var-199712-0007
Vulnerability from variot
Land IP denial of service. MSN Messenger clients before version 7.0 will allow remote attackers to take control of a computer if malicious GIF files are processed. Microsoft Windows does not adequately validate IP options, allowing an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service. An attacker could take complete control of a vulnerable system. A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port. When a packet of this sort is received, an infinite loop is initiated and the affected system halts. This is known to affect Windows 95, Windows NT 4.0 up to SP3, Windows Server 2003, Windows XP SP2, Cisco IOS devices & Catalyst switches, and HP-UX up to 11.00. It is noted that on Windows Server 2003 and XP SP2, the TCP and IP checksums must be correct to trigger the issue. **Update: It is reported that Microsoft platforms are also prone to this vulnerability. The vendor reports that network routers may not route malformed TCP/IP packets used to exploit this issue. As a result, an attacker may have to discover a suitable route to a target computer, or reside on the target network segment itself before exploitation is possible. The TCP/IP network protocol stack is the most widely used network protocol for Internet networking implemented by most operating systems. There are loopholes in the TCP/IP protocol stack implementation of early BSD-derived systems (except Linux) and Windows systems, and remote attackers can use this loophole to carry out denial-of-service attacks on the server. Due to problems in the implementation of TCP/IP, the target system may have problems processing such malformed packets. Many old versions of UNIX-like operating systems will crash, and NT's CPU resource usage will be close to 100\% (for about five minutes).
The vulnerability is caused due to improper handling of IP packets with the same destination and source IP and the SYN flag set. This causes a system to consume all available CPU resources for a certain period of time.
This kind of attack was first reported in 1997 and became known as LAND attacks.
SOLUTION: Filter traffic with the same IP address as source and destination address at the perimeter.
The vulnerability is caused due to a boundary error in the SMTP service within the handling of a certain extended verb request. This can be exploited to cause a heap-based buffer overflow by connecting to the SMTP service and issuing a specially crafted command. Instead, this requires permissions usually only granted to other Exchange servers in a domain.
Microsoft Exchange 2000 Server (requires SP3): http://www.microsoft.com/downloads/details.aspx?FamilyId=2A2AF17E-2E4A-4479-8AC9-B5544EA0BD66
Microsoft Exchange Server 2003: http://www.microsoft.com/downloads/details.aspx?FamilyId=97F409EB-C8D0-4C94-A67B-5945E26C9267
Microsoft Exchange Server 2003 (requires SP1): http://www.microsoft.com/downloads/details.aspx?FamilyId=35BCE74A-E84A-4035-BF18-196368F032CC
The following versions are not affected: * Microsoft Exchange Server 5.5 SP4 * Microsoft Exchange Server 5.0 SP2
PROVIDED AND/OR DISCOVERED BY: Mark Dowd and Ben Layer, ISS X-Force.
ORIGINAL ADVISORY: MS05-021 (KB894549): http://www.microsoft.com/technet/security/Bulletin/MS05-021.mspx
ISS X-Force: http://xforce.iss.net/xforce/alerts/id/193
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA05-102A
Multiple Vulnerabilities in Microsoft Windows Components
Original release date: April 12, 2005 Last revised: -- Source: US-CERT
Systems Affected
* Microsoft Windows Systems
For a complete list of affected versions of the Windows operating systems and components, refer to the Microsoft Security Bulletins.
Overview
Microsoft has released a Security Bulletin Summary for April, 2005. This summary includes several bulletins that address vulnerabilities in various Windows applications and components. Details of the vulnerabilities and their impacts are provided below.
I. Description
The list below provides a mapping between Microsoft's Security Bulletins and the related US-CERT Vulnerability Notes. More information related to the vulnerabilities is available in these documents.
III. Solution
Apply a patch
Microsoft has provided the patches for these vulnerabilities in the Security Bulletins and on Windows Update.
