| Nov
11/03 |
Buffer
Overflow in Windows Workstation Service
|
(Cert) |
|
Systems
Affected: Microsoft Windows 2000 Service Pack 2, Service Pack
3, Service Pack 4; Microsoft Windows XP; Microsoft Windows XP
Service Pack 1; Microsoft Windows XP 64-Bit Edition
Overview:
A buffer overflow vulnerability exists in Microsoft's Windows
Workstation Service (WKSSVC.DLL).
A remote attacker could exploit this vulnerability to execute
arbitrary code or cause a denial of service.
(click
here for more details)
|
|
| Oct
16/03 |
Multiple
Vulnerabilities in Microsoft Windows and Exchange
|
(Cert)
|
|
Systems
Affected: Multiple versions of Microsoft Windows (ME, NT 4.0, NT
4.0 TSE, 2000, XP, Server 2003), Microsoft Exchange Server 5.5 and
Microsoft Exchange Server 2000
Overview: There are multiple vulnerabilities in Microsoft Windows
and Microsoft Exchange, the most serious of which could allow
remote attackers to execute arbitrary code.
(click
here for more details)
|
|
| Oct
1/03 |
Multiple
Vulnerabilities in SSL/TLS Implementations
|
(Cert)
|
|
Systems
Affected: OpenSSL versions prior to 0.9.7c and 0.9.6k, Multiple
SSL/TLS implementations, SSLeay library
Overview: There are multiple vulnerabilities in different implementations
of the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols. These vulnerabilities occur primarily in Abstract
Syntax Notation One (ASN.1) parsing code. The most serious vulnerabilities
may allow a remote attacker to execute arbitrary code. The common
impact is denial of service.
(click
here for more details)
|
|
| Sept
18/03 |
Buffer
Overflow in Sendmail |
(Cert)
|
|
Systems
Affected: Systems running open-source sendmail versions prior
to 8.12.10, including UNIX and Linux systems; Commercial releases
of sendmail including Sendmail Switch, Sendmail Advanced Message
Server (SAMS), and Sendmail for NT
Overview:
A vulnerability in sendmail could allow a remote attacker to execute
arbitrary code with the privileges of the sendmail daemon, typically
root.
(click
here for more details)
|
|
| Sept
16/03 |
Buffer
Management Vulnerability in OpenSSH
|
(Cert)
|
| |
Systems
Affected: Systems running versions of OpenSSH prior to 3.7, Systems
that use or derive code from vulnerable versions of OpenSSH
Overview:
There is a remotely exploitable vulnerability in a general buffer
management function in versions of OpenSSH prior to 3.7. This
may allow a remote attacker to corrupt heap memory which could
cause a denial-of-service condition. It may also be possible for
an attacker to execute arbitrary code.
(click
here for more details)
|
|
| Sept
10/03 |
RPCSS
Vulnerabilities in Microsoft Windows |
(Cert)
|
|
Systems
Affected: Microsoft Windows NT Workstation 4.0, Microsoft Windows
NT Server 4.0, Microsoft Windows NT Server 4.0, Terminal Server
Edition, Microsoft Windows 2000, Microsoft Windows XP, Microsoft
Windows Server 2003
Overview:
Microsoft has published a bulletin describing three vulnerabilities
that affect numerous versions of Microsoft Windows. Two of these
vulnerabilities are remotely exploitable buffer overflows that
may allow an attacker to execute arbitrary code with system privileges.
The third vulnerability may allow a remote attacker to cause a
denial of service.
(click
here for more details)
|
|
| Aug
26/03 |
Multiple
Vulnerabilities in Microsoft
Internet Explorer
|
(Cert)
|
|
Systems
Affected: Microsoft Windows systems running Internet Explorer 5.01;
Internet Explorer 5.50; Internet Explorer 6.01
Previous, unsupported versions of Internet Explorer may also be
affected.
