Concept PHP exploit that dumps the username and md5 hash of the password for the administrator user. July 26, 2004 eSeSix.txt eSeSIX Thintune with a firmware equal to or below 2.4.38 is susceptible to multiple vulnerabilities. These include having a backdoored service on a high port with an embedded password giving a remote root shell, various other passwords being stored locally in clear text, and a local root shell vulnerability. July 26, 2004 ew_file_manager.txt The EasyWeb FileManager Module for PostNuke is vulnerable to a directory traversal problem which allows retrieval of arbitrary files from the remote system. Versions affected: EasyWeb FileManager 1.0 RC-1. July 26, 2004 Mozilla_Firefox_25-07-2004.txt Mozilla FireFox versions 0.9.1 and 0.9.2 has a flaw where it is possible to make a browser load a valid certificate from a trusted website by using a specially crafted onunload event July 25, 2004 applePanther.txt Apple OSX Panther 10.3.4 with Internet Connect version 1.3 by default appends to ppp.log in /tmp if the file already exists. If a symbolic link is made to any file on the system, it automatically writes to it as root allowing for an easy local compromise. Detailed exploitation given. July 24, 2004 wgetusr.c Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers. July 24, 2004 sambaPoC.txt Proof of concept exploit code for the Samba 3.x swat preauthentication buffer overflow vulnerability. July 24, 2004 httpdDoS.pl Denial of service test exploit for the flaw in Apache httpd 2.0.49. July 23, 2004 OpteronMicrocode.txt This document details the procedure for performing microcode updates on the AMD K8 processors. It also gives background information on the K8 microcode design and provides information on altering the microcode and loading the altered update for those who are interested in microcode hacking. Source code is included for a simple Linux microcode update driver for those who want to update their K8's microcode without waiting for the motherboard vendor to add it to the BIOS. The latest microcode update blocks are included in the driver. July 23, 2004 FlashFTPtraverse.txt Flash FTP Server version 1.0 (and possibly 2.1) for Windows is susceptible to a directory traversal attack. July 20, 2004 unrealdecloak.tar.gz Unreal Decloak Toolkit version 0.1 illustrates the weak hashing system vulnerability in Unreal ircd 3.2 and previous versions. [back to top] Trends Six months since the W32/MyDoom mass-mailing virus first appeared on the Internet, US-CERT continues to see new variants appearing and many variants (new and old) continuing to spread. Many variants of W32/MyDoom are known to open a backdoor and use its own SMTP engine to spread through email. US-CERT strongly encourages users to install and maintain anti-virus software and exercise caution when handling attachments. Anti-virus software may not be able to scan password protected archive files so users must use discretion when opening archive files and should scan files once extracted from an archive. See US-CERT Cyber Security Alert SA04-208A. Microsoft has reported two vulnerabilities in the way Internet Explorer processes certain types of images. Attackers may be able to gain control of your machine if you view a malicious image, visit a web page, or open an email message that contains these images. Microsoft has also published an update to address the cross-domain vulnerability discussed in SA04-163A. This vulnerability may allow an attacker to alter a web site to point to a different location. If the attacker can convince you to visit the site, they may be able to gain control of your machine. See US-CERT Cyber Security Alert SA04-212A. [back to top] Viruses/Trojans New Viruses / Trojans Viruses or Trojans Considered to be a High Level of Threat * MyDoom.M / MyDoom.N: New variants of the MyDoom worm surfaced and produced a tremendous amount of e-mail traffic as well as drastically slowing access to major search engines. After a PC is infected, the virus searches for e-mail addresses on the hard drive, and then it looks for more by running queries on search engines. The following table provides, in alphabetical order, a list of new viruses, variations of previously encountered viruses, and Trojans that have been discovered during the period covered by this bulletin. This information has been compiled from the following anti-virus vendors and security related web sites: Sophos, Trend Micro, Symantec, McAfee, Network Associates, Central