var-200103-0098
Vulnerability from variot
FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources. The secure-RPC feature of the SSH1 client in Solaris sometimes encrypts the SSH private key file with a weak passphrase, which can be determined by an attacker and used to recover the SSH private keys. Other versions of the SSH client running on non-Solaris platforms are not affected by this vulnerability. NewsDaemon prior to version 0.21b contains a vulnerability allowing remote attackers to gain administrative access to the web site. getty_ps is an open-source software package designed to support logons to the console and terminals. Some implementations create temporary files insecurely with predictable names, leading to corruption of arbitrary files via symbolic link attack. CPU There is a vulnerability that consumes a large amount of resources.System disrupts service operation (DoS) It may be in a state. getty_ps is an open source, freely available, publicly maintained software package shipped with many distributions of Linux. A problem in the getty_ps software package could make it vulnerable to a symbolic link attack. The problem occurs in the creation and handling of files in the /tmp directory by the getty_ps program. Under certain circumstances, getty_ps will create files in the /tmp filesystem in an insecure manner. The program uses a naming scheme that could make it possible to guess the filename of future files in the /tmp directory, and does not check for the existance of the file before attempting to create it. A malicious user could use this vulnerability to overwrite or append to and corrupt system files. SSH is a package designed to encrypt traffic between two end points using the IETF specified SSH protocol. The SSH1 package is distributed and maintained by SSH Communications Security. A problem exists which could allow the discovery of the secret key used to encrypt traffic on the local host. When using SUN-DES-1 to share keys with other hosts on the network to facilitate secure communication via protocols such as NFS and NIS+, the keys are shared between hosts using the private key of the user and a cryptographic algorithm to secure the contents of the key, which is stored on the NIS+ primary. The problem occurs when the key is encrypted with the SUN-DES-1 magic phrase prior to having done a keylogin (the keyserv does not have the users DH private key). A design flaw in the software that shares the key with the NIS+ master will inconsistently return the correct value for an attempted keyshare that has failed. A step in the private key encryption process is skipped, and the users private key is then encrypted only with the public key of the target server and the SUN-DES-1 magic phrase, a phrase that is guessable due to the way it is generated. A user from the same host can then execute a function that returns another users magic phrase, and use this to decrypt the private key of the victim. This makes it possible for a user with malicious intent to gain knowledge of a users secret key, and decrypt sensitive traffic between two hosts, with the possibility of gaining access and elevated privileges on the hosts and/or NIS+ domain. This reportedly affects the SSH2 series of the software package. Firewall-1 is a firewall software package that provides many advanced features such as content filtering and network address translation. It is distributed by Check Point Software Technologies, and designed to run on various systems such as Sparc/Solaris or the Nokia Firewall Modules. A problem with the license manager used with the Firewall-1 package could allow a Denial of Service. The problem manifests itself when the internal interface receives a large number of packets that are source routed and containing ficticious (or even valid) addresses. With each error message generated, the load on the Firewall system CPU raises. Check Point Software has acknowledged this vulnerability and a workaround is available. For the workaround, see the solution section of this vulnerability database entry. This issue will be resolved in the next service pack. There is a vulnerability in FireWall-1 version 4.1 with limited-IP license. This vulnerability can cause console congestion warning messages and CPU resource consumption. TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to majordomo@iss.net Contact alert-owner@iss.net for help with any problems!
-----BEGIN PGP SIGNED MESSAGE-----
Internet Security Systems Security Alert Summary February 6, 2001 Volume 6 Number 3
X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php
Contents
120 Reported Vulnerabilities
Risk Factor Key
Date Reported: 1/31/01 Vulnerability: win2k-rdp-dos Platforms Affected: Windows 2000 Risk Factor: Medium Attack Type: Network Based Brief Description: Windows 2000 Server RDP denial of service X-Force URL: http://xforce.iss.net/static/6035.php
Date Reported: 1/31/01 Vulnerability: cisco-ccs-file-access Platforms Affected: Cisco Content Services Switch Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Cisco CCS command line interface could allow read access to files and directories X-Force URL: http://xforce.iss.net/static/6031.php
Date Reported: 1/31/01 Vulnerability: quicktime-embedded-tag-bo Platforms Affected: Quicktime 4.1.2 Risk Factor: High Attack Type: Host Based Brief Description: QuickTime Player EMBED tag buffer overflow X-Force URL: http://xforce.iss.net/static/6040.php
Date Reported: 1/31/01 Vulnerability: solaris-ximp40-bo Platforms Affected: Solaris (7, 8) Risk Factor: High Attack Type: Host Based Brief Description: Solaris "ximp40" shared library buffer overflow X-Force URL: http://xforce.iss.net/static/6039.php
Date Reported: 1/31/01 Vulnerability: cisco-ccs-cli-dos Platforms Affected: Cisco Content Services Switch Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Cisco CCS command line interface denial of service X-Force URL: http://xforce.iss.net/static/6030.php
Date Reported: 1/30/01 Vulnerability: slimserve-httpd-dos Platforms Affected: SlimServe 1.0 Risk Factor: Medium Attack Type: Network Based Brief Description: SlimServe HTTPd denial of service X-Force URL: http://xforce.iss.net/static/6028.php
Date Reported: 1/30/01 Vulnerability: crazywwwboard-qdecoder-bo Platforms Affected: CrazyWWWBoard prior to 2000LEp5-1 Risk Factor: Medium Attack Type: Network Based Brief Description: CrazyWWWBoard qDecoder buffer overflow X-Force URL: http://xforce.iss.net/static/6033.php
Date Reported: 1/30/01 Vulnerability: virusbuster-mua-bo Platforms Affected: Risk Factor: Medium Attack Type: Network Based Brief Description: Virus Buster 2001 Mail User Agent (MUA) buffer overflow X-Force URL: http://xforce.iss.net/static/6034.php
Date Reported: 1/29/01 Vulnerability: iis-isapi-obtain-code Platforms Affected: IIS (4.0, 5.0) Risk Factor: Low Attack Type: Network/Host Based Brief Description: IIS allows remote attacker to obtain code fragments using .htr ISAPI extensions X-Force URL: http://xforce.iss.net/static/6032.php
Date Reported: 1/29/01 Vulnerability: bind-inverse-query-disclosure Platforms Affected: Bind (4.x, 8.2.x) Risk Factor: Medium Attack Type: Network Based Brief Description: BIND 4.x and 8.2.x exposes environment variables X-Force URL: http://xforce.iss.net/static/6018.php
Date Reported: 1/29/01 Vulnerability: hp-man-dos Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP man command denial of service X-Force URL: http://xforce.iss.net/static/6014.php
Date Reported: 1/29/01 Vulnerability: sort-temp-file-abort Platforms Affected: FreeBSD Risk Factor: Medium Attack Type: Host Based Brief Description: Sort temporary files denial of service X-Force URL: http://xforce.iss.net/static/6038.php
Date Reported: 1/29/01 Vulnerability: bind-complain-format-string Platforms Affected: BIND 4.x Risk Factor: Medium Attack Type: Network Based Brief Description: BIND 4.x nslookupComplain() format string X-Force URL: http://xforce.iss.net/static/6017.php
Date Reported: 1/29/01 Vulnerability: bind-complain-bo Platforms Affected: BIND 4.x Risk Factor: Medium Attack Type: Network Based Brief Description: BIND 4.x nslookupComplain() buffer overflow X-Force URL: http://xforce.iss.net/static/6016.php
Date Reported: 1/29/01 Vulnerability: winvnc-client-bo Platforms Affected: WinVNC Risk Factor: High Attack Type: Network Based Brief Description: WinVNC client buffer overflow X-Force URL: http://xforce.iss.net/static/6025.php
Date Reported: 1/29/01 Vulnerability: winvnc-server-bo Platforms Affected: WinVNC Risk Factor: High Attack Type: Network Based Brief Description: WinVNC server buffer overflow X-Force URL: http://xforce.iss.net/static/6026.php
Date Reported: 1/29/01 Vulnerability: guestserver-cgi-execute-commands Platforms Affected: Guestserver 4.12 and earlier Risk Factor: High Attack Type: Network Based Brief Description: Guestserver.cgi allows remote command execution X-Force URL: http://xforce.iss.net/static/6027.php
Date Reported: 1/29/01 Vulnerability: bind-tsig-bo Platforms Affected: BIND 8.2.x Risk Factor: Unauthorized Access Attempt Attack Type: Network/Host Based Brief Description: BIND 8.2.x transaction signature (TSIG) buffer overflow X-Force URL: http://xforce.iss.net/static/6015.php
Date Reported: 1/28/01 Vulnerability: hyperseek-cgi-reveal-info Platforms Affected: Hyperseek Search Engine 2000 Risk Factor: Medium Attack Type: Network Based Brief Description: Hyperseek CGI could reveal listings of directories and files X-Force URL: http://xforce.iss.net/static/6012.php
Date Reported: 1/26/01 Vulnerability: newsdaemon-gain-admin-access Platforms Affected: NewsDaemon prior to 0.21b Risk Factor: High Attack Type: Network Based Brief Description: NewsDaemon allows remote users to gain administrative access X-Force URL: http://xforce.iss.net/static/6010.php
Date Reported: 1/26/01 Vulnerability: mars-nwe-format-string Platforms Affected: Mars_nwe 0.99.pl19 Risk Factor: High Attack Type: Network Based Brief Description: Mars_nwe format string X-Force URL: http://xforce.iss.net/static/6019.php
Date Reported: 1/26/01 Vulnerability: mars-nwe-format-string Platforms Affected: Mars_nwe 0.99.pl19 Risk Factor: High Attack Type: Network Based Brief Description: Mars_nwe format string X-Force URL: http://xforce.iss.net/static/6019.php
Date Reported: 1/25/01 Vulnerability: planetintra-pi-bo Platforms Affected: Planet Intra LAN Intranet 2.5 Risk Factor: High Attack Type: Network Based Brief Description: Planet Intra 'pi' binary buffer oveflow X-Force URL: http://xforce.iss.net/static/6002.php
Date Reported: 1/25/01 Vulnerability: borderware-ping-dos Platforms Affected: BorderWare Firewall Server 6.1.2 Risk Factor: High Attack Type: Network Based Brief Description: BorderWare ping denial of service X-Force URL: http://xforce.iss.net/static/6004.php
Date Reported: 1/25/01 Vulnerability: aol-malformed-url-dos Platforms Affected: AOL 5.0 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: AOL malformed URL denial of service X-Force URL: http://xforce.iss.net/static/6009.php
Date Reported: 1/25/01 Vulnerability: mirc-bypass-password Platforms Affected: mIRC Risk Factor: High Attack Type: Host Based Brief Description: mIRC allows malicious user to bypass password X-Force URL: http://xforce.iss.net/static/6013.php
Date Reported: 1/25/01 Vulnerability: netscape-enterprise-revlog-dos Platforms Affected: Netscape Enterprise Server Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Enterprise Server REVLOG denial of service X-Force URL: http://xforce.iss.net/static/6003.php
Date Reported: 1/24/01 Vulnerability: aim-execute-code Platforms Affected: AOL Instant Messenger 4.1 and later Risk Factor: High Attack Type: Host Based Brief Description: AOL Instant Messenger execution of code in modified images X-Force URL: http://xforce.iss.net/static/6005.php
Date Reported: 1/24/01 Vulnerability: netscape-enterprise-list-directories Platforms Affected: Netscape Enterprise Server (3.0, 4.0) Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Netscape Enterprise Server allows remote directory listing X-Force URL: http://xforce.iss.net/static/5997.php
Date Reported: 1/24/01 Vulnerability: winnt-mutex-dos Platforms Affected: Windows NT 4.0 Risk Factor: Medium Attack Type: Host Based Brief Description: Windows NT mutex denial of service X-Force URL: http://xforce.iss.net/static/6006.php