Appendix A. References
* Microsoft's Security Bulletin Summary for April, 2005 - <
http://www.microsoft.com/technet/security/bulletin/ms05-apr.mspx>
* US-CERT Vulnerability Note VU#774338 -
<http://www.kb.cert.org/vuls/id/774338>
* US-CERT Vulnerability Note VU#756122 -
<http://www.kb.cert.org/vuls/id/756122>
* US-CERT Vulnerability Note VU#222050 -
<http://www.kb.cert.org/vuls/id/222050>
* US-CERT Vulnerability Note VU#275193 -
<http://www.kb.cert.org/vuls/id/275193>
* US-CERT Vulnerability Note VU#633446 -
<http://www.kb.cert.org/vuls/id/633446>
* US-CERT Vulnerability Note VU#233754 -
<http://www.kb.cert.org/vuls/id/233754>
Feedback can be directed to the authors: Will Dormann, Jeff Gennari, Chad Dougherty, Ken MacInnis, Jason Rafail, Art Manion, and Jeff Havrilla.
This document is available from:
<http://www.us-cert.gov/cas/techalerts/TA05-102A.html>
Copyright 2005 Carnegie Mellon University.
Terms of use: http://www.us-cert.gov/legal.html
Revision History
April 12, 2005: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBQlxwexhoSezw4YfQAQJ4RAf/bTgaa6SBDMJveqW/GnQET79F9aVPM1S2 glam1w4YFyOdyIHpDYqQZRBqgXgpJjel/MiH02tZreU5mgIjkPIWA3gleepyWvnN 7VYv8KcbSnyvGxDl/8K2YjFz550gxA3pkRD7IiqdpOums87lJ7xM7sjdUY0ZA8aF JEvA4gfndpgLSuISV7Gf8y1s4MU329DurNy3t8W4EB9Iuef/E4Z058IvHnz9dTnT XwBnyW1KfH2Ohpy7QBOtcXt1wXU8X0F+d01g/VZmTL7xVwXmcPi8UpS7bPK8A17+ asqo582KjZVR56iL7fqNQzsrXUGZncEnX/8QOhi3Ym2LfAEkKrg3rw== =BY/p -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-199712-0007", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 5.6, "vendor": "microsoft", "version": null }, { "model": "sunos", "scope": "eq", "trust": 1.9, "vendor": "sun", "version": "4.1.4" }, { "model": "sunos", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "4.1.3u1" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.01" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.10" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.0" }, { "model": "windows nt", "scope": "eq", "trust": 1.3, "vendor": "microsoft", "version": "4.0" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.16" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.1" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.24" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.20" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.30" }, { "model": "inet", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "5.01" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "9.05" }, { "model": "winsock", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "2.0" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "9.04" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "9.07" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "9.00" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "9.01" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7000" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "9.03" }, { "model": "windows 95", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "10.00" }, { "model": "windows xp home sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "bsdi", "version": "2.1" }, { "model": "windows nt workstation sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "netbsd", "scope": "ne", "trust": 0.3, "vendor": "netbsd", "version": "1.3.1" }, { "model": "windows nt sp5", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.0.31" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.5" }, { "model": "ios aa", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.15" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "freebsd", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": "2.2.6" }, { "model": "windows nt sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows xp professional", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows nt enterprise server sp4", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "bsd/os", "scope": "ne", "trust": 0.3, "vendor": "bsdi", "version": "3.0" }, { "model": "windows server enterprise edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.0.34" }, { "model": "windows nt workstation sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "ios f", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.2.4" }, { "model": "ios bt", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.12" }, { "model": "windows nt workstation sp4", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows server enterprise edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "windows xp tablet pc edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios ia", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.15" }, { "model": "netbsd", "scope": "ne", "trust": 0.3, "vendor": "netbsd", "version": "1.3" }, { "model": "windows xp tablet pc edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "bsd/os", "scope": "ne", "trust": 0.3, "vendor": "bsdi", "version": "3.1" }, { "model": "windows nt sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows server enterprise edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.1.x" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.2" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.1" }, { "model": "windows xp 64-bit edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.3.16" }, { "model": "windows server enterprise edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.0.38" }, { "model": "windows server standard edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "netware", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.1" }, { "model": "windows server standard edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "bsdi", "version": "2.0" }, { "model": "windows xp media center edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.0.36" }, { "model": "windows xp media center edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows nt workstation", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.3" }, { "model": "ios bt", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.17" }, { "model": "windows server datacenter edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "windows nt sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "freebsd", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": "3.x" }, { "model": "windows nt enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows server datacenter edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "windows nt enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.2.10" }, { "model": "windows nt terminal server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.1.5" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.7" }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "bsdi", "version": "2.0.1" }, { "model": "windows server web edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows nt enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows xp tablet pc edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows server enterprise edition itanium sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.3" }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "bsdi", "version": "1.1" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.0.33" }, { "model": "windows nt terminal server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "open desktop", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.1.6.1" }, { "model": "ios ia", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.9" }, { "model": "netbsd", "scope": "ne", "trust": 0.3, "vendor": "netbsd", "version": "1.3.2" }, { "model": "ios aa", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.7" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0.17" }, { "model": "windows server datacenter edition itanium sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "windows nt enterprise server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows nt terminal server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.0" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "2.1" }, { "model": "windows xp professional sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows nt sp3 alpha", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "freebsd", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": "2.2.2" }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.2.4" }, { "model": "ios a", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.3.19" }, { "model": "ios f1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.2.4" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.0.35" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "windows xp home", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "cmw+", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2" }, { "model": "bsd/os", "scope": "ne", "trust": 0.3, "vendor": "bsdi", "version": "4.0" }, { "model": "windows server web edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.1" }, { "model": "ios ca", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.15" }, { "model": "windows xp media center edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios/700", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.0.30" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.1" }, { "model": "windows