Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out
Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

Information in the US-CERT Cyber Security Bulletin is a .pdf

VIEWS: 63 PAGES: 29

									Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, so the
information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section
reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the
operating system reported since this information is obtained from open-source information.

This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in
previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to
vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a
"Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.

           Vulnerabilities

                 Windows Operating Systems
                     ActiveBuyandSell SQL Injection and Cross-Site Scripting
                     Advanced Browser Javascript Spoofing
                     ASP Nuke SQL Injection and Cross Site Scripting
                     ASPPlayground .NET Arbitrary Upload
                     Fast Browser Pro Javascript Spoofing
                     Slim Browser Javascript Spoofing
                     HP VCRM Password Disclosure
                     Hosting Controller Error.ASP Cross Site Scripting
                     Ipswitch WhatsUp Professional SQL Injection Vulnerability
                     Microsoft Internet Explorer Dialog Origin Spoofing Vulnerability (Updated)
                     Microsoft Log Sink Class ActiveX Control
                     Microsoft Outlook Express Could Allow Remote Code Execution (Updated)
                     Microsoft Windows SMB Buffer Overflow (Updated)
                     MyInternet Browser Javascript Spoofing
                     NetCaptor Browser Javascript Spoofing
                     Omni Browser Javascript Spoofing
                     Optimal Desktop Javascript Spoofing
                     BisonFTP Server Denial of Service
                     Sukru Alatas's Guestbook Database Disclosure
                     TCP-IP Datalook Denial of Service
                     Community Server Forums Cross Site Scripting
                     IA eMailServer Denial of Service
                     Veritas Backup Exec Multiple Vulnerabilities
                     Wichio 27Tools-in-1 Browser Javascript Spoofing
                 UNIX / Linux Operating Systems
                     Adobe Reader / Acrobat Arbitrary Code Execution & Elevated Privileges
                     Apache SpamAssassin Lets Remote Users Deny Service (Updated)
                       Freedesktop D-BUS Session Hijack (Updated)
                       FreeRadius 'rlm_sql.c' SQL Injection & Buffer Overflow (Updated)
                       GD Graphics Library Remote Integer Overflow (Updated)
                       gFTP Remote Directory Traversal (Updated)
                       Gedit Filename Format String (Updated)
                       GNU CPIO CHMod File Permission Modification (Updated)
                       GNU CPIO Directory Traversal (Updated)
                       GNU GZip Directory Traversal (Updated)
                       GNU shtool Insecure Temporary File Creation (Updated)
                       GNU GZip File Permission Modification (Updated)
                       GNU wget File Creation & Overwrite (Updated)
                       Gzip Zgrep Arbitrary Command Execution (Updated)
                       LibTIFF TIFFOpen Remote Buffer Overflow (Updated)
                       Linux Support Services Asterisk Manager Interface Remote Buffer Overflow
                       Multiple Vendors Free BSD Hyper-Threading Technology Support Information
                       Disclosure (Updated)
                       Multiple Vendors Samba Remote Wild Card Denial of Service (Updated)
                       Linux Kernel Unauthorized SCSI Command
                       Multiple Vendors Tcp dump BGP Decoding Routines Denial of Service (Updated)
                       Multiple Vendors Squid Proxy Set-Cookie Headers Information Disclosure (Updated)
                       Multiple Vendors GDB Multiple Vulnerabilities (Updated)
                       Multiple Vendor gdk-pixbug BMP, ICO, and XPM Image Processing Errors (Updated)
                       ImageMagick & GraphicsMagick XWD Decoder Remote Denial of Service (Updated)
                       Multiple Vendors Linux Kernel ELF Core Dump Buffer Overflow (Updated)
                       Linux Kernel 64 Bit 'AR-RSC' Register Access
                       Linux Kernel Subthread Exec Denial of Service
                       Multiple Vendors Squid NTLM fakeauth_auth Helper Remote Denial of Service (Updated)
                       Multiple Vendors Squid Proxy Remote Cache Poisoning (Updated)
                       OpenSSL Insecure Temporary File Creation (Updated)
                       PostgreSQL Remote Denial of Service & Arbitrary Code Execution (Updated)
                       RaXnet Cacti Multiple Input Validation
                       RedHat Linux SysReport Proxy Information Disclosure (Updated)
                       Sendmail Milter Remote Denial of Service
                        Sun Solaris Traceroute Multiple Buffer Overflows
                        Sun Solaris Runtime Linker 'LD_AUDIT' Elevated Privileges
                        Todd Miller Sudo Local Race Condition (Updated)
                        Vipul Razor-agents Denials of Service (Updated)
                        xmlsoft.org Libxml2 Multiple Remote Stack Buffer Overflows (Updated)
                        Yukihiro Matsumoto Ruby XMLRPC Server Unspecified Command Execution
                        (Updated)
                  Multiple Operating Systems
                        Adobe Reader / Adobe Acrobat Local File Detection (Updated)
                        CarLine Forum Russian Board Multiple Input Validation
                        ClamAV Quantum Decompressor Denial of Service
                        Craig Knudsen WebCalendar 'Assistant_Edit.PHP' Security Restriction Bypass
                        DUware DUpaypal Pro Multiple SQL Injection
                        DUware DUamazon Pro Multiple SQL Injection
                        DUware DUclassmate Multiple SQL Injection
                        DUware DUforum Multiple SQL Injection
                        DUware DUportal Pro Multiple SQL Injection
                        Francisco Burzi PHP-Nuke Avatar Cross-Site Scripting
                        IBM DB2 Universal Database Authorization Bypass
                        Infopop UBBThreads Multiple Input Validation
                        Infra dig Infra mail Advantage Server Edition Multiple Remote Buffer Overflow
                        JCDex Lite Arbitrary Code Execution
                        CSV_DB / i_DB Arbitrary Command Execution
                        Legal Case Management Log File Information Disclosure
                        Mambo 'user_rating' SQL Injection (Updated)
                        Mensajeitor 'IP' Parameter Cross-Site Scripting
                         Multiple Vendors Squid Proxy DNS Spoofing (Updated)
                         Multiple Vendor Telnet Client Information Disclosure (Updated)
                         Multiple Vendors Tor Information Disclosure
                         Opera 'javascript:' URL Cross-Site Scripting (Updated)
                         Opera XMLHttpRequest Security Bypass (Updated)
                         PHP-Fusion 'SUBMIT.PHP' Cross-Site Scripting & Information Disclosure
                         RealNetworks RealPlayer Unspecified Code Execution (Updated)
                         Simple Machines 'Msg' Parameter SQL Injection
                         Sun Microsystems Java Web Start / Sun JRE Sandbox Security Bypass (Updated)
                         Sun Java Web Start System Remote Unauthorized Access (Updated)
                         Veritas Backup Exec/NetBackup Request Packet Remote Denial of Service
                         Whois.Cart 'Profile.PHP' Cross-Site Scripting & File Inclusion
                         Wordpress Cat_ID Parameter SQL Injection (Updated)