Date Reported: 1/24/01 Vulnerability: jrun-webinf-file-retrieval Platforms Affected: JRun Risk Factor: Medium Attack Type: Network/Host Based Brief Description: JRun malformed URL file retrieval X-Force URL: http://xforce.iss.net/static/6008.php
Date Reported: 1/23/01 Vulnerability: ipfw-bypass-firewall Platforms Affected: FreeBSD (3.x, 4.x) Risk Factor: High Attack Type: Network Based Brief Description: ipfw/ip6fw allows remote attacker to bypass firewall X-Force URL: http://xforce.iss.net/static/5998.php
Date Reported: 1/23/01 Vulnerability: netopia-telnet-dos Platforms Affected: Netopia R-series router Risk Factor: Medium Attack Type: Network Based Brief Description: Netopia R9100 allows remote user to crash the router using telnet X-Force URL: http://xforce.iss.net/static/6001.php
Date Reported: 1/23/01 Vulnerability: wuftp-debug-format-string Platforms Affected: Wu-ftpd Risk Factor: High Attack Type: Network Based Brief Description: Wu-ftpd debug mode format string X-Force URL: http://xforce.iss.net/static/6020.php
Date Reported: 1/23/01 Vulnerability: kde2-kdesu-retrieve-passwords Platforms Affected: Linux: Caldera eDesktop 2.4 Risk Factor: High Attack Type: Host Based Brief Description: KDE2 kdesu program allows users to retrieve passwords X-Force URL: http://xforce.iss.net/static/5995.php
Date Reported: 1/23/01 Vulnerability: easycom-safecom-url-bo Platforms Affected: Easycom/Safecom firmware 404.590 Risk Factor: Medium Attack Type: Network Based Brief Description: Easycom/Safecom print server long URL buffer overflow X-Force URL: http://xforce.iss.net/static/5988.php
Date Reported: 1/23/01 Vulnerability: easycom-safecom-printguide-dos Platforms Affected: Easycom/Safecom firmware 404.590 Risk Factor: Medium Attack Type: Network Based Brief Description: Easycom/Safecom PrintGuide denial of service X-Force URL: http://xforce.iss.net/static/5989.php
Date Reported: 1/23/01 Vulnerability: easycom-safecom-ftp-dos Platforms Affected: Easycom/Safecom firmware 404.590 Risk Factor: Medium Attack Type: Network Based Brief Description: Easycom/Safecom FTP denial of service X-Force URL: http://xforce.iss.net/static/5990.php
Date Reported: 1/23/01 Vulnerability: vnc-weak-authentication Platforms Affected: VNC 3.3.3 and earlier Risk Factor: Medium Attack Type: Network Based Brief Description: VNC weak authentication could allow unauthorized access X-Force URL: http://xforce.iss.net/static/5992.php
Date Reported: 1/23/01 Vulnerability: lotus-domino-smtp-bo Platforms Affected: Lotus Domino 5.0 Risk Factor: High Attack Type: Network/Host Based Brief Description: Lotus Domino SMTP Server policy feature buffer overflow X-Force URL: http://xforce.iss.net/static/5993.php
Date Reported: 1/23/01 Vulnerability: linux-sash-shadow-readable Platforms Affected: sash prior to 3.4-4 Risk Factor: High Attack Type: Host Based Brief Description: Linux sash /etc/shadow directory world-readable X-Force URL: http://xforce.iss.net/static/5994.php
Date Reported: 1/22/01 Vulnerability: powerpoint-execute-code Platforms Affected: Microsoft PowerPoint 2000 Risk Factor: High Attack Type: Host Based Brief Description: PowerPoint could allow code execution on another user's computer X-Force URL: http://xforce.iss.net/static/5996.php
Date Reported: 1/22/01 Vulnerability: icecast-format-string Platforms Affected: Icecast 1.3.8beta2 and prior Risk Factor: High Attack Type: Network/Host Based Brief Description: Icecast format string could allow arbitrary code execution X-Force URL: http://xforce.iss.net/static/5978.php
Date Reported: 1/22/01 Vulnerability: oracle-handlers-directory-traversal Platforms Affected: Oracle 8.1.7 Risk Factor: High Attack Type: Network Based Brief Description: Oracle JSP/SQLJP handlers directory traversal X-Force URL: http://xforce.iss.net/static/5986.php
Date Reported: 1/22/01 Vulnerability: oracle-handlers-execute-jsp Platforms Affected: Oracle 8.1.7 Risk Factor: High Attack Type: Network Based Brief Description: Oracle JSP/SQLJP handlers allows remote attacker to execute .jsp files X-Force URL: http://xforce.iss.net/static/5987.php
Date Reported: 1/22/01 Vulnerability: netscape-enterprise-dot-dos Platforms Affected: Netscape Enterprise Server 4.1 SP5 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Netscape Enterprise Server "/../" denial of service X-Force URL: http://xforce.iss.net/static/5983.php
Date Reported: 1/22/01 Vulnerability: goodtech-ftp-dos Platforms Affected: GoodTech FTP 3.0.1.2.1.0 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: GoodTech FTP server denial of service X-Force URL: http://xforce.iss.net/static/5984.php
Date Reported: 1/22/01 Vulnerability: netscape-fasttrack-cache-dos Platforms Affected: Netscape FastTrack Risk Factor: Low Attack Type: Host Based Brief Description: Netscape FastTrack Server cache denial of service X-Force URL: http://xforce.iss.net/static/5985.php
Date Reported: 1/21/01 Vulnerability: eeye-iris-dos Platforms Affected: Iris Network Analyzer 1.01beta Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Iris denial of service X-Force URL: http://xforce.iss.net/static/5981.php
Date Reported: 1/20/01 Vulnerability: watchguard-firebox-obtain-passphrase Platforms Affected: Firebox II Risk Factor: High Attack Type: Network Based Brief Description: WatchGuard Firebox allows remote user to obtain passphrase X-Force URL: http://xforce.iss.net/static/5979.php
Date Reported: 1/19/01 Vulnerability: fastream-ftp-server-dos Platforms Affected: Fastream FTP++ Simple FTP Server 2.0 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Fastream FTP denial of service X-Force URL: http://xforce.iss.net/static/5976.php
Date Reported: 1/19/01 Vulnerability: fastream-ftp-path-disclosure Platforms Affected: Fastream FTP++ Simple FTP Server 2.0 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Fastream FTP path disclosure X-Force URL: http://xforce.iss.net/static/5977.php
Date Reported: 1/19/01 Vulnerability: localweb2k-directory-traversal Platforms Affected: LocalWEB2000 HTTP Server 1.1.0 Risk Factor: Medium Attack Type: Network Based Brief Description: LocalWEB2000 directory traversal X-Force URL: http://xforce.iss.net/static/5982.php
Date Reported: 1/19/01 Vulnerability: win2k-efs-recover-data Platforms Affected: Windows 2000 Risk Factor: High Attack Type: Host Based Brief Description: Windows 2000 EFS allows local user to recover sensitive data X-Force URL: http://xforce.iss.net/static/5973.php
Date Reported: 1/19/01 Vulnerability: linux-bing-bo Platforms Affected: Linux Risk Factor: High Attack Type: Host Based Brief Description: Bing host name buffer overflow X-Force URL: http://xforce.iss.net/static/6036.php
Date Reported: 1/18/01 Vulnerability: micq-sprintf-remote-bo Platforms Affected: Matt's ICQ Clone 0.4.6 Risk Factor: High Attack Type: Network Based Brief Description: ICQ clone for Linux sprintf() remote buffer overflow X-Force URL: http://xforce.iss.net/static/5962.php
Date Reported: 1/18/01 Vulnerability: mysql-select-bo Platforms Affected: MySQL prior to 3.23.31 Risk Factor: High Attack Type: Host Based Brief Description: MySQL select buffer overflow X-Force URL: http://xforce.iss.net/static/5969.php
Date Reported: 1/18/01 Vulnerability: shoutcast-description-bo Platforms Affected: SHOUTcast DNAS 1.7.1 Risk Factor: Low Attack Type: Network/Host Based Brief Description: Shoutcast Server for Linux description buffer overflow X-Force URL: http://xforce.iss.net/static/5965.php
Date Reported: 1/17/01 Vulnerability: fw1-limited-license-dos Platforms Affected: Check Point Firewall-1 4.1 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: FireWall-1 limited-IP license denial of service X-Force URL: http://xforce.iss.net/static/5966.php
Date Reported: 1/17/01 Vulnerability: fw1-limited-license-dos Platforms Affected: Check Point Firewall-1 4.1 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: FireWall-1 limited-IP license denial of service X-Force URL: http://xforce.iss.net/static/5966.php
Date Reported: 1/17/01 Vulnerability: hp-stm-dos Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP-UX Support Tools Manager denial of service X-Force URL: http://xforce.iss.net/static/5957.php
Date Reported: 1/17/01 Vulnerability: linux-webmin-tmpfiles Platforms Affected: OpenLinux (2.3, 2.4) Risk Factor: High Attack Type: Host Based Brief Description: Webmin use of tmpfiles could allow a local user to overwrite files X-Force URL: http://xforce.iss.net/static/6011.php
Date Reported: 1/17/01 Vulnerability: tinyproxy-remote-bo Platforms Affected: tinyproxy 1.3.2 and 1.3.3 Risk Factor: Medium Attack Type: Network Based Brief Description: Tinyproxy remote buffer overflow X-Force URL: http://xforce.iss.net/static/5954.php
Date Reported: 1/17/01 Vulnerability: postaci-sql-command-injection Platforms Affected: PostACI Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Postaci SQL command injection X-Force URL: http://xforce.iss.net/static/5972.ph p
Date Reported: 1/17/01 Vulnerability: wwwwais-cgi-dos Platforms Affected: wwwwais.c 25 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: wwwwais CGI based program denial of service X-Force URL: http://xforce.iss.net/static/5980.php
Date Reported: 1/17/01 Vulnerability: mime-header-attachment Platforms Affected: MIME 1.0 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: MIME headers could allow spoofed file attachment X-Force URL: http://xforce.iss.net/static/5991.php
Date Reported: 1/16/01 Vulnerability: ssh-rpc-private-key Platforms Affected: SSH Risk Factor: Medium Attack Type: Network/Host Based Brief Description: SSH secure-RPC could generate a passphrase that exposes a user's private key X-Force URL: http://xforce.iss.net/static/5963.php
Date Reported: 1/16/01 Vulnerability: linux-glibc-preload-overwrite Platforms Affected: Linux Risk Factor: Low Attack Type: Host Based Brief Description: Linux glibc LD_PRELOAD file overwrite X-Force URL: http://xforce.iss.net/static/5971.php
Date Reported: 1/16/01 Vulnerability: inn-tmpfile-symlink Platforms Affected: InterNet News (INN) Risk Factor: High Attack Type: Host Based Brief Description: INN tmpfile symbolic link X-Force URL: http://xforce.iss.net/static/5974.php
Date Reported: 1/15/01 Vulnerability: interscan-viruswall-insecure-password Platforms Affected: InterScan VirusWall (3.0.1, 3.6.x) Risk Factor: High Attack Type: Network Based Brief Description: InterScan VirusWall for Unix password change insecure X-Force URL: http://xforce.iss.net/static/5944.php
Date Reported: 1/15/01 Vulnerability: interscan-viruswall-weak-authentication Platforms Affected: InterScan VirusWall (3.0.1, 3.6.x) Risk Factor: Medium Attack Type: Network Based Brief Description: InterScan VirusWall for Unix uses weak authentication X-Force URL: http://xforce.iss.net/static/5946.php
Date Reported: 1/15/01 Vulnerability: ie-mshtml-dos Platforms Affected: Internet Explorer 4.0 and later Risk Factor: Medium Attack Type: Network Based Brief Description: Internet Explorer mshtml.dll denial of service X-Force URL: http://xforce.iss.net/static/5938.php
Date Reported: 1/15/01 Vulnerability: dhcp-format-string Platforms Affected: Caldera OpenLinux Desktop (2.3, 2.3.1, 2.4) Risk Factor: High Attack Type: Network Based Brief Description: Caldera DHCP format string X-Force URL: http://xforce.iss.net/static/5953.php
Date Reported: 1/15/01 Vulnerability: win-mediaplayer-arbitrary-code Platforms Affected: Windows Media Player 7.0 Risk Factor: High Attack Type: Network/Host Based Brief Description: Windows Media Player skins can be used execute arbitrary code X-Force URL: http://xforce.iss.net/static/5937.php
Date Reported: 1/15/01 Vulnerability: veritas-backupexec-dos Platforms Affected: Backup Exec 4.5 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Veritas Backup Exec denial of service X-Force URL: http://xforce.iss.net/static/5941.php
Date Reported: 1/15/01 Vulnerability: interscan-viruswall-symlink Platforms Affected: InterScan VirusWall (3.0.1, 3.6.x) Risk Factor: High Attack Type: Host Based Brief Description: InterScan VirusWall for Unix symbolic link X-Force URL: http://xforce.iss.net/static/5947.php