Overview: Microsoft Internet Explorer (IE) contains multiple vulnerabilities,
the most serious of which could allow a remote attacker to execute
arbitrary code with the privileges of the user running IE.
(click
here for more details)
|
|
| Aug
13/03 |
GNU
Project FTP Server Compromise
|
(Cert)
|
|
Overview
: The CERT/CC has received a report that the system housing the
primary FTP servers for the GNU software project was compromised.
(click
here for more details)
|
|
| Aug11/03 |
W32/Blaster
worm |
(Cert)
|
|
Systems
Affected: Microsoft Windows NT 4.0, Microsoft Windows 2000, Microsoft
Windows XP, Microsoft Windows Server 2003
Overview:
The CERT/CC is receiving reports of widespread activity related
to a new piece of malicious code known as W32/Blaster. This worm
appears to exploit known vulnerabilities in the Microsoft Remote
Procedure Call (RPC) Interface.
(click
here for more details)
|
|
| July
31/03 |
Exploitation
of Vulnerabilities in Microsoft RPC Interface |
(Cert)
|
| |
Systems
Affected: Microsoft Windows NT 4.0, Microsoft Windows NT 4.0 Terminal
Services Edition, Microsoft Windows 2000, Microsoft Windows XP,
Microsoft Windows Server 2003
Overview:
The CERT/CC is receiving reports of widespread scanning and exploitation
of two recently discovered vulnerabilities in Microsoft Remote
Procedure Call (RPC) Interface.
(click
here for more details)
|
|
| July
25/03 |
Integer
Overflows in Microsoft Windows DirectX MIDI Library |
(Cert)
|
|
Systems
Affected: Microsoft Windows systems running DirectX (Windows 98,
98SE, NT, 4.0, NT 4.0 TSE, 2000, Server 2003)
Overview:
A set of integer overflows exists in a DirectX library included
in Microsoft Windows. An attacker could exploit this vulnerability
to execute arbitrary code or to cause a denial of service.
(click
here for more detail)
|
|
| July
18/03 |
Exploit
available for for the Cisco IOS Interface Blocked Vulnerabilities
|
(Cert)
|
|
Systems
Affected: All Cisco devices running Cisco IOS software and configured
to process Internet Protocol version 4 (IPv4) packets.
Overview:
An exploit has been posted publicly for the vulnerability described
in VU#411332, which was announced in this
document
(click
here for more detail)
|
|
| July
17/03 |
Buffer
Overflow in Microsoft RPC
|
(Cert)
|
|
Systems
Affected: Microsoft Windows NT 4.0, Microsoft Windows NT 4.0 Terminal
Services Edition, Microsoft Windows 2000, Microsoft Windows XP,
Microsoft Windows Server 2003.
Overview:
A buffer overflow vulnerability exists in Microsoft's Remote Procedure
Call (RPC) implementation. A remote attacker could exploit this
vulnerability to execute arbitrary code or cause a denial of service.
(click
here for more detail)
|
|
| July
16/03 |
Cisco
IOS Interface Blocked by IPv4 Packet |
(Cert)
|
|
Systems
Affected : All Cisco devices running Cisco IOS software and configured
to process Internet Protocol version 4 (IPv4) packets.
Overview:
A vulnerability in many versions of Cisco IOS could allow an intruder
to execute a denial-of-service attack against a vulnerable device.
(click
here for more detail)
|
|
| July
14/03 |
Buffer
Overflow in Microsoft Windows HTML Conversion Library |
(Cert)
|
|
Systems
Affected: Windows 98 and 98 Second Edition (SE), Windows NT 4.0
and 4.0 Terminal Server Edition (TSE), Windows Millennium Edition
(Me), Windows 2000, Windows XP, Windows Server 2003
Overview:
A buffer overflow vulnerability exists in a shared HTML conversion
library included in Microsoft Windows. An attacker could exploit
this vulnerability to execute arbitrary code or cause a denial
of service.
(click
here for more details)
|
|
| July
3/03 |
ISS
warns of coordinated hacker attack on July 6 click
here to see full story-->.
|
|
| |
|
|
| Apr.