Command, F-Secure, Kaspersky Labs, MessageLabs, and The WildList Organization International. Users should keep anti-virus software up to date and should contact their anti-virus vendors to obtain specific information on the Trojans and Trojan variants that anti-virus software detects. NOTE: At times, viruses and Trojans may contain names or content that may be considered offensive. Name Aliases Type Backdoor.Agent.B BackDoor-CFB TROJ_AGENT.AC Troj/Agent-AC Agent.E Backdoor.Agent.ac Trojan: Backdoor Backdoor.Berbew.I Berbew.I TrojanSpy.Win32.Qukart.gen W32/Berbew.G Trojan: Backdoor Backdoor.Moonlit Trojan: Backdoor Backdoor.Xordoor Trojan: Backdoor Backdoor.Zincite.A Trojan: Backdoor BackDoor-CHI Trojan: Backdoor Downloader-MY Trojan: Downloader Downloader-NE.dr Trojan: Downloader Downloader-NK Trojan: Downloader HTML.Phishbank.AI HTML/Phishbank.AI.Worm E-mail Scam Kol.D BackDoor-CGP Backdoor.Delf.nm Keylogger.Trojan Win32.Kol.D Win32/Kol.D.1.Trojan Trojan - Keylogging Lovgate.AT W32/Lovgate.AT.worm Win32 Worm Mabutu.B W32/Mabutu.B.worm W32/Mabutu.b@MM Win32 Worm MultiDropper-LA Neblso Neblso.A W32/MultiDropper-LA Trojan: Dropper Mydoom.M I-Worm.Mydoom.M I-Worm.Mydoom.R MyDoom.M Mydoom.M@MM Mydoom.O W32.Mydoom.M@mm W32/Mydoom-O W32/Mydoom.L W32/Mydoom.M.worm W32/Mydoom.N.worm W32/Mydoom.o@MM Win32.Mydoom.O Win32/MyDoom.O.Worm WORM_MYDOOM.M ZIP.Mydoom.O Win32 Worm Mydoom.N I-Worm.Mydoom.n W32.Mydoom.N@mm W32/Mydoom.p@MM WORM_MYDOOM.N Win32 Worm Mydoom.P Win32.Mydoom.P Win32/Mydoom.P.Worm Win32 Worm OF97/Toraja-I O97M.Toraja.Gen X97M/Toraja O97M_TORAJA.I MS Word Virus Protoride.I W32.Protoride.Worm W32/Protoride.J Win32.Protoride.I Win32/Protoride.G Win32/Protoride.I.Worm Worm.Win32.Protoride.j Win32 Worm PWSteal.Ldpinch.B Backdoor-CEX Ldpinch.W Multidropper-KN Trojan Rbot.H Backdoor.SdBot.jg Backdoor/SDBot W32.Randex.gen W32/Sdbot.worm.gen.i Win32.Rbot.H Win32 Worm Secdrop.A Trojan.Win32.Small.q Win32.Secdrop.A Win32/LowSec.Trojan Trojan Troj/CmjSpy-Z Trojan: Keylogging Troj/Delf-DU New Malware.b Trojan Troj/Dluca-CQ TrojanDownloader.Win32.Dyfuca.cq Trojan: Adware Troj/PatchLs-A Trojan.Win32.PatchLs.a Win32/PatchLs.A Trojan Troj/Psyme-AI TrojanDownloader.VBS.Iwill.v JS/Exploit-InjScript JS/SillyDownloader.C Exploit.HTML.InjScript Trojan Troj/Small-AO Trojan: Backdoor Trojan.Download.Inor.C Trojan: Downloader Trojan.Exruntel Trojan W32.Beagle.AH@mm Win32 Worm W32.Bugbros.C@mm Bloodhound.W32.VBWORM I-Worm.generic W32/Generic.a@MM Win32 Worm W32.Gaobot.BAJ Win32 Worm W32.Korgo.AD W32/Korgo.worm.gen Win32 Worm W32.Mits.A@mm Mits.A Trojan.Win32.Smith Trojan W32.Rotor Win32 Worm W32/Agobot-LL Gaobot Nortonbot Phatbot Polybot Backdoor.Agobot.gen Win32 Worm W32/Agobot-LM Win32 Worm W32/Atak-C Atak-C I-Worm.Agist.a Win32 Worm W32/Bagle.aj!proxy Trojan.Mitglieder.M Win32 Proxy Virus W32/Bagle.ak!proxy Win32 Proxy Virus W32/Mydoom.o@MM!zip Win32 Worm W32/Rbot-EK Backdoor.Rbot.gen W32/Sdbot.worm.gen.h Win32 Worm W32/Rbot-EP Backdoor.Rbot.gen W32/Sdbot.worm.gen Win32 Worm W32/Rbot-EQ Win32 Worm W32/Rbot-ET Backdoor.Rbot.gen Win32 Worm W32/Rbot-EW Backdoor.Rbot.gen Win32 Worm W32/Rbot-FC Backdoor.Rbot.gen Win32 Worm W32/Scaner-A Exploit-DcomRpc.gen Win32.Agent.Z Win32.Dcom.db Win32 Worm W32/Sdbot-KM Trojan: Backdoor W32/Sdbot-KU W32/Sdbot.worm.gen Backdoor.SdBot.np BKDR_SDBOT.GEN Win32 Worm W32/Spybot-CZ W32.Spybot.worm.gen.a Backdoor.Spyboter.gen Win32 Worm W32/Stewon-A Worm.P2P.Stewon Win32 Worm W32/Tompai-A Win32 Worm W97M.Diperis.A W97M/Diperis.A Word97Macro/Diperis.A MS Word Virus W97M.Kuna MS Word Virus W97M.Seliuq.D Macro.Word97.Seliuq.c W97M/Assilem.g.gen W97M_SELIUQ.C WM97/Seliuq-A MS Word Virus Win32.Dluca.H Downloader-DC TrojanDownloader.Win32.Dluca.y Win32/Dluca.H.Trojan Win32 Worm Win32.Glieder Troj/Dload-AO Trojan.Mitglieder.M TrojanClicker.Win32.Small.ak TrojanClicker.Win32.Small.al W32/Bagle.am!proxy W32/Bagle.dll.gen Win32.Glieder Win32.Glieder.C Win32/Glieder.DLL.Trojan Win32.Rbot.H Backdoor.SdBot.jg Backdoor/SDBot W32.Randex.gen W32/Sdbot.worm.gen.i Win32 Worm WinCE/Duts.1520.dr WinCE/Duts.1536.dr WinCE Virus WORM_KORGO.AC Korgo.AC Win32 Worm Zindos.A W32.Zindos.A W32/Zindos-A W32/Zindos.A W32/Zindos.A.worm W32/Zindos.worm Win32.Zindos.A Win32/Zindos.A.Trojan Win32/Zindos.A.worm Worm.Win32.Zindos.A WORM_ZINDOS.A Zindos Win32 Worm -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFBEZ90XlvNRxAkFWARAhLSAJ43lfDqyCMDhveFYuN7Bnf3NtuYAgCgw5u/ ZYHuDtWH4YeD6IiL8YuQJ/M= =M3Qe -----END PGP SIGNATURE-----