Date Reported: 1/15/01 Vulnerability: omnihttpd-statsconfig-corrupt-files Platforms Affected: OmniHTTPd Risk Factor: Medium Attack Type: Network Based Brief Description: OmniHTTPd statsconfig.pl corrupt any file on the system X-Force URL: http://xforce.iss.net/static/5955.php
Date Reported: 1/15/01 Vulnerability: omnihttpd-statsconfig-execute-code Platforms Affected: OmniHTTPd Risk Factor: High Attack Type: Network Based Brief Description: OmniHTTPD statsconfig.pl allows code execution X-Force URL: http://xforce.iss.net/static/5956.php
Date Reported: 1/15/01 Vulnerability: icmp-pmtu-dos Platforms Affected: Linux BSD Risk Factor: Medium Attack Type: Network Based Brief Description: ICMP PMTU denial of service X-Force URL: http://xforce.iss.net/static/5975.php
Date Reported: 1/15/01 Vulnerability: icmp-pmtu-dos Platforms Affected: Linux BSD Risk Factor: Medium Attack Type: Network Based Brief Description: ICMP PMTU denial of service X-Force URL: http://xforce.iss.net/static/5975.php
Date Reported: 1/14/01 Vulnerability: splitvt-perserc-format-string Platforms Affected: splitvt 1.6.4 and earlier Risk Factor: High Attack Type: Host Based Brief Description: Splitvt perserc.c module format string X-Force URL: http://xforce.iss.net/static/5948.php
Date Reported: 1/14/01 Vulnerability: splitvt-perserc-format-string Platforms Affected: splitvt 1.6.4 and earlier Risk Factor: High Attack Type: Host Based Brief Description: Splitvt perserc.c module format string X-Force URL: http://xforce.iss.net/static/5948.php
Date Reported: 1/14/01 Vulnerability: flash-module-bo Platforms Affected: Oliver Debon Flash plugin 0.4.9 and earlier Risk Factor: Medium Attack Type: Network Based Brief Description: Flash browser module buffer overflow X-Force URL: http://xforce.iss.net/static/5952.php
Date Reported: 1/13/01 Vulnerability: rctab-elevate-privileges Platforms Affected: Linux SuSE Risk Factor: Medium Attack Type: Host Based Brief Description: rctab in SuSE Linux could allow privilege elevation X-Force URL: http://xforce.iss.net/static/5945.php
Date Reported: 1/12/01 Vulnerability: ultraboard-cgi-perm Platforms Affected: UltraBoard 2000B Risk Factor: Medium Attack Type: Network/Host Based Brief Description: UltraBoard CGI weak permissions X-Force URL: http://xforce.iss.net/static/5931.php
Date Reported: 1/12/01 Vulnerability: compaq-web-management-bo Platforms Affected: Compaq Web-Based Management Risk Factor: High Attack Type: Network Based Brief Description: Compaq Web-Based Management program buffer overflow X-Force URL: http://xforce.iss.net/static/5935.php
Date Reported: 1/12/01 Vulnerability: php-htaccess-unauth-access Platforms Affected: PHP (4.0.0, 4.0.4) Risk Factor: Low Attack Type: Network Based Brief Description: PHP could allow unauthorized access to restricted files X-Force URL: http://xforce.iss.net/static/5940.php
Date Reported: 1/12/01 Vulnerability: basilix-webmail-retrieve-files Platforms Affected: Basilix Webmail 0.9.7beta Risk Factor: Low Attack Type: Network Based Brief Description: Basilix Webmail System allows unauthorized users to retrieve files X-Force URL: http://xforce.iss.net/static/5934.php
Date Reported: 1/12/01 Vulnerability: solaris-arp-bo Platforms Affected: Solaris Risk Factor: High Attack Type: Host Based Brief Description: Solaris arp buffer overflow X-Force URL: http://xforce.iss.net/static/5928.php
Date Reported: 1/12/01 Vulnerability: php-view-source-code Platforms Affected: PHP (4.0.0, 4.0.4) Risk Factor: Low Attack Type: Network Based Brief Description: PHP could allow remote viewing of source code X-Force URL: http://xforce.iss.net/static/5939.php
Date Reported: 1/11/01 Vulnerability: wec-ntlm-authentication Platforms Affected: Windows 2000 Microsoft Office 2000 Windows ME Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Web Extender Client (WEC) NTLM authentication X-Force URL: http://xforce.iss.net/static/5920.php
Date Reported: 1/11/01 Vulnerability: spamcop-url-seq-predict Platforms Affected: SpamCop Risk Factor: Low Attack Type: Network/Host Based Brief Description: SpamCop URL number increment sequence prediction X-Force URL: http://xforce.iss.net/static/5933.php
Date Reported: 1/10/01 Vulnerability: linux-wuftpd-privatepw-symlink Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux wu-ftpd privatepw symbolic link X-Force URL: http://xforce.iss.net/static/5915.php
Date Reported: 1/10/01 Vulnerability: rdist-symlink Platforms Affected: rdist Risk Factor: High Attack Type: Host Based Brief Description: rdist symbolic link X-Force URL: http://xforce.iss.net/static/5925.php
Date Reported: 1/10/01 Vulnerability: squid-email-symlink Platforms Affected: squid Risk Factor: High Attack Type: Host Based Brief Description: squid email notification symbolic link X-Force URL: http://xforce.iss.net/static/5921.php
Date Reported: 1/10/01 Vulnerability: linux-diffutils-sdiff-symlimk Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux diffutils sdiff symbolic link X-Force URL: http://xforce.iss.net/static/5914.php
Date Reported: 1/10/01 Vulnerability: tcpdump-arpwatch-symlink Platforms Affected: arpwatch Risk Factor: High Attack Type: Host Based Brief Description: tcpdump arpwatch symbolic link X-Force URL: http://xforce.iss.net/static/5922.php
Date Reported: 1/10/01 Vulnerability: linuxconf-vpop3d-symlink Platforms Affected: linuxconf Risk Factor: Medium Attack Type: Host Based Brief Description: Linuxconf vpop3d symbolic link X-Force URL: http://xforce.iss.net/static/5923.php
Date Reported: 1/10/01 Vulnerability: shadow-utils-useradd-symlink Platforms Affected: shadow-utils Risk Factor: High Attack Type: Host Based Brief Description: shadow-utils useradd symbolic link X-Force URL: http://xforce.iss.net/static/5927.php
Date Reported: 1/10/01 Vulnerability: linux-glibc-read-files Platforms Affected: Linux glibc Risk Factor: Medium Attack Type: Host Based Brief Description: Linux glibc library can allow users to read restricted files X-Force URL: http://xforce.iss.net/static/5907.php
Date Reported: 1/10/01 Vulnerability: gettyps-symlink Platforms Affected: gettyps Risk Factor: High Attack Type: Host Based Brief Description: getty_ps symbolic link X-Force URL: http://xforce.iss.net/static/5924.php
Date Reported: 1/10/01 Vulnerability: linux-gpm-symlink Platforms Affected: gpm Risk Factor: Medium Attack Type: Host Based Brief Description: Linux gpm symbolic link attack X-Force URL: http://xforce.iss.net/static/5917.php
Date Reported: 1/10/01 Vulnerability: linux-mgetty-symlink Platforms Affected: mgetty Risk Factor: Medium Attack Type: Host Based Brief Description: Linux mgetty symbolic link attack X-Force URL: http://xforce.iss.net/static/5918.php
Date Reported: 1/10/01 Vulnerability: linux-apache-symlink Platforms Affected: Apache Risk Factor: Medium Attack Type: Host Based Brief Description: Linux Apache symbolic link X-Force URL: http://xforce.iss.net/static/5926.php
Date Reported: 1/10/01 Vulnerability: linux-inn-symlink Platforms Affected: inn Risk Factor: Medium Attack Type: Host Based Brief Description: Linux INN tmp directory symbolic link X-Force URL: http://xforce.iss.net/static/5916.php
Date Reported: 1/10/01 Vulnerability: conferenceroom-developer-dos Platforms Affected: ConferenceRoom Professional Edition Risk Factor: Medium Attack Type: Network/Host Based Brief Description: ConferenceRoom Developer Edition denial of service X-Force URL: http://xforce.iss.net/static/5909.php
Date Reported: 1/9/01 Vulnerability: oracle-xsql-execute-code Platforms Affected: Oracle 8.1.7 Risk Factor: High Attack Type: Network Based Brief Description: Oracle XSQL servlet and xml-stylesheet allows code execution on server X-Force URL: http://xforce.iss.net/static/5905.php
Date Reported: 1/9/01 Vulnerability: netscreen-webui-bo Platforms Affected: NetScreen Risk Factor: Medium Attack Type: Network Based Brief Description: NetScreen Firewall WebUI buffer overflow X-Force URL: http://xforce.iss.net/static/5908.php
Date Reported: 1/9/01 Vulnerability: suse-reiserfs-long-filenames Platforms Affected: SuSE 7.0 Risk Factor: High Attack Type: Host Based Brief Description: SuSE reiserfs long file name denial of service X-Force URL: http://xforce.iss.net/static/5910.php
Date Reported: 1/9/01 Vulnerability: interbase-backdoor-account Platforms Affected: InterBase 6.01 and earlier Risk Factor: High Attack Type: Network/Host Based Brief Description: InterBase built-in backdoor account X-Force URL: http://xforce.iss.net/static/5911.php
Date Reported: 1/9/01 Vulnerability: interbase-hidden-function-dos Platforms Affected: InterBase 6.01 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: InterBase hidden function denial of service X-Force URL: http://xforce.iss.net/static/5912.php
Date Reported: 1/9/01 Vulnerability: brickserver-thttpd-dos Platforms Affected: BRICKServer Small Business Risk Factor: Medium Attack Type: Network Based Brief Description: BRICKServer thttpd denial of service X-Force URL: http://xforce.iss.net/static/5919.php
Date Reported: 1/9/01 Vulnerability: solaris-exrecover-bo Platforms Affected: Solaris (2.4, 2.5, 2.5.1, 2.6) Risk Factor: Medium Attack Type: Host Based Brief Description: Solaris exrecover buffer overflow X-Force URL: http://xforce.iss.net/static/5913.php
Date Reported: 1/9/01 Vulnerability: hp-inetd-swait-dos Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP-UX inetd swait denial of service X-Force URL: http://xforce.iss.net/static/5904.php
Date Reported: 1/8/01 Vulnerability: microsoft-iis-read-files Platforms Affected: IIS (4.0, 5.0) Risk Factor: Medium Attack Type: Network Based Brief Description: Microsoft IIS 5.0 allows the viewing of files through malformed URL X-Force URL: http://xforce.iss.net/static/5903.php
Date Reported: 1/8/01 Vulnerability: ibm-websphere-dos Platforms Affected: IBM Websphere 3.52 IBM HTTP Server 1.3.12 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: IBM WebSphere denial of service X-Force URL: http://xforce.iss.net/static/5900.php
Date Reported: 1/8/01 Vulnerability: storagesoft-imagecast-dos Platforms Affected: ImageCast 4.1 Risk Factor: Medium Attack Type: Network/Host Based Brief Description: StorageSoft ImageCast denial of service X-Force URL: http://xforce.iss.net/static/5901.php
Date Reported: 1/8/01 Vulnerability: nai-pgp-replace-keys Platforms Affected: PGP 7.0 Risk Factor: Medium Attack Type: Host Based Brief Description: PGP users may replace signed exported key blocks with arbitrary keys X-Force URL: http://xforce.iss.net/static/5902.php
Date Reported: 1/7/01 Vulnerability: http-cgi-bbs-forum Platforms Affected: WebBBS 1.0 Risk Factor: High Attack Type: Network Based Brief Description: bbs_forum.cgi allows remote command execution X-Force URL: http://xforce.iss.net/static/5906.php
Date Reported: 1/5/01 Vulnerability: lotus-domino-directory-traversal Platforms Affected: Lotus Domino 5.0.x Risk Factor: Medium Attack Type: Network Based Brief Description: Lotus Domino 5.0.x .nsf, .box, and .ns4 directory traversal X-Force URL: http://xforce.iss.net/static/5899.php
Date Reported: 1/5/01 Vulnerability: http-cgi-fastgraf Platforms Affected: FASTGRAF Risk Factor: High Attack Type: Network Based Brief Description: Fastgraf CGI scripts allow remote command execution X-Force URL: http://xforce.iss.net/static/5897.php
Date Reported: 1/4/01 Vulnerability: newsdesk-cgi-read-files Platforms Affected: Newsdesk 1.2 Risk Factor: High Attack Type: Network Based Brief Description: Newsdesk.cgi allows read access to files X-Force URL: http://xforce.iss.net/static/5898.php
Date Reported: 1/1/01 Vulnerability: gtk-module-execute-code Platforms Affected: GTK+ 1.2.8 and earlier Risk Factor: High Attack Type: Host Based Brief Description: GTK+ arbitrary code execution using custom loadable module X-Force URL: http://xforce.iss.net/static/5832.php
Date Reported: 1/1/01 Vulnerability: linux-tty-writable-dos Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux writable TTY denial of service X-Force URL: http://xforce.iss.net/static/5896.php
Risk Factor Key:
High Any vulnerability that provides an attacker with immediate
access into a machine, gains superuser access, or bypasses
a firewall. Example: A vulnerable Sendmail 8.6.5 version
that allows an intruder to execute commands on mail
server.