17/03 |
Multiple
Vulnerabilities in Snort Preprocessors |
(Cert)
|
| |
Systems
Affected: Snort IDS, versions 1.8 through 2.0 RC1
Overview:
There are two vulnerabilities in the Snort Intrusion Detection
System, each in a separate preprocessor module. Both vulnerabilities
allow remote attackers to execute arbitrary code with the privileges
of the user running Snort, typically root.
(click
here for more information)
|
|
| Mar
29/03 |
Buffer
Overflow in Sendmail |
(Cert)
|
|
Systems
Affected: Sendmail Pro (all versions), Sendmail Switch 2.1 prior
to 2.1.6, Sendmail Switch 2.2 prior to 2.2.6, Sendmail Switch 3.0
prior to 3.0.4, Sendmail for NT 2.X prior to 2.6.3, Sendmail for
NT 3.0 prior to 3.0.4, Systems running open-source sendmail, versions
prior to 8.12.9, including UNIX and Linux systems
Overview:
There is a vulnerability in sendmail that can be exploited to
cause a denial-of-service condition and could allow a remote attacker
to execute arbitrary code with the privileges of the sendmail
daemon, typically root.
(Click
here for more information)
|
|
| Mar
26/03 |
Multiple
Vulnerabilities in Lotus Notes and Domino |
(Cert)
|
|
Systems
Affected: Lotus Notes and Domino versions prior to 5.0.12 and 6.0
Gold, VU#571297 affects 5.0.12, 6.0.1 and prior versions.
Overview:
Multiple vulnerabilities have been reported to affect Lotus Notes
clients and Domino servers. Multiple reporters, the close timing,
and some ambiguity caused confusion about what releases are vulnerable.
We are issuing this advisory to help clarify the details of the
vulnerabilities, the versions affected, and the patches that resolve
these issues.
(click
here for more information)
|
|
| Mar
19/03 |
Integer
overflow in Sun RPC XDR library routines |
(Cert)
|
|
Systems
Affected: Applications using vulnerable implementations of SunRPC-derived
XDR libraries, which include: Sun Microsystems network services
library (libnsl); BSD-derived libraries with XDR/RPC routines (libc);
GNU C library with sunrpc (glibc)
Overview:
There is an integer overflow in the xdrmem_getbytes() function
distributed as part of the Sun Microsystems XDR library. This
overflow can cause remotely exploitable buffer overflows in multiple
applications, leading to the execution of arbitrary code. Although
the library was originally distributed by Sun Microsystems, multiple
vendors have included the vulnerable code in their own implementations.
(click
here for more information)
|
|
| Mar
17/ 03 |
Buffer
Overflow in Microsoft IIS 5.0 |
(Cert) |
|
Systems
Affected: Systems running Microsoft Windows 2000 with IIS 5.0 enabled
Overview:
A buffer overflow vulnerability exists in Microsoft IIS 5.0 running
on Microsoft Windows 2000. IIS 5.0 is installed and running by
default on Microsoft Windows 2000 systems. This vulnerability
may allow a remote attacker to run arbitrary code on the victim
machine.
An exploit is publicly available for this vulnerability, which
increases the urgency that system administrators apply a patch.
(click
here for more information)
|
|
| Mar
8/03 |
Increased
Activity Targeting Windows Shares |
(Cert) |
|
Systems
Affected: Microsoft Windows 2000, Microsoft Windows XP
Overview:
In recent weeks, the CERT/CC has observed an increase in the number
of reports of systems running Windows 2000 and XP compromised
due to poorly protected file shares.