nt server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "95" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.2.10" }, { "model": "catalyst supervisor software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "29xx2.4.401" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.0.37" }, { "model": "sunos u1", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4.1.3" }, { "model": "windows nt sp4", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "3.5.1" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "atm switch", "scope": "eq", "trust": 0.3, "vendor": "marconi", "version": "6.1.1" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.0.32" }, { "model": "windows nt server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt terminal server sp4", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows xp professional sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows xp home sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "catalyst supervisor software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "29xx2.1.1102" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.2.1" }, { "model": "windows xp 64-bit edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0" }, { "model": "windows xp 64-bit edition version sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "freebsd", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": "2.2.8" }, { "model": "windows nt workstation sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "ios p", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.2.9" }, { "model": "atm switch", "scope": "eq", "trust": 0.3, "vendor": "marconi", "version": "7.0.1" }, { "model": "windows nt sp6", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows server datacenter edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.2.4" }, { "model": "windows nt server sp4", "scope": "ne", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "windows nt server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.15" }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.1.6" }, { "model": "bsd/os", "scope": "ne", "trust": 0.3, "vendor": "bsdi", "version": "4.0.1" }, { "model": "windows xp 64-bit edition version", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios ca", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.1.7" }, { "model": "windows server datacenter edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.2" }, { "model": "windows nt terminal server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "2.1x" }, { "model": "windows server web edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" } ], "sources": [ { "db": "CERT/CC", "id": "VU#774338" }, { "db": "CERT/CC", "id": "VU#756122" }, { "db": "CERT/CC", "id": "VU#222050" }, { "db": "CERT/CC", "id": "VU#633446" }, { "db": "CERT/CC", "id": "VU#396645" }, { "db": "CERT/CC", "id": "VU#233754" }, { "db": "CERT/CC", "id": "VU#275193" }, { "db": "BID", "id": "2666" }, { "db": "NVD", "id": "CVE-1999-0016" }, { "db": "CNNVD", "id": "CNNVD-199712-002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:7000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:winsock:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-1999-0016" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "m3lt meltman@lagged.net", "sources": [ { "db": "CNNVD", "id": "CNNVD-199712-002" } ], "trust": 0.6 }, "cve": "CVE-1999-0016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-16", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-1999-0016", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-1999-0016", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#774338", "trust": 0.8, "value": "21.80" }, { "author": "CARNEGIE MELLON", "id": "VU#756122", "trust": 0.8, "value": "21.80" }, { "author": "CARNEGIE MELLON", "id": "VU#222050", "trust": 0.8, "value": "4.36" }, { "author": "CARNEGIE MELLON", "id": "VU#633446", "trust": 0.8, "value": "23.63" }, { "author": "CARNEGIE MELLON", "id": "VU#396645", "trust": 0.8, "value": "12.15" }, { "author": "CARNEGIE MELLON", "id": "VU#233754", "trust": 0.8, "value": "12.29" }, { "author": "CARNEGIE MELLON", "id": "VU#275193", "trust": 0.8, "value": "36.15" }, { "author": "CNNVD", "id": "CNNVD-199712-002", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-16", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-1999-0016", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#774338" }, { "db": "CERT/CC", "id": "VU#756122" }, { "db": "CERT/CC", "id": "VU#222050" }, { "db": "CERT/CC", "id": "VU#633446" }, { "db": "CERT/CC", "id": "VU#396645" }, { "db": "CERT/CC", "id": "VU#233754" }, { "db": "CERT/CC", "id": "VU#275193" }, { "db": "VULHUB", "id": "VHN-16" }, { "db": "VULMON", "id": "CVE-1999-0016" }, { "db": "NVD", "id": "CVE-1999-0016" }, { "db": "CNNVD", "id": "CNNVD-199712-002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Land