Medium Any vulnerability that provides information that has a
high potential of giving system access to an intruder.
Example: A misconfigured TFTP or vulnerable NIS server
that allows an intruder to get the password file that
could contain an account with a guessable password.
Low Any vulnerability that provides information that
potentially could lead to a compromise. Example: A
finger that allows an intruder to find out who is online
and potential accounts to attempt to crack passwords
via brute force methods.
Additional Information
This document is available at http://xforce.iss.net/alerts/advisennn.php. To receive these Alerts and Advisories: - - Subscribe to the Alert mailing list from http://xforce.iss.net/maillists/index.php - - Or send an email to majordomo@iss.net, and within the body of the message type: 'subscribe alert' (without the quotes).
About Internet Security Systems (ISS) Internet Security Systems, Inc. (ISS) (NASDAQ: ISSX) is the leading global provider of security management solutions for the Internet. By combining best of breed products, security management services, aggressive research and development, and comprehensive educational and consulting services, ISS is the trusted security advisor for thousands of organizations around the world looking to protect their mission critical information and networks.
Copyright (c) 2001 by Internet Security Systems, Inc.
Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission.
Disclaimer
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.
X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server.
Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc.
-----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv
iQCVAwUBOogB2jRfJiV99eG9AQESogP9HsIDfUmYkJuWUmNqPhb22a6CVpi/TiG9 7mvhdGc3ySS6LqrvTZgXrBzAcxFlHrdTSmNka8yGiLvYAb0lnghFRZ2OxxRfK11m AV9VS9/Yty/Qk8BnA/7tx4DIcM4Nhry1kTqTbDkpbcfXOb2LI2WUGnMHF/xkc1ge 3mV5zJXCUM4= =ClrQ -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200103-0098", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "firewall-1", "scope": "eq", "trust": 1.6, "vendor": "checkpoint", "version": "4.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ssh security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "daemonnews", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "immunix", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandrakesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "getty ps", "version": null }, { "model": "vpn-1/firewall-1", "scope": "lte", "trust": 0.8, "vendor": "check point", "version": "4.1sp3" }, { "model": "immunix os -beta", "scope": "eq", "trust": 0.3, "vendor": "wirex", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "7.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "7.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "7.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "6.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "6.0" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.30" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.29" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.28" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.27" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "ne", "trust": 0.3, "vendor": "check", "version": "4.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#850440" }, { "db": "CERT/CC", "id": "VU#987632" }, { "db": "CERT/CC", "id": "VU#342768" }, { "db": "BID", "id": "2194" }, { "db": "BID", "id": "2222" }, { "db": "BID", "id": "2238" }, { "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "db": "CNNVD", "id": "CNNVD-200103-081" }, { "db": "NVD", "id": "CVE-2001-0182" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:firewall-1:4.1:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2001-0182" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability was first announced by Greg KH \u003cgreg@wirex.com\u003e on January 10, 2001 via Bugtraq.", "sources": [ { "db": "BID", "id": "2194" } ], "trust": 0.3 }, "cve": "CVE-2001-0182", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2001-0182", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-3004", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2001-0182", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#850440", "trust": 0.8, "value": "1.89" }, { "author": "CARNEGIE MELLON", "id": "VU#987632", "trust": 0.8, "value": "3.19" }, { "author": "CARNEGIE MELLON", "id": "VU#342768", "trust": 0.8, "value": "5.63" }, { "author": "CNNVD", "id": "CNNVD-200103-081", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-3004", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2001-0182", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#850440" }, { "db": "CERT/CC", "id": "VU#987632" }, { "db": "CERT/CC", "id": "VU#342768" }, { "db": "VULHUB", "id": "VHN-3004" }, { "db": "VULMON", "id": "CVE-2001-0182" }, { "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "db": "CNNVD", "id": "CNNVD-200103-081" }, { "db": "NVD", "id": "CVE-2001-0182" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources. The secure-RPC feature of the SSH1 client in Solaris sometimes encrypts the SSH private key file with a weak passphrase, which can be determined by an attacker and used to recover the SSH private keys. Other versions of the SSH client running on non-Solaris platforms are not affected by this vulnerability. NewsDaemon prior to version 0.21b contains a vulnerability allowing remote attackers to gain administrative access to the web site. getty_ps is an open-source software package designed to support logons to the console and terminals. Some implementations create temporary files insecurely with predictable names, leading to corruption of arbitrary files via symbolic link attack. CPU There is a vulnerability that consumes a large amount of resources.System disrupts service operation (DoS) It may be in a state. getty_ps is an open source, freely available, publicly maintained software package shipped with many distributions of Linux. \nA problem in the getty_ps software package could make it vulnerable to a symbolic link attack. The problem occurs in the creation and handling of files in the /tmp directory by the getty_ps program. Under certain circumstances, getty_ps will create files in the /tmp filesystem in an insecure manner. The program uses a naming scheme that could make it possible to guess the filename of future files in the /tmp directory, and does not check for the existance of the file before attempting to create it. A malicious user could use this vulnerability to overwrite or append to and corrupt system files. SSH is a package designed to encrypt traffic between two end points using the IETF specified SSH protocol. The SSH1 package is distributed and maintained by SSH Communications Security. \nA problem exists which could allow the discovery of the secret key used to encrypt traffic on the local host. When using SUN-DES-1 to share keys with other hosts on the network to facilitate secure communication via protocols such as NFS and NIS+, the keys are shared between hosts using the private key of the user and a cryptographic algorithm to secure the contents of the key, which is stored on the NIS+ primary. The problem occurs when the key is encrypted with the SUN-DES-1 magic phrase prior to having done a keylogin (the keyserv does not have the users DH private key). A design flaw in the software that shares the key with the NIS+ master will inconsistently return the correct value for an attempted keyshare that has failed. A step in the private key encryption process is skipped, and the users private key is then encrypted only with the public key of the target server and the SUN-DES-1 magic phrase, a phrase that is guessable due to the way it is generated. A user from the same host can then execute a function that returns another users magic phrase, and use this to decrypt the private key of the victim. This makes it possible for a user with malicious intent to gain knowledge of a users secret key, and decrypt sensitive traffic between two hosts, with the possibility of gaining access and elevated privileges on the hosts and/or NIS+ domain. This reportedly affects the SSH2 series of the software package. Firewall-1 is a firewall software package that provides many advanced features such as content filtering and network address translation. It is distributed by Check Point Software Technologies, and designed to run on various systems such as Sparc/Solaris or the Nokia Firewall Modules. \nA problem with the license manager used with the Firewall-1 package could allow a Denial of Service. The problem manifests itself when the internal interface receives a large number of packets that are source routed and containing ficticious (or even valid) addresses. With each error message generated, the load on the Firewall system CPU raises. \nCheck Point Software has acknowledged this vulnerability and a workaround is available. For the workaround, see the solution section of this vulnerability database entry. This issue will be resolved in the next service pack. There is a vulnerability in FireWall-1 version 4.1 with limited-IP license. This vulnerability can cause console congestion warning messages and CPU resource consumption. \nTO UNSUBSCRIBE: email \"unsubscribe alert\" in the body of your message to\nmajordomo@iss.net Contact alert-owner@iss.net for help with any problems!\n---------------------------------------------------------------------------\n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nInternet Security Systems Security Alert Summary\nFebruary 6, 2001\nVolume 6 Number 3\n\nX-Force Vulnerability and Threat Database: http://xforce.iss.net/ To\nreceive these Alert Summaries as well as other Alerts and Advisories,\nsubscribe to the Internet Security Systems Alert mailing list at:\nhttp://xforce.iss.net/maillists/index.php\n\n_____\n\nContents\n\n120 Reported Vulnerabilities\n\nRisk Factor Key\n\n_____\n\nDate Reported: 1/31/01\nVulnerability: win2k-rdp-dos\nPlatforms Affected: Windows 2000\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Windows 2000 Server RDP denial of service\nX-Force URL: http://xforce.iss.net/static/6035.php\n\n_____\n\nDate Reported: 1/31/01\nVulnerability: cisco-ccs-file-access\nPlatforms Affected: Cisco Content Services Switch\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Cisco CCS command line interface could allow read access to files and directories\nX-Force URL: http://xforce.iss.net/static/6031.php\n\n_____\n\nDate Reported: 1/31/01\nVulnerability: quicktime-embedded-tag-bo\nPlatforms Affected: Quicktime 4.1.2\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: QuickTime Player EMBED tag buffer overflow\nX-Force URL: http://xforce.iss.net/static/6040.php\n\n_____\n\nDate Reported: 1/31/01\nVulnerability: solaris-ximp40-bo\nPlatforms Affected: Solaris (7, 8)\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Solaris \"ximp40\" shared library buffer overflow\nX-Force URL: http://xforce.iss.net/static/6039.php\n\n_____\n\nDate Reported: 1/31/01\nVulnerability: cisco-ccs-cli-dos\nPlatforms Affected: Cisco Content Services Switch\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Cisco CCS command line interface denial of service\nX-Force URL: http://xforce.iss.net/static/6030.php\n\n_____\n\nDate Reported: 1/30/01\nVulnerability: slimserve-httpd-dos\nPlatforms Affected: SlimServe 1.0\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: SlimServe HTTPd denial of service\nX-Force URL: http://xforce.iss.net/static/6028.php\n\n_____\n\nDate Reported: 1/30/01\nVulnerability: crazywwwboard-qdecoder-bo\nPlatforms Affected: CrazyWWWBoard prior to 2000LEp5-1\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: CrazyWWWBoard qDecoder buffer overflow\nX-Force URL: http://xforce.iss.net/static/6033.php\n\n_____\n\nDate Reported: 1/30/01\nVulnerability: virusbuster-mua-bo\nPlatforms Affected:\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Virus Buster 2001 Mail User Agent (MUA) buffer overflow\nX-Force URL: http://xforce.iss.net/static/6034.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: iis-isapi-obtain-code\nPlatforms Affected: IIS (4.0, 5.0)\nRisk Factor: Low\nAttack Type: Network/Host Based\nBrief Description: IIS allows remote attacker to obtain code fragments using .htr ISAPI extensions\nX-Force URL: http://xforce.iss.net/static/6032.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: bind-inverse-query-disclosure\nPlatforms Affected: Bind (4.x, 8.2.x)\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: BIND 4.x and 8.2.x exposes environment variables\nX-Force URL: http://xforce.iss.net/static/6018.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: hp-man-dos\nPlatforms Affected: HPUX\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: HP man command denial of service\nX-Force URL: http://xforce.iss.net/static/6014.