(click
here for more information)
|
|
| |
|
|
| Mar
3/03 |
Remote
Buffer Overflow in Sendmail |
(Cert) |
| |
Systems
Affected: Sendmail Pro (all versions), Sendmail Switch 2.1 prior
to 2.1.5, Sendmail Switch 2.2 prior to 2.2.5, Sendmail Switch 3.0
prior to 3.0.3, Sendmail for NT 2.X prior to 2.6.2, Sendmail for
NT 3.0 prior to 3.0.3, Systems running open-source sendmail versions
prior to 8.12.8, including UNIX and Linux systems
Overview:
There is a vulnerability in sendmail that may allow remote attackers
to gain the privileges of the sendmail daemon, typically root.
(click
here for more information)
|
|
| Feb
21/03 |
Multiple
vulnerabilities in implementations of the Session Initiation Protocol
(SIP) |
(Cert) |
| |
Systems
Affected: SIP-enabled products from a wide variety of vendors are
affected. Other systems making use of SIP may also be vulnerable
but were not specifically tested. Not all SIP implementations are
affected.
Overview: Numerous vulnerabilities have been reported in multiple
vendors' implementations of the Session Initiation Protocol. These
vulnerabilities may allow an attacker to gain unauthorized privileged
access, cause denial-of-service attacks, or cause unstable system
behavior. If your site uses SIP-enabled products in any capacity,
the CERT/CC encourages you to read this advisory and follow the
advice provided in the Solution section below.
(click
here for more information)
|
|
| Feb
19/03 |
Multiple
Vulnerabilities in Oracle Servers |
(Cert)
|
| |
Systems
Affected:Systems running Oracle9i Database (Release 1 and 2), Systems
running Oracle8i Database v 8.1.7, Systems running Oracle8 Database
v 8.0.6, Systems running Oracle9i Application Server (Release 9.0.2
and 9.0.3)
Multiple vulnerabilities exist in Oracle software that may lead
to execution of arbitrary code; the ability to read, modify, or
delete information stored in underlying Oracle databases; or denial
of service. All of these vulnerabilites were discovered by Next
Generation Security Software Ltd.
Click
here for more information
|
|
| Jan
25/03 |
MS-SQL
Server Worm |
(Cert)
|
| |
Systems
Affected : Microsoft SQL Server 2000
The
CERT/CC has received reports of self-propagating malicious code
that exploits multiple vulnerabilities in the Resolution Service
of Microsoft SQL Server 2000. The propagation of this worm has
caused varied levels of network degradation across the Internet,
in addition to the compromise of vulnerable machines
Click here for more information.
|
|
| |
|
|
| Jan
23/03 |
Buffer
Overflow in Windows Locator Service |
(Cert)
|
| |
Systems
Affected: Microsoft Windows NT 4.0, Microsoft Windows NT 4.0,
Terminal Server Edition, Microsoft Windows 2000, Microsoft Windows
XP
A
buffer overflow vulnerability in the Microsoft Windows Locator
service could allow a remote attacker to execute arbitrary code
or cause the Windows Locator service to fail. This service is
enabled and running by default on Windows 2000 domain controllers
and Windows NT 4.0 domain controllers.
Click
here for more information.
|
|
| Jan
22/03 |
Double-Free
Bug in CVS Server |
(cert) |
| |
Systems Affected: Systems running CVS Home project versions of
CVS prior to 1.11.5; Operating system distributions that provide
CVS;* Source code repositories managed by CVS
A
"double-free" vulnerability in the Concurrent Versions
System (CVS)
server could allow an unauthenticated, remote attacker with read-only
access to execute arbitrary code, alter program operation, read
sensitive information, or cause a denial of service.
Click
here for more information
|
|
| Jan
15/03 |
Buffer
Overflows in ISC DHCPD Minires Library |
(cert) |
| |
Systems
Affected :Systems running ISC DHCPD versions 3.0 through 3.0.1RC10,
inclusive.
The
Internet Software Consortium (ISC) has discovered several buffer
overflow vulnerabilities in their implementation of DHCP (ISC
DHCPD). These vulnerabilities may allow remote attackers to execute
arbitrary code on affected systems. At this time, we are not aware
of any exploits.
Click
here for more information
|
|
| |
|
|