IP denial of service. MSN Messenger clients before version 7.0 will allow remote attackers to take control of a computer if malicious GIF files are processed. Microsoft Windows does not adequately validate IP options, allowing an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service. An attacker could take complete control of a vulnerable system. A number of TCP/IP stacks are vulnerable to a \"loopback\" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port. When a packet of this sort is received, an infinite loop is initiated and the affected system halts. This is known to affect Windows 95, Windows NT 4.0 up to SP3, Windows Server 2003, Windows XP SP2, Cisco IOS devices \u0026amp; Catalyst switches, and HP-UX up to 11.00. \nIt is noted that on Windows Server 2003 and XP SP2, the TCP and IP checksums must be correct to trigger the issue. \n**Update: It is reported that Microsoft platforms are also prone to this vulnerability. The vendor reports that network routers may not route malformed TCP/IP packets used to exploit this issue. As a result, an attacker may have to discover a suitable route to a target computer, or reside on the target network segment itself before exploitation is possible. The TCP/IP network protocol stack is the most widely used network protocol for Internet networking implemented by most operating systems. There are loopholes in the TCP/IP protocol stack implementation of early BSD-derived systems (except Linux) and Windows systems, and remote attackers can use this loophole to carry out denial-of-service attacks on the server. Due to problems in the implementation of TCP/IP, the target system may have problems processing such malformed packets. Many old versions of UNIX-like operating systems will crash, and NT\u0027s CPU resource usage will be close to 100\\\\% (for about five minutes). \n\nThe vulnerability is caused due to improper handling of IP packets\nwith the same destination and source IP and the SYN flag set. This\ncauses a system to consume all available CPU resources for a certain\nperiod of time. \n\nThis kind of attack was first reported in 1997 and became known as\nLAND attacks. \n\nSOLUTION:\nFilter traffic with the same IP address as source and destination\naddress at the perimeter. \n\nThe vulnerability is caused due to a boundary error in the SMTP\nservice within the handling of a certain extended verb request. This\ncan be exploited to cause a heap-based buffer overflow by connecting\nto the SMTP service and issuing a specially crafted command. Instead, this requires permissions\nusually only granted to other Exchange servers in a domain. \n\nMicrosoft Exchange 2000 Server (requires SP3):\nhttp://www.microsoft.com/downloads/details.aspx?FamilyId=2A2AF17E-2E4A-4479-8AC9-B5544EA0BD66\n\nMicrosoft Exchange Server 2003:\nhttp://www.microsoft.com/downloads/details.aspx?FamilyId=97F409EB-C8D0-4C94-A67B-5945E26C9267\n\nMicrosoft Exchange Server 2003 (requires SP1):\nhttp://www.microsoft.com/downloads/details.aspx?FamilyId=35BCE74A-E84A-4035-BF18-196368F032CC\n\nThe following versions are not affected:\n* Microsoft Exchange Server 5.5 SP4\n* Microsoft Exchange Server 5.0 SP2\n\nPROVIDED AND/OR DISCOVERED BY:\nMark Dowd and Ben Layer, ISS X-Force. \n\nORIGINAL ADVISORY:\nMS05-021 (KB894549):\nhttp://www.microsoft.com/technet/security/Bulletin/MS05-021.mspx\n\nISS X-Force:\nhttp://xforce.iss.net/xforce/alerts/id/193\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n National Cyber Alert System \n\n Technical Cyber Security Alert TA05-102A \n\nMultiple Vulnerabilities in Microsoft Windows Components\n\n Original release date: April 12, 2005\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n * Microsoft Windows Systems\n\n For a complete list of affected versions of the Windows operating\n systems and components, refer to the Microsoft Security Bulletins. \n\n\nOverview\n\n Microsoft has released a Security Bulletin Summary for April, 2005. \n This summary includes several bulletins that address\n vulnerabilities in various Windows applications and\n components. Details of\n the vulnerabilities and their impacts are provided below. \n\n\nI. Description\n\n The list below provides a mapping between