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: sort-temp-file-abort\nPlatforms Affected: FreeBSD\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Sort temporary files denial of service\nX-Force URL: http://xforce.iss.net/static/6038.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: bind-complain-format-string\nPlatforms Affected: BIND 4.x\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: BIND 4.x nslookupComplain() format string\nX-Force URL: http://xforce.iss.net/static/6017.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: bind-complain-bo\nPlatforms Affected: BIND 4.x\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: BIND 4.x nslookupComplain() buffer overflow\nX-Force URL: http://xforce.iss.net/static/6016.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: winvnc-client-bo\nPlatforms Affected: WinVNC\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: WinVNC client buffer overflow\nX-Force URL: http://xforce.iss.net/static/6025.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: winvnc-server-bo\nPlatforms Affected: WinVNC\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: WinVNC server buffer overflow\nX-Force URL: http://xforce.iss.net/static/6026.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: guestserver-cgi-execute-commands\nPlatforms Affected: Guestserver 4.12 and earlier\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Guestserver.cgi allows remote command execution\nX-Force URL: http://xforce.iss.net/static/6027.php\n\n_____\n\nDate Reported: 1/29/01\nVulnerability: bind-tsig-bo\nPlatforms Affected: BIND 8.2.x\nRisk Factor: Unauthorized Access Attempt\nAttack Type: Network/Host Based\nBrief Description: BIND 8.2.x transaction signature (TSIG) buffer overflow\nX-Force URL: http://xforce.iss.net/static/6015.php\n\n_____\n\nDate Reported: 1/28/01\nVulnerability: hyperseek-cgi-reveal-info\nPlatforms Affected: Hyperseek Search Engine 2000\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Hyperseek CGI could reveal listings of directories and files\nX-Force URL: http://xforce.iss.net/static/6012.php\n\n_____\n\nDate Reported: 1/26/01\nVulnerability: newsdaemon-gain-admin-access\nPlatforms Affected: NewsDaemon prior to 0.21b\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: NewsDaemon allows remote users to gain administrative access\nX-Force URL: http://xforce.iss.net/static/6010.php\n\n_____\n\nDate Reported: 1/26/01\nVulnerability: mars-nwe-format-string\nPlatforms Affected: Mars_nwe 0.99.pl19\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Mars_nwe format string\nX-Force URL: http://xforce.iss.net/static/6019.php\n\n_____\n\nDate Reported: 1/26/01\nVulnerability: mars-nwe-format-string\nPlatforms Affected: Mars_nwe 0.99.pl19\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Mars_nwe format string\nX-Force URL: http://xforce.iss.net/static/6019.php\n\n_____\n\nDate Reported: 1/25/01\nVulnerability: planetintra-pi-bo\nPlatforms Affected: Planet Intra LAN Intranet 2.5\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Planet Intra \u0027pi\u0027 binary buffer oveflow\nX-Force URL: http://xforce.iss.net/static/6002.php\n\n_____\n\nDate Reported: 1/25/01\nVulnerability: borderware-ping-dos\nPlatforms Affected: BorderWare Firewall Server 6.1.2\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: BorderWare ping denial of service\nX-Force URL: http://xforce.iss.net/static/6004.php\n\n_____\n\nDate Reported: 1/25/01\nVulnerability: aol-malformed-url-dos\nPlatforms Affected: AOL 5.0\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: AOL malformed URL denial of service\nX-Force URL: http://xforce.iss.net/static/6009.php\n\n_____\n\nDate Reported: 1/25/01\nVulnerability: mirc-bypass-password\nPlatforms Affected: mIRC\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: mIRC allows malicious user to bypass password\nX-Force URL: http://xforce.iss.net/static/6013.php\n\n_____\n\nDate Reported: 1/25/01\nVulnerability: netscape-enterprise-revlog-dos\nPlatforms Affected: Netscape Enterprise Server\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Netscape Enterprise Server REVLOG denial of service\nX-Force URL: http://xforce.iss.net/static/6003.php\n\n_____\n\nDate Reported: 1/24/01\nVulnerability: aim-execute-code\nPlatforms Affected: AOL Instant Messenger 4.1 and later\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: AOL Instant Messenger execution of code in modified images\nX-Force URL: http://xforce.iss.net/static/6005.php\n\n_____\n\nDate Reported: 1/24/01\nVulnerability: netscape-enterprise-list-directories\nPlatforms Affected: Netscape Enterprise Server (3.0, 4.0)\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Netscape Enterprise Server allows remote directory listing\nX-Force URL: http://xforce.iss.net/static/5997.php\n\n_____\n\nDate Reported: 1/24/01\nVulnerability: winnt-mutex-dos\nPlatforms Affected: Windows NT 4.0\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Windows NT mutex denial of service\nX-Force URL: http://xforce.iss.net/static/6006.php\n\n_____\n\nDate Reported: 1/24/01\nVulnerability: jrun-webinf-file-retrieval\nPlatforms Affected: JRun\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: JRun malformed URL file retrieval\nX-Force URL: http://xforce.iss.net/static/6008.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: ipfw-bypass-firewall\nPlatforms Affected: FreeBSD (3.x, 4.x)\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: ipfw/ip6fw allows remote attacker to bypass firewall\nX-Force URL: http://xforce.iss.net/static/5998.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: netopia-telnet-dos\nPlatforms Affected: Netopia R-series router\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Netopia R9100 allows remote user to crash the router using telnet\nX-Force URL: http://xforce.iss.net/static/6001.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: wuftp-debug-format-string\nPlatforms Affected: Wu-ftpd\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Wu-ftpd debug mode format string\nX-Force URL: http://xforce.iss.net/static/6020.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: kde2-kdesu-retrieve-passwords\nPlatforms Affected: Linux: Caldera eDesktop 2.4\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: KDE2 kdesu program allows users to retrieve passwords\nX-Force URL: http://xforce.iss.net/static/5995.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: easycom-safecom-url-bo\nPlatforms Affected: Easycom/Safecom firmware 404.590\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Easycom/Safecom print server long URL buffer overflow\nX-Force URL: http://xforce.iss.net/static/5988.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: easycom-safecom-printguide-dos\nPlatforms Affected: Easycom/Safecom firmware 404.590\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Easycom/Safecom PrintGuide denial of service\nX-Force URL: http://xforce.iss.net/static/5989.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: easycom-safecom-ftp-dos\nPlatforms Affected: Easycom/Safecom firmware 404.590\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Easycom/Safecom FTP denial of service\nX-Force URL: http://xforce.iss.net/static/5990.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: vnc-weak-authentication\nPlatforms Affected: VNC 3.3.3 and earlier\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: VNC weak authentication could allow unauthorized access\nX-Force URL: http://xforce.iss.net/static/5992.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: lotus-domino-smtp-bo\nPlatforms Affected: Lotus Domino 5.0\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Lotus Domino SMTP Server policy feature buffer overflow\nX-Force URL: http://xforce.iss.net/static/5993.php\n\n_____\n\nDate Reported: 1/23/01\nVulnerability: linux-sash-shadow-readable\nPlatforms Affected: sash prior to 3.4-4\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Linux sash /etc/shadow directory world-readable\nX-Force URL: http://xforce.iss.net/static/5994.php\n\n_____\n\nDate Reported: 1/22/01\nVulnerability: powerpoint-execute-code\nPlatforms Affected: Microsoft PowerPoint 2000\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: PowerPoint could allow code execution on another user\u0027s computer\nX-Force URL: http://xforce.iss.net/static/5996.php\n\n_____\n\nDate Reported: 1/22/01\nVulnerability: icecast-format-string\nPlatforms Affected: Icecast 1.3.8beta2 and prior\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Icecast format string could allow arbitrary code execution\nX-Force URL: http://xforce.iss.net/static/5978.php\n\n_____\n\nDate Reported: 1/22/01\nVulnerability: oracle-handlers-directory-traversal\nPlatforms Affected: Oracle 8.1.7\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Oracle JSP/SQLJP handlers directory traversal\nX-Force URL: http://xforce.iss.net/static/5986.php\n\n_____\n\nDate Reported: 1/22/01\nVulnerability: oracle-handlers-execute-jsp\nPlatforms Affected: Oracle 8.1.7\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Oracle JSP/SQLJP handlers allows remote attacker to execute .jsp files\nX-Force URL: http://xforce.iss.net/static/5987.php\n\n_____\n\nDate Reported: 1/22/01\nVulnerability: netscape-enterprise-dot-dos\nPlatforms Affected: Netscape Enterprise Server 4.1 SP5\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Netscape Enterprise Server \"/../\" denial of service\nX-Force URL: http://xforce.iss.net/static/5983.php\n\n_____\n\nDate Reported: 1/22/01\nVulnerability: goodtech-ftp-dos\nPlatforms Affected: GoodTech FTP 3.0.1.2.1.0\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: GoodTech FTP server denial of service\nX-Force URL: http://xforce.iss.net/static/5984.php\n\n_____\n\nDate Reported: 1/22/01\nVulnerability: netscape-fasttrack-cache-dos\nPlatforms Affected: Netscape FastTrack\nRisk Factor: Low\nAttack Type: Host Based\nBrief Description: Netscape FastTrack Server cache denial of service\nX-Force URL: http://xforce.iss.net/static/5985.php\n\n_____\n\nDate Reported: 1/21/01\nVulnerability: eeye-iris-dos\nPlatforms Affected: Iris Network Analyzer 1.01beta\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Iris denial of service\nX-Force URL: http://xforce.iss.net/static/5981.php\n\n_____\n\nDate Reported: 1/20/01\nVulnerability: watchguard-firebox-obtain-passphrase\nPlatforms Affected: Firebox II\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: WatchGuard Firebox allows remote user to obtain passphrase\nX-Force URL: http://xforce.iss.net/static/5979.php\n\n_____\n\nDate Reported: 1/19/01\nVulnerability: fastream-ftp-server-dos\nPlatforms Affected: Fastream FTP++ Simple FTP Server 2.0\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Fastream FTP denial of service\nX-Force URL: http://xforce.iss.net/static/5976.php\n\n_____\n\nDate Reported: 1/19/01\nVulnerability: fastream-ftp-path-disclosure\nPlatforms Affected: Fastream FTP++ Simple FTP Server 2.0\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Fastream FTP path disclosure\nX-Force URL: http://xforce.iss.net/static/5977.php\n\n_____\n\nDate Reported: 1/19/01\nVulnerability: localweb2k-directory-traversal\nPlatforms Affected: LocalWEB2000 HTTP Server 1.1.0\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: LocalWEB2000 directory traversal\nX-Force URL: http://xforce.iss.net/static/5982.php\n\n_____\n\nDate Reported: 1/19/01\nVulnerability: win2k-efs-recover-data\nPlatforms Affected: Windows 2000\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Windows 2000 EFS allows local user to recover sensitive data\nX-Force URL: http://xforce.iss.net/static/5973.php\n\n_____\n\nDate Reported: 1/19/01\nVulnerability: linux-bing-bo\nPlatforms Affected: Linux\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Bing host name buffer overflow\nX-Force URL: http://xforce.iss.net/static/6036.php\n\n_____\n\nDate Reported: 1/18/01\nVulnerability: micq-sprintf-remote-bo\nPlatforms Affected: Matt\u0027s ICQ Clone 0.4.6\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: ICQ clone for Linux sprintf() remote buffer overflow\nX-Force URL: http://xforce.iss.net/static/5962.php\n\n_____\n\nDate Reported: 1/18/01\nVulnerability: mysql-select-bo\nPlatforms Affected: MySQL prior to 3.23.31\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: MySQL select buffer overflow\nX-Force URL: http://xforce.iss.net/static/5969.php\n\n_____\n\nDate Reported: 1/18/01\nVulnerability: shoutcast-description-bo\nPlatforms Affected: SHOUTcast DNAS 1.7.1\nRisk Factor: Low\nAttack Type: Network/Host Based\nBrief Description: Shoutcast Server for Linux description buffer overflow\nX-Force URL: http://xforce.iss.net/static/5965.php\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: fw1-limited-license-dos\nPlatforms Affected: Check Point Firewall-1 4.1\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: FireWall-1 limited-IP license denial of service\nX-Force URL: http://xforce.iss.net/static/5966.php\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: fw1-limited-license-dos\nPlatforms Affected: Check Point Firewall-1 4.1\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: FireWall-1 limited-IP license denial of service\nX-Force URL: http://xforce.iss.net/static/5966.php\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: hp-stm-dos\nPlatforms Affected: HPUX\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: HP-UX Support Tools Manager denial of service\nX-Force URL: http://xforce.iss.net/static/5957.php\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: linux-webmin-tmpfiles\nPlatforms Affected: OpenLinux (2.3, 2.4)\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Webmin use of tmpfiles could allow a local user to overwrite files\nX-Force URL: http://xforce.iss.net/static/6011.php\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: tinyproxy-remote-bo\nPlatforms Affected: tinyproxy 1.3.2 and 1.3.3\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Tinyproxy remote buffer overflow\nX-Force URL: http://xforce.iss.net/static/5954.php\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: postaci-sql-command-injection\nPlatforms Affected: PostACI\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Postaci SQL command injection\nX-Force URL: http://xforce.iss.net/static/5972.ph p\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: wwwwais-cgi-dos\nPlatforms Affected: wwwwais.c 25\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: wwwwais CGI based program denial of service\nX-Force URL: http://xforce.iss.net/static/5980.php\n\n_____\n\nDate Reported: 1/17/01\nVulnerability: mime-header-attachment\nPlatforms Affected: MIME 1.0\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: MIME headers could allow spoofed file attachment\nX-Force URL: http://xforce.iss.net/static/5991.php\n\n_____\n\nDate Reported: 1/16/01\nVulnerability: ssh-rpc-private-key\nPlatforms Affected: SSH\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: SSH secure-RPC could generate a passphrase that exposes a user\u0027s private key\nX-Force URL: http://xforce.iss.net/static/5963.php\n\n_____\n\nDate Reported: 1/16/01\nVulnerability: linux-glibc-preload-overwrite\nPlatforms Affected: Linux\nRisk Factor: Low\nAttack Type: Host Based\nBrief Description: Linux glibc LD_PRELOAD file overwrite\nX-Force URL: http://xforce.iss.net/static/5971.php\n\n_____\n\nDate Reported: 1/16/01\nVulnerability: inn-tmpfile-symlink\nPlatforms Affected: InterNet News (INN)\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: INN tmpfile symbolic link\nX-Force URL: http://xforce.iss.net/static/5974.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: interscan-viruswall-insecure-password\nPlatforms Affected: InterScan VirusWall (3.0.1, 3.6.x)\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: InterScan VirusWall for Unix password change insecure\nX-Force URL: http://xforce.iss.net/static/5944.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: interscan-viruswall-weak-authentication\nPlatforms Affected: InterScan VirusWall (3.0.1, 3.6.x)\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: InterScan VirusWall for Unix uses weak authentication\nX-Force URL: http://xforce.iss.net/static/5946.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: ie-mshtml-dos\nPlatforms Affected: Internet Explorer 4.0 and later\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Internet Explorer mshtml.dll denial of service\nX-Force URL: http://xforce.iss.net/static/5938.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: dhcp-format-string\nPlatforms Affected: Caldera OpenLinux Desktop (2.3, 2.3.1, 2.4)\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Caldera DHCP format string\nX-Force URL: http://xforce.iss.net/static/5953.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: win-mediaplayer-arbitrary-code\nPlatforms Affected: Windows Media Player 7.0\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Windows Media Player skins can be used execute arbitrary code\nX-Force URL: http://xforce.iss.net/static/5937.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: veritas-backupexec-dos\nPlatforms Affected: Backup Exec 4.5\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Veritas Backup Exec denial of service\nX-Force URL: http://xforce.iss.net/static/5941.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: interscan-viruswall-symlink\nPlatforms Affected: InterScan VirusWall (3.0.1, 3.6.x)\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: InterScan VirusWall for Unix symbolic link\nX-Force URL: http://xforce.iss.net/static/5947.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: omnihttpd-statsconfig-corrupt-files\nPlatforms Affected: OmniHTTPd\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: OmniHTTPd statsconfig.pl corrupt any file on the system\nX-Force URL: http://xforce.iss.net/static/5955.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: omnihttpd-statsconfig-execute-code\nPlatforms Affected: OmniHTTPd\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: OmniHTTPD statsconfig.pl allows code execution\nX-Force URL: http://xforce.iss.net/static/5956.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: icmp-pmtu-dos\nPlatforms Affected: Linux\n BSD\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: ICMP PMTU denial of service\nX-Force URL: http://xforce.iss.net/static/5975.php\n\n_____\n\nDate Reported: 1/15/01\nVulnerability: icmp-pmtu-dos\nPlatforms Affected: Linux\n BSD\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: ICMP PMTU denial of service\nX-Force URL: http://xforce.iss.net/static/5975.php\n\n_____\n\nDate Reported: 1/14/01\nVulnerability: splitvt-perserc-format-string\nPlatforms Affected: splitvt 1.6.4 and earlier\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Splitvt perserc.c module format string\nX-Force URL: http://xforce.iss.net/static/5948.php\n\n_____\n\nDate Reported: 1/14/01\nVulnerability: splitvt-perserc-format-string\nPlatforms Affected: splitvt 1.6.4 and earlier\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Splitvt perserc.c module format string\nX-Force URL: http://xforce.iss.net/static/5948.php\n\n_____\n\nDate Reported: 1/14/01\nVulnerability: flash-module-bo\nPlatforms Affected: Oliver Debon Flash plugin 0.4.9 and earlier\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Flash browser module buffer overflow\nX-Force URL: http://xforce.iss.net/static/5952.php\n\n_____\n\nDate Reported: 1/13/01\nVulnerability: rctab-elevate-privileges\nPlatforms Affected: Linux SuSE\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: rctab in SuSE Linux could allow privilege elevation\nX-Force URL: http://xforce.iss.net/static/5945.php\n\n_____\n\nDate Reported: 1/12/01\nVulnerability: ultraboard-cgi-perm\nPlatforms Affected: UltraBoard 2000B\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: UltraBoard CGI weak permissions\nX-Force URL: http://xforce.iss.net/static/5931.php\n\n_____\n\nDate Reported: 1/12/01\nVulnerability: compaq-web-management-bo\nPlatforms Affected: Compaq Web-Based Management\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Compaq Web-Based Management program buffer overflow\nX-Force URL: http://xforce.iss.net/static/5935.php\n\n_____\n\nDate Reported: 1/12/01\nVulnerability: php-htaccess-unauth-access\nPlatforms Affected: PHP (4.0.0, 4.0.4)\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: PHP could allow unauthorized access to restricted files\nX-Force URL: http://xforce.iss.net/static/5940.php\n\n_____\n\nDate Reported: 1/12/01\nVulnerability: basilix-webmail-retrieve-files\nPlatforms Affected: Basilix Webmail 0.9.7beta\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: Basilix Webmail System allows unauthorized users to retrieve files\nX-Force URL: http://xforce.iss.net/static/5934.php\n\n_____\n\nDate Reported: 1/12/01\nVulnerability: solaris-arp-bo\nPlatforms Affected: Solaris\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Solaris arp buffer overflow\nX-Force URL: http://xforce.iss.net/static/5928.php\n\n_____\n\nDate Reported: 1/12/01\nVulnerability: php-view-source-code\nPlatforms Affected: PHP (4.0.0, 4.0.4)\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: PHP could allow remote viewing of source code\nX-Force URL: http://xforce.iss.net/static/5939.php\n\n_____\n\nDate Reported: 1/11/01\nVulnerability: wec-ntlm-authentication\nPlatforms Affected: Windows 2000\n Microsoft Office 2000\n Windows ME\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Web Extender Client (WEC) NTLM authentication\nX-Force URL: http://xforce.iss.net/static/5920.php\n\n_____\n\nDate Reported: 1/11/01\nVulnerability: spamcop-url-seq-predict\nPlatforms Affected: SpamCop\nRisk Factor: Low\nAttack Type: Network/Host Based\nBrief Description: SpamCop URL number increment sequence prediction\nX-Force URL: http://xforce.iss.net/static/5933.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linux-wuftpd-privatepw-symlink\nPlatforms Affected: Linux\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux wu-ftpd privatepw symbolic link\nX-Force URL: http://xforce.iss.net/static/5915.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: rdist-symlink\nPlatforms Affected: rdist\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: rdist symbolic link\nX-Force URL: http://xforce.iss.net/static/5925.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: squid-email-symlink\nPlatforms Affected: squid\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: squid email notification symbolic link\nX-Force URL: http://xforce.iss.net/static/5921.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linux-diffutils-sdiff-symlimk\nPlatforms Affected: Linux\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux diffutils sdiff symbolic link\nX-Force URL: http://xforce.iss.net/static/5914.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: tcpdump-arpwatch-symlink\nPlatforms Affected: arpwatch\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: tcpdump arpwatch symbolic link\nX-Force URL: http://xforce.iss.net/static/5922.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linuxconf-vpop3d-symlink\nPlatforms Affected: linuxconf\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linuxconf vpop3d symbolic link\nX-Force URL: http://xforce.iss.net/static/5923.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: shadow-utils-useradd-symlink\nPlatforms Affected: shadow-utils\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: shadow-utils useradd symbolic link\nX-Force URL: http://xforce.iss.net/static/5927.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linux-glibc-read-files\nPlatforms Affected: Linux glibc\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux glibc library can allow users to read restricted files\nX-Force URL: http://xforce.iss.net/static/5907.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: gettyps-symlink\nPlatforms Affected: gettyps\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: getty_ps symbolic link\nX-Force URL: http://xforce.iss.net/static/5924.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linux-gpm-symlink\nPlatforms Affected: gpm\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux gpm symbolic link attack\nX-Force URL: http://xforce.iss.net/static/5917.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linux-mgetty-symlink\nPlatforms Affected: mgetty\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux mgetty symbolic link attack\nX-Force URL: http://xforce.iss.net/static/5918.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linux-apache-symlink\nPlatforms Affected: Apache\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux Apache symbolic link\nX-Force URL: http://xforce.iss.net/static/5926.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: linux-inn-symlink\nPlatforms Affected: inn\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux INN tmp directory symbolic link\nX-Force URL: http://xforce.iss.net/static/5916.php\n\n_____\n\nDate Reported: 1/10/01\nVulnerability: conferenceroom-developer-dos\nPlatforms Affected: ConferenceRoom Professional Edition\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: ConferenceRoom Developer Edition denial of service\nX-Force URL: http://xforce.iss.net/static/5909.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: oracle-xsql-execute-code\nPlatforms Affected: Oracle 8.1.7\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Oracle XSQL servlet and xml-stylesheet allows code execution on server\nX-Force URL: http://xforce.iss.net/static/5905.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: netscreen-webui-bo\nPlatforms Affected: NetScreen\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: NetScreen Firewall WebUI buffer overflow\nX-Force URL: http://xforce.iss.net/static/5908.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: suse-reiserfs-long-filenames\nPlatforms Affected: SuSE 7.0\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: SuSE reiserfs long file name denial of service\nX-Force URL: http://xforce.iss.net/static/5910.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: interbase-backdoor-account\nPlatforms Affected: InterBase 6.01 and earlier\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: InterBase built-in backdoor account\nX-Force URL: http://xforce.iss.net/static/5911.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: interbase-hidden-function-dos\nPlatforms Affected: InterBase 6.01\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: InterBase hidden function denial of service\nX-Force URL: http://xforce.iss.net/static/5912.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: brickserver-thttpd-dos\nPlatforms Affected: BRICKServer Small Business\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: BRICKServer thttpd denial of service\nX-Force URL: http://xforce.iss.net/static/5919.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: solaris-exrecover-bo\nPlatforms Affected: Solaris (2.4, 2.5, 2.5.1, 2.6)\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Solaris exrecover buffer overflow\nX-Force URL: http://xforce.iss.net/static/5913.php\n\n_____\n\nDate Reported: 1/9/01\nVulnerability: hp-inetd-swait-dos\nPlatforms Affected: HPUX\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: HP-UX inetd swait denial of service\nX-Force URL: http://xforce.iss.net/static/5904.php\n\n_____\n\nDate Reported: 1/8/01\nVulnerability: microsoft-iis-read-files\nPlatforms Affected: IIS (4.0, 5.0)\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Microsoft IIS 5.0 allows the viewing of files through malformed URL\nX-Force URL: http://xforce.iss.net/static/5903.php\n\n_____\n\nDate Reported: 1/8/01\nVulnerability: ibm-websphere-dos\nPlatforms Affected: IBM Websphere 3.52\n IBM HTTP Server 1.3.12\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: IBM WebSphere denial of service\nX-Force URL: http://xforce.iss.net/static/5900.php\n\n_____\n\nDate Reported: 1/8/01\nVulnerability: storagesoft-imagecast-dos\nPlatforms Affected: ImageCast 4.1\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: StorageSoft ImageCast denial of service\nX-Force URL: http://xforce.iss.net/static/5901.php\n\n_____\n\nDate Reported: 1/8/01\nVulnerability: nai-pgp-replace-keys\nPlatforms Affected: PGP 7.0\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: PGP users may replace signed exported key blocks with arbitrary keys\nX-Force URL: http://xforce.iss.net/static/5902.php\n\n_____\n\nDate Reported: 1/7/01\nVulnerability: http-cgi-bbs-forum\nPlatforms Affected: WebBBS 1.0\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: bbs_forum.cgi allows remote command execution\nX-Force URL: http://xforce.iss.net/static/5906.php\n\n_____\n\nDate Reported: 1/5/01\nVulnerability: lotus-domino-directory-traversal\nPlatforms Affected: Lotus Domino 5.0.x\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Lotus Domino 5.0.x .nsf, .box, and .ns4 directory traversal\nX-Force URL: http://xforce.iss.net/static/5899.php\n\n_____\n\nDate Reported: 1/5/01\nVulnerability: http-cgi-fastgraf\nPlatforms Affected: FASTGRAF\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Fastgraf CGI scripts allow remote command execution\nX-Force URL: http://xforce.iss.net/static/5897.php\n\n_____\n\nDate Reported: 1/4/01\nVulnerability: newsdesk-cgi-read-files\nPlatforms Affected: Newsdesk 1.2\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Newsdesk.cgi allows read access to files\nX-Force URL: http://xforce.iss.net/static/5898.php\n\n_____\n\nDate Reported: 1/1/01\nVulnerability: gtk-module-execute-code\nPlatforms Affected: GTK+ 1.2.8 and earlier\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: GTK+ arbitrary code execution using custom loadable module\nX-Force URL: http://xforce.iss.net/static/5832.php\n\n_____\n\nDate Reported: 1/1/01\nVulnerability: linux-tty-writable-dos\nPlatforms Affected: Linux\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux writable TTY denial of service\nX-Force URL: http://xforce.iss.net/static/5896.php\n\n_____\n\n\nRisk Factor Key:\n\n High Any vulnerability that provides an attacker with immediate\n access into a machine, gains superuser access, or bypasses\n a firewall. Example: A vulnerable Sendmail 8.6.5 version\n that allows an intruder to execute commands on mail\n server. \n Medium Any vulnerability that provides information that has a\n high potential of giving system access to an intruder. \n Example: A misconfigured TFTP or vulnerable NIS server\n that allows an intruder to get the password file that\n could contain an account with a guessable password. \n Low Any vulnerability that provides information that\n potentially could lead to a compromise. Example: A\n finger that allows an intruder to find out who is online\n and potential accounts to attempt to crack passwords\n via brute force methods. \n\n\n_____\n\nAdditional Information\n\nThis document is available at http://xforce.iss.net/alerts/advisennn.php. \nTo receive these Alerts and Advisories:\n- - Subscribe to the Alert mailing list from\nhttp://xforce.iss.net/maillists/index.php\n- - Or send an email to majordomo@iss.net, and within the body of the\nmessage type:\n\u0027subscribe alert\u0027 (without the quotes). \n\n\nAbout Internet Security Systems (ISS)\nInternet Security Systems, Inc. (ISS) (NASDAQ: ISSX) is the leading\nglobal provider of security management solutions for the Internet. \nBy combining best of breed products, security management services,\naggressive research and development, and comprehensive educational\nand consulting services, ISS is the trusted security advisor for\nthousands of organizations around the world looking to protect their\nmission critical information and networks. \n\nCopyright (c) 2001 by Internet Security Systems, Inc. \n\nPermission is hereby granted for the redistribution of this Alert\nelectronically. It is not to be edited in any way without express consent\nof the X-Force. If you wish to reprint the whole or any part of this\nAlert in any other medium excluding electronic medium, please e-mail\nxforce@iss.net for permission. \n\nDisclaimer\n\nThe information within this paper may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There\nare NO warranties with regard to this information. In no event shall the\nauthor be liable for any damages whatsoever arising out of or in\nconnection with the use or spread of this information. Any use of this\ninformation is at the user\u0027s own risk. \n\n\n\n\nX-Force PGP Key available at: http://xforce.iss.net/sensitive.php as\nwell as on MIT\u0027s PGP key server and PGP.com\u0027s key server. \n\nPlease send suggestions, updates, and comments to: X-Force xforce@iss.net\nof Internet Security Systems, Inc. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: 2.6.3a\nCharset: noconv\n\niQCVAwUBOogB2jRfJiV99eG9AQESogP9HsIDfUmYkJuWUmNqPhb22a6CVpi/TiG9\n7mvhdGc3ySS6LqrvTZgXrBzAcxFlHrdTSmNka8yGiLvYAb0lnghFRZ2OxxRfK11m\nAV9VS9/Yty/Qk8BnA/7tx4DIcM4Nhry1kTqTbDkpbcfXOb2LI2WUGnMHF/xkc1ge\n3mV5zJXCUM4=\n=ClrQ\n-----END PGP SIGNATURE-----\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2001-0182" }, { "db": "CERT/CC", "id": "VU#850440" }, { "db": "CERT/CC", "id": "VU#987632" }, { "db": "CERT/CC", "id": "VU#342768" }, { "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "db": "BID", "id": "2194" }, { "db": "BID", "id": "2222" }, { "db": "BID", "id": "2238" }, { "db": "VULHUB", "id": "VHN-3004" }, { "db": "VULMON", "id": "CVE-2001-0182" }, { "db": "PACKETSTORM", "id": "24294" } ], "trust": 4.86 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "2238", "trust": 2.9 }, { "db": "NVD", "id": "CVE-2001-0182", "trust": 2.6 }, { "db": "OSVDB", "id": "1733", "trust": 1.8 }, { "db": "BID", "id": "2222", "trust": 1.1 }, { "db": "BID", "id": "2194", "trust": 1.1 }, { "db": "XF", "id": "5963", "trust": 0.9 }, { "db": "XF", "id": "6010", "trust": 0.9 }, { "db": "XF", "id": "5924", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#850440", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#987632", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#342768", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2001-000005", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200103-081", "trust": 0.7 }, { "db": "XF", "id": "5966", "trust": 0.7 }, { "db": "XF", "id": "1", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20010117 LICENSING FIREWALL-1 DOS ATTACK", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-3004", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2001-0182", "trust": 0.1 }, { "db": "XF", "id": "5947", "trust": 0.1 }, { "db": "XF", "id": "5988", "trust": 0.1 }, { "db": "XF", "id": "5910", "trust": 0.1 }, { "db": "XF", "id": "5908", "trust": 0.1 }, { "db": "XF", "id": "6004", "trust": 0.1 }, { "db": "XF", "id": "6002", "trust": 0.1 }, { "db": "XF", "id": "5931", "trust": 0.1 }, { "db": "XF", "id": "5900", "trust": 0.1 }, { "db": "XF", "id": "5982", "trust": 0.1 }, { "db": "XF", "id": "6035", "trust": 0.1 }, { "db": "XF", "id": "6030", "trust": 0.1 }, { "db": "XF", "id": "5937", "trust": 0.1 }, { "db": "XF", "id": "5969", "trust": 0.1 }, { "db": "XF", "id": "6016", "trust": 0.1 }, { "db": "XF", "id": "5974", "trust": 0.1 }, { "db": "XF", "id": "5912", "trust": 0.1 }, { "db": "XF", "id": "5832", "trust": 0.1 }, { "db": "XF", "id": "5911", "trust": 0.1 }, { "db": "XF", "id": "5926", "trust": 0.1 }, { "db": "XF", "id": "5920", "trust": 0.1 }, { "db": "XF", "id": "6028", "trust": 0.1 }, { "db": "XF", "id": "6039", "trust": 0.1 }, { "db": "XF", "id": "5956", "trust": 0.1 }, { "db": "XF", "id": "6011", "trust": 0.1 }, { "db": "XF", "id": "5992", "trust": 0.1 }, { "db": "XF", "id": "5935", "trust": 0.1 }, { "db": "XF", "id": "6017", "trust": 0.1 }, { "db": "XF", "id": "5922", "trust": 0.1 }, { "db": "XF", "id": "5984", "trust": 0.1 }, { "db": "XF", "id": "5977", "trust": 0.1 }, { "db": "XF", "id": "5957", "trust": 0.1 }, { "db": "XF", "id": "5993", "trust": 0.1 }, { "db": "XF", "id": "6006", "trust": 0.1 }, { "db": "XF", "id": "5913", "trust": 0.1 }, { "db": "XF", "id": "5907", "trust": 0.1 }, { "db": "XF", "id": "5897", "trust": 0.1 }, { "db": "XF", "id": "6034", "trust": 0.1 }, { "db": "XF", "id": "5945", "trust": 0.1 }, { "db": "XF", "id": "5905", "trust": 0.1 }, { "db": "XF", "id": "5940", "trust": 0.1 }, { "db": "XF", "id": "5954", "trust": 0.1 }, { "db": "XF", "id": "5976", "trust": 0.1 }, { "db": "XF", "id": "5903", "trust": 0.1 }, { "db": "XF", "id": "6003", "trust": 0.1 }, { "db": "XF", "id": "6018", "trust": 0.1 }, { "db": "XF", "id": "5972", "trust": 0.1 }, { "db": "XF", "id": "5909", "trust": 0.1 }, { "db": "XF", "id": "5916", "trust": 0.1 }, { "db": "XF", "id": "6033", "trust": 0.1 }, { "db": "XF", "id": "5986", "trust": 0.1 }, { "db": "XF", "id": "5915", "trust": 0.1 }, { "db": "XF", "id": "6019", "trust": 0.1 }, { "db": "XF", "id": "5925", "trust": 0.1 }, { "db": "XF", "id": "5923", "trust": 0.1 }, { "db": "XF", "id": "6005", "trust": 0.1 }, { "db": "XF", "id": "5978", "trust": 0.1 }, { "db": "XF", "id": "5973", "trust": 0.1 }, { "db": "XF", "id": "5979", "trust": 0.1 }, { "db": "XF", "id": "5980", "trust": 0.1 }, { "db": "XF", "id": "5941", "trust": 0.1 }, { "db": "XF", "id": "5934", "trust": 0.1 }, { "db": "XF", "id": "5991", "trust": 0.1 }, { "db": "XF", "id": "5962", "trust": 0.1 }, { "db": "XF", "id": "6014", "trust": 0.1 }, { "db": "XF", "id": "6015", "trust": 0.1 }, { "db": "XF", "id": "5994", "trust": 0.1 }, { "db": "XF", "id": "6036", "trust": 0.1 }, { "db": "XF", "id": "5953", "trust": 0.1 }, { "db": "XF", "id": "5944", "trust": 0.1 }, { "db": "XF", "id": "5896", "trust": 0.1 }, { "db": "XF", "id": "6040", "trust": 0.1 }, { "db": "XF", "id": "5914", "trust": 0.1 }, { "db": "XF", "id": "5927", "trust": 0.1 }, { "db": "XF", "id": "6012", "trust": 0.1 }, { "db": "XF", "id": "6025", "trust": 0.1 }, { "db": "XF", "id": "6001", "trust": 0.1 }, { "db": "XF", "id": "5965", "trust": 0.1 }, { "db": "XF", "id": "5952", "trust": 0.1 }, { "db": "XF", "id": "5917", "trust": 0.1 }, { "db": "XF", "id": "5898", "trust": 0.1 }, { "db": "XF", "id": "6009", "trust": 0.1 }, { "db": "XF", "id": "5998", "trust": 0.1 }, { "db": "XF", "id": "5985", "trust": 0.1 }, { "db": "XF", "id": "6026", "trust": 0.1 }, { "db": "XF", "id": "6013", "trust": 0.1 }, { "db": "XF", "id": "6008", "trust": 0.1 }, { "db": "XF", "id": "5921", "trust": 0.1 }, { "db": "XF", "id": "5981", "trust": 0.1 }, { "db": "XF", "id": "5989", "trust": 0.1 }, { "db": "XF", "id": "5939", "trust": 0.1 }, { "db": "XF", "id": "5906", "trust": 0.1 }, { "db": "XF", "id": "6031", "trust": 0.1 }, { "db": "XF", "id": "6020", "trust": 0.1 }, { "db": "XF", "id": "5948", "trust": 0.1 }, { "db": "XF", "id": "5933", "trust": 0.1 }, { "db": "XF", "id": "6027", "trust": 