Microsoft\u0027s Security\n Bulletins and the related US-CERT Vulnerability Notes. More\n information related to the vulnerabilities is available in these\n documents. \n\n\nIII. Solution\n\nApply a patch\n\n Microsoft has provided the patches for these vulnerabilities in the\n Security Bulletins and on Windows Update. \n\n\nAppendix A. References\n\n * Microsoft\u0027s Security Bulletin Summary for April, 2005 - \u003c\n http://www.microsoft.com/technet/security/bulletin/ms05-apr.mspx\u003e\n\n * US-CERT Vulnerability Note VU#774338 -\n \u003chttp://www.kb.cert.org/vuls/id/774338\u003e\n\n * US-CERT Vulnerability Note VU#756122 -\n \u003chttp://www.kb.cert.org/vuls/id/756122\u003e\n\n * US-CERT Vulnerability Note VU#222050 -\n \u003chttp://www.kb.cert.org/vuls/id/222050\u003e\n\n * US-CERT Vulnerability Note VU#275193 -\n \u003chttp://www.kb.cert.org/vuls/id/275193\u003e\n\n * US-CERT Vulnerability Note VU#633446 -\n \u003chttp://www.kb.cert.org/vuls/id/633446\u003e\n\n * US-CERT Vulnerability Note VU#233754 -\n \u003chttp://www.kb.cert.org/vuls/id/233754\u003e\n _________________________________________________________________\n\n Feedback can be directed to the authors: Will Dormann, Jeff Gennari,\n Chad Dougherty, Ken MacInnis, Jason Rafail, Art Manion, and Jeff\n Havrilla. \n _________________________________________________________________\n\n This document is available from: \n \n \u003chttp://www.us-cert.gov/cas/techalerts/TA05-102A.html\u003e \n \n _________________________________________________________________\n\n Copyright 2005 Carnegie Mellon University. \n \n Terms of use: \u003chttp://www.us-cert.gov/legal.html\u003e\n _________________________________________________________________\n\n Revision History\n\n April 12, 2005: Initial release\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBQlxwexhoSezw4YfQAQJ4RAf/bTgaa6SBDMJveqW/GnQET79F9aVPM1S2\nglam1w4YFyOdyIHpDYqQZRBqgXgpJjel/MiH02tZreU5mgIjkPIWA3gleepyWvnN\n7VYv8KcbSnyvGxDl/8K2YjFz550gxA3pkRD7IiqdpOums87lJ7xM7sjdUY0ZA8aF\nJEvA4gfndpgLSuISV7Gf8y1s4MU329DurNy3t8W4EB9Iuef/E4Z058IvHnz9dTnT\nXwBnyW1KfH2Ohpy7QBOtcXt1wXU8X0F+d01g/VZmTL7xVwXmcPi8UpS7bPK8A17+\nasqo582KjZVR56iL7fqNQzsrXUGZncEnX/8QOhi3Ym2LfAEkKrg3rw==\n=BY/p\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-1999-0016" }, { "db": "CERT/CC", "id": "VU#774338" }, { "db": "CERT/CC", "id": "VU#756122" }, { "db": "CERT/CC", "id": "VU#222050" }, { "db": "CERT/CC", "id": "VU#633446" }, { "db": "CERT/CC", "id": "VU#396645" }, { "db": "CERT/CC", "id": "VU#233754" }, { "db": "CERT/CC", "id": "VU#275193" }, { "db": "BID", "id": "2666" }, { "db": "VULHUB", "id": "VHN-16" }, { "db": "VULMON", "id": "CVE-1999-0016" }, { "db": "PACKETSTORM", "id": "36523" }, { "db": "PACKETSTORM", "id": "37141" }, { "db": "PACKETSTORM", "id": "37198" } ], "trust": 6.66 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=20812", "trust": 0.5, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-16", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-16" }, { "db": "VULMON", "id": "CVE-1999-0016" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-1999-0016", "trust": 2.1 }, { "db": "SECUNIA", "id": "14512", "trust": 1.7 }, { "db": "BID", "id": "2666", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#774338", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#756122", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#222050", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#633446", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#233754", "trust": 0.9 }, { "db": "SECUNIA", "id": "14920", "trust": 0.9 }, { "db": "USCERT", "id": "TA05-102A", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#275193", "trust": 0.9 }, { "db": "OSVDB", "id": "14578", "trust": 0.8 }, { "db": "XF", "id": "19593", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#396645", "trust": 0.8 }, { "db": "BID", "id": "13116", "trust": 0.8 }, { "db": "SECTRACK", "id": "1013686", "trust": 0.8 }, { "db": "OSVDB", "id": "15467", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-199712-002", "trust": 0.7 }, { "db": "HP", "id": "HPSBUX9801-076", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "20812", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "20810", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "20814", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "20813", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "20811", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-16", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-1999-0016", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "36523", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "37141", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "37198", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#774338" }, { "db": "CERT/CC", "id": "VU#756122" }, { "db": "CERT/CC", "id": "VU#222050" }, { "db": "CERT/CC", "id": "VU#633446" }, { "db": "CERT/CC", "id": "VU#396645" }, { "db": "CERT/CC", "id": "VU#233754" }, { "db": "CERT/CC", "id": "VU#275193" }, { "db": "VULHUB", "id": "VHN-16" }, { "db": "VULMON", "id": "CVE-1999-0016" }, { "db": "BID", "id": "2666" }, { "db": "PACKETSTORM", "id": "36523" }, { "db": "PACKETSTORM", "id": "37141" }, { "db": "PACKETSTORM", "id": "37198" }, { "db": "NVD", "id": "CVE-1999-0016" }, { "db": "CNNVD", "id": "CNNVD-199712-002" } ] }, "id": "VAR-199712-0007", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-16" } ], "trust": 0.43667661 }, "last_update_date": "2023-12-18T11:45:22.618000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-1999-0016-Land-DOS-tool", "trust": 0.1, "url": "https://github.com/pexmee/cve-1999-0016-land-dos-tool " }, { "title": "opensims", "trust": 0.1, "url": "https://github.com/ascendantlogic/opensims " }, { "title": "CVE-1999-0016-POC", "trust": 0.1, "url": "https://github.com/pommaq/cve-1999-0016-poc " } ], "sources": [ { "db": "VULMON", "id": "CVE-1999-0016" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-1999-0016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx" }, { "trust": 1.8, "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux9801-076" }, { "trust": 1.6, "url": "about vulnerability notes" }, { "trust": 1.6, "url": "contact us about this vulnerability" }, { "trust": 1.6, "url": "provide a vendor statement" }, { "trust": 0.9, "url": "http://secunia.com/advisories/14512/" }, { "trust": 0.9, "url": "http://xforce.iss.net/xforce/alerts/id/193" }, { "trust": 0.9, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-021.mspx" }, { "trust": 0.9, "url": "http://secunia.com/advisories/14920/" }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-020.mspx" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=228\u0026type=vulnerabilities" }, { "trust": 0.8, "url": "http://www.microsoft.com/security/bulletins/200504_msnmessenger.mspx" }, { "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-022.mspx" }, { "trust": 0.8, "url": "http://support.microsoft.com/kb/889829" }, { "trust": 0.8, "url": "http://support.microsoft.com/kb/896597" }, { "trust": 0.8, "url": "http://messenger.msn.com" }, { "trust": 0.8, "url": "http://www.w3.org/graphics/gif/spec-gif89a.txt" }, { "trust": 0.8, "url": "http://secunia.com/advisories/14512" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2666 " }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/19593" }, { "trust": 0.8, "url": "http://osvdb.org/displayvuln.php?osvdb_id=14578" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/alerts/id/192" }, { "trust": 0.8, "url": "http://www.iana.org/assignments/ip-parameters" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13116/" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/apr/1013686.html" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/techalerts/ta05-102a.html" }, { "trust": 0.8, "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=15467" }, { "trust": 0.3, "url": "http://support.microsoft.com/support/kb/articles/q165/0/05.asp" }, { "trust": 0.3, "url": "http://support.microsoft.com/support/kb/articles/q177/5/39.asp" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/tidfinder.cgi?2932511" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/770/land-pub.shtml#iosvers" }, { "trust": 0.3, "url": "http://www.securityfocus.com/archive/1/392354" }, { "trust": 0.3, "url": "/archive/1/392642" }, { "trust": 0.3, "url": "/archive/1/393045" }, { "trust": 0.3, "url": "/archive/1/392354" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/pexmee/cve-1999-0016-land-dos-tool" }, { "trust": 0.1, "url": "https://github.com/ascendantlogic/opensims" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/20812/" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=8889" }, { "trust": 0.1, "url": "http://secunia.com/product/1173/" }, { "trust": 0.1, "url": "http://secunia.com/product/22/" }, { "trust": 0.1, "url": "http://secunia.com/product/1174/" }, { "trust": 0.1, "url": "http://secunia.com/product/1176/" }, { "trust": 0.1, "url": "http://secunia.com/product/1175/" }, { "trust": 0.1, "url": "http://secunia.com/product/16/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?f=l" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=35bce74a-e84a-4035-bf18-196368f032cc" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=2a2af17e-2e4a-4479-8ac9-b5544ea0bd66" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/41/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=97f409eb-c8d0-4c94-a67b-5945e26c9267" }, { "trust": 0.1, "url": "http://secunia.com/product/1828/" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/633446\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/222050\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/233754\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/275193\u003e" }, { "trust": 0.1, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-apr.mspx\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/774338\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta05-102a.html\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/756122\u003e" } ], "sources": [ { "db": "CERT/CC", "id": "VU#774338" }, { "db": "CERT/CC", "id": "VU#756122" }, { "db": "CERT/CC", "id": "VU#222050" }, { "db": "CERT/CC", "id": "VU#633446" }, { "db": "CERT/CC", "id": "VU#396645" }, { "db": "CERT/CC", "id": "VU#233754" }, { "db": "CERT/CC", "id": "VU#275193" }, { "db": "VULHUB", "id": "VHN-16" }, { "db": "VULMON", "id": "CVE-1999-0016" }, { "db": "BID", "id": "2666" }, { "db": "PACKETSTORM", "id": "36523" }, { "db": "PACKETSTORM", "id": "37141" }, { "db": "PACKETSTORM", "id": "37198" }, { "db": "NVD", "id": "CVE-1999-0016" }, { "db": "CNNVD", "id": "CNNVD-199712-002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#774338" }, { "db": "CERT/CC", "id": "VU#756122" }, { "db": "CERT/CC", "id": "VU#222050" }, { "db": "CERT/CC", "id": "VU#633446" }, { "db": "CERT/CC", "id": "VU#396645" }, { "db": "CERT/CC", "id": "VU#233754" }, { "db": "CERT/CC", "id": "VU#275193" }, { "db": "VULHUB", "id": "VHN-16" }, { "db": "VULMON", "id": "CVE-1999-0016" }, { "db": "BID", "id": "2666" }, { "db": "PACKETSTORM", "id": "36523" }, { "db": "PACKETSTORM", "id": "37141" }, { "db": "PACKETSTORM", "id": "37198" }, { "db": "NVD", "id": "CVE-1999-0016" }, { "db": "CNNVD", "id": "CNNVD-199712-002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-04-12T00:00:00", "db": "CERT/CC", "id": "VU#774338" }, { "date": "2005-04-12T00:00:00", "db": "CERT/CC", "id": "VU#756122" }, { "date": "2005-04-12T00:00:00", "db": "CERT/CC", "id": "VU#222050" }, { "date": "2005-04-12T00:00:00", "db": "CERT/CC", "id": "VU#633446" }, { "date": "2005-04-13T00:00:00", "db": "CERT/CC", "id": "VU#396645" }, { "date": "2005-04-12T00:00:00", "db": "CERT/CC", "id": "VU#233754" }, { "date": "2005-04-12T00:00:00", "db": "CERT/CC", "id": "VU#275193" }, { "date": "1997-12-01T00:00:00", "db": "VULHUB", "id": "VHN-16" }, { "date": "1997-12-01T00:00:00", "db": "VULMON", "id": "CVE-1999-0016" }, { "date": "1997-11-20T00:00:00", "db": "BID", "id": "2666" }, { "date": "2005-03-15T04:45:15", "db": "PACKETSTORM", "id": "36523" }, { "date": "2005-04-18T07:20:47", "db": "PACKETSTORM", "id": "37141" }, { "date": "2005-04-19T06:59:49", "db": "PACKETSTORM", "id": "37198" }, { "date": "1997-12-01T05:00:00", "db": "NVD", "id": "CVE-1999-0016" }, { "date": "1997-11-13T00:00:00", "db": "CNNVD", "id": "CNNVD-199712-002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-08-18T00:00:00", "db": "CERT/CC", "id": "VU#774338" }, { "date": "2005-04-13T00:00:00", "db": "CERT/CC", "id": "VU#756122" }, { "date": "2005-04-13T00:00:00", "db": "CERT/CC", "id": "VU#222050" }, { "date": "2005-04-12T00:00:00", "db": "CERT/CC", "id": "VU#633446" }, { "date": "2005-04-13T00:00:00", "db": "CERT/CC", "id": "VU#396645" }, { "date": "2005-05-03T00:00:00", "db": "CERT/CC", "id": "VU#233754" }, { "date": "2005-08-02T00:00:00", "db": "CERT/CC", "id": "VU#275193" }, { "date": "2008-09-09T00:00:00", "db": "VULHUB", "id": "VHN-16" }, { "date": "2008-09-09T00:00:00", "db": "VULMON", "id": "CVE-1999-0016" }, { "date": "2009-07-11T06:06:00", "db": "BID", "id": "2666" }, { "date": "2008-09-09T12:33:32.243000", "db": "NVD", "id": "CVE-1999-0016" }, { "date": "2006-11-16T00:00:00", "db": "CNNVD", "id": "CNNVD-199712-002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "37198" }, { "db": "CNNVD", "id": "CNNVD-199712-002" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft Internet Explorer DHTML objects contain a race condition", "sources": [ { "db": "CERT/CC", "id": "VU#774338" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unknown", "sources": [ { "db": "CNNVD", "id": "CNNVD-199712-002" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.