0.1 }, { "db": "XF", "id": "5919", "trust": 0.1 }, { "db": "XF", "id": "5899", "trust": 0.1 }, { "db": "XF", "id": "5996", "trust": 0.1 }, { "db": "XF", "id": "5987", "trust": 0.1 }, { "db": "XF", "id": "5918", "trust": 0.1 }, { "db": "XF", "id": "5971", "trust": 0.1 }, { "db": "XF", "id": "5995", "trust": 0.1 }, { "db": "XF", "id": "5928", "trust": 0.1 }, { "db": "XF", "id": "5938", "trust": 0.1 }, { "db": "XF", "id": "5983", "trust": 0.1 }, { "db": "XF", "id": "6032", "trust": 0.1 }, { "db": "XF", "id": "5997", "trust": 0.1 }, { "db": "XF", "id": "5904", "trust": 0.1 }, { "db": "XF", "id": "5902", "trust": 0.1 }, { "db": "XF", "id": "5975", "trust": 0.1 }, { "db": "XF", "id": "5901", "trust": 0.1 }, { "db": "XF", "id": "5990", "trust": 0.1 }, { "db": "XF", "id": "5946", "trust": 0.1 }, { "db": "XF", "id": "5955", "trust": 0.1 }, { "db": "XF", "id": "6038", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "24294", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#850440" }, { "db": "CERT/CC", "id": "VU#987632" }, { "db": "CERT/CC", "id": "VU#342768" }, { "db": "VULHUB", "id": "VHN-3004" }, { "db": "VULMON", "id": "CVE-2001-0182" }, { "db": "BID", "id": "2194" }, { "db": "BID", "id": "2222" }, { "db": "BID", "id": "2238" }, { "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "db": "PACKETSTORM", "id": "24294" }, { "db": "CNNVD", "id": "CNNVD-200103-081" }, { "db": "NVD", "id": "CVE-2001-0182" } ] }, "id": "VAR-200103-0098", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-3004" } ], "trust": 0.01 }, "last_update_date": "2024-02-06T19:13:50.649000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.checkpoint.co.jp/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2001-000005" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2001-0182" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/2238" }, { "trust": 1.8, "url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0298.html" }, { "trust": 1.8, "url": "http://www.osvdb.org/1733" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5966" }, { "trust": 0.9, "url": "http://xforce.iss.net/static/5963.php" }, { "trust": 0.9, "url": " http://xforce.iss.net/static/6010.php" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2222" }, { "trust": 0.8, "url": "http://www.ssh.com/products/ssh/patches/securerpcvulnerability.html" }, { "trust": 0.8, "url": "http://www.ssh.com/products/ssh/patches.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/archive/1/158966" }, { "trust": 0.8, "url": "http://sourceforge.net/forum/forum.php?forum_id=60570" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2194" }, { "trust": 0.8, "url": "http://www.linuxsecurity.com/advisories/mandrake_advisory-1037.html" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/5924" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0182" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0182" }, { "trust": 0.7, "url": "http://xforce.iss.net/static/5966.php" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5992.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5926.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5940.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6033.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5916.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6038.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5997.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6026.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5928.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5977.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6013.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5991.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5938.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5969.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5957.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5909.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5948.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6005.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5954.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5933.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5955.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6035.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5990.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5907.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5994.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5983.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5911.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6006.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5908.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5922.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5903.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6027.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5965.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5899.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5980.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5934.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5919.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5931.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5962.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5976.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6003.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5998.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6040.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5920.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5946.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5915.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5986.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5923.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5993.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6001.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6036.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5902.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5971.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5937.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5985.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5945.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6028.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5988.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6009.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6025.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5897.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5952.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5953.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6039.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5978.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5901.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5906.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5974.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6008.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5935.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5944.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5918.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6034.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5925.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6014.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5912.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5924.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5989.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6019.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5921.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5904.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5972.ph" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5900.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5898.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5973.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5832.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5975.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5913.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5905.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6015.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6016.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/maillists/index.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5996.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5981.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6012.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/alerts/advisennn.php." }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5995.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5947.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5896.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5910.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5917.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6017.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6032.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5979.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6004.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/sensitive.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5984.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5939.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5914.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5956.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5941.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6011.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6031.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6018.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6002.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5927.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6020.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5982.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/5987.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6030.php" } ], "sources": [ { "db": "CERT/CC", "id": "VU#850440" }, { "db": "CERT/CC", "id": "VU#987632" }, { "db": "CERT/CC", "id": "VU#342768" }, { "db": "VULHUB", "id": "VHN-3004" }, { "db": "VULMON", "id": "CVE-2001-0182" }, { "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "db": "PACKETSTORM", "id": "24294" }, { "db": "CNNVD", "id": "CNNVD-200103-081" }, { "db": "NVD", "id": "CVE-2001-0182" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#850440" }, { "db": "CERT/CC", "id": "VU#987632" }, { "db": "CERT/CC", "id": "VU#342768" }, { "db": "VULHUB", "id": "VHN-3004" }, { "db": "VULMON", "id": "CVE-2001-0182" }, { "db": "BID", "id": "2194" }, { "db": "BID", "id": "2222" }, { "db": "BID", "id": "2238" }, { "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "db": "PACKETSTORM", "id": "24294" }, { "db": "CNNVD", "id": "CNNVD-200103-081" }, { "db": "NVD", "id": "CVE-2001-0182" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-06-13T00:00:00", "db": "CERT/CC", "id": "VU#850440" }, { "date": "2001-05-05T00:00:00", "db": "CERT/CC", "id": "VU#987632" }, { "date": "2001-10-01T00:00:00", "db": "CERT/CC", "id": "VU#342768" }, { "date": "2001-03-26T00:00:00", "db": "VULHUB", "id": "VHN-3004" }, { "date": "2001-03-26T00:00:00", "db": "VULMON", "id": "CVE-2001-0182" }, { "date": "2001-01-10T00:00:00", "db": "BID", "id": "2194" }, { "date": "2001-01-16T00:00:00", "db": "BID", "id": "2222" }, { "date": "2001-01-17T00:00:00", "db": "BID", "id": "2238" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "date": "2001-02-14T07:13:47", "db": "PACKETSTORM", "id": "24294" }, { "date": "2001-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200103-081" }, { "date": "2001-03-26T05:00:00", "db": "NVD", "id": "CVE-2001-0182" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-10-25T00:00:00", "db": "CERT/CC", "id": "VU#850440" }, { "date": "2001-06-25T00:00:00", "db": "CERT/CC", "id": "VU#987632" }, { "date": "2004-07-28T00:00:00", "db": "CERT/CC", "id": "VU#342768" }, { "date": "2017-10-10T00:00:00", "db": "VULHUB", "id": "VHN-3004" }, { "date": "2017-10-10T00:00:00", "db": "VULMON", "id": "CVE-2001-0182" }, { "date": "2001-01-10T00:00:00", "db": "BID", "id": "2194" }, { "date": "2001-01-16T00:00:00", "db": "BID", "id": "2222" }, { "date": "2001-01-17T00:00:00", "db": "BID", "id": "2238" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2001-000005" }, { "date": "2005-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200103-081" }, { "date": "2017-10-10T01:29:37.873000", "db": "NVD", "id": "CVE-2001-0182" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "24294" }, { "db": "CNNVD", "id": "CNNVD-200103-081" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SSH1 may generate weak passphrase when using Secure RPC", "sources": [ { "db": "CERT/CC", "id": "VU#850440" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unknown", "sources": [ { "db": "CNNVD", "id": "CNNVD-200103-081" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.