            Wireless
            Recent Exploit Scripts/Techniques
            Trends
            Viruses/Trojans



Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or
workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable.
Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.

Note: All the information included in the following tables has been discussed in newsgroups and on web sites.

The Risk levels defined below are based on how the system may be impacted:

Note: Even though a vulnerability may allow several malicious acts to be performed, only the highest level risk will be defined in the Risk column.

     High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an
     intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of
     instructions to a machine and the machine responds with a command prompt with administrator privileges.
     Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability
     will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that
     allows an intruder to capture the password file.
     Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service
     (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against
     mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.


Windows Operating Systems Only
                                     Vulnerability - Impact
    Vendor &                                                                       Common Name/
                                    Patches - Workarounds                                                     Risk                Source
  Software Name                                                                    CVE Reference
                                        Attacks Scripts
Active Web           A vulnerability has been reported in ActiveBuyandsell            ActiveBuy             High    Secunia Advisory,
Softwares            that could let a malicious remote user perform SQL         andSell SQL Injection &             SA15837, June 27, 2005
                     injection or Cross-Site Scripting attacks.                   Cross-Site Scripting
ActiveBuy
andSell V6.X         No workaround or patch available at time of publishing.       CAN-2005-2062
                                                                                   CAN-2005-2063
                     Proofs of Concept exploits have been published.



Advanced Browser     A javascript spoofing vulnerability has been reported in     Advanced Browser         Medium   Security Tracker Alert ID:
                     Advanced Browser that could let remote malicious             Javascript Spoofing               1014270, June 23, 2005
Advanced Browser     users spoof Javascript dialog boxes.
V8.0.2
                     No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
ASP Nuke             Multiple vulnerabilities have been reported in ASP Nuke ASP Nuke SQL Injection         High    Security Focus, Bugtraq
                     that could allow a remote malicious user to perform      & Cross Site Scripting                ID: 14062, 13318,
ASP Nuke V0.8        SQL injection or Cross-Site Scripting attacks.                                                 14063,14064, June 27,
                                                                                CAN-2005-2064                       2005
                     No workaround or patch available at time of publishing.    CAN-2005-2065
                                                                                CAN-2005-2066
                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
ASP                  A vulnerability has been reported in                        ASPPlayground .NET         High    Security Tracker Alert ID:
Playground           ASPPlayground.NET that could allow a remote                   Arbitrary Upload                 1014309, June 27, 2005
                     malicious user to upload arbitrary files.
ASP
Playground           No workaround or patch available at time of publishing.
.NET V3.2SP1
                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
Fast Browser         A javascript spoofing vulnerability has been reported in     Fast Browser Pro         Medium   Security Tracker Alert ID:
                     Fast Browser Pro that could let remote malicious users      Javascript Spoofing                1014296, June 27, 2005
Fast Browser Pro     spoof Javascript dialog boxes.
V8.1
                     No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
Flashpeak            A javascript spoofing vulnerability has been reported in   Slim Browser Javascript    Medium   Security Tracker Alert ID:
                     Slim Browser that could let remote malicious users                Spoofing                     1014266, June 22, 2005
Slim Browser         spoof Javascript dialog boxes.
V4.05.007
                     No workaround or patch available at time of publishing.

                     There is no exploit code required.
Hewlett Packard      A password disclosure vulnerability has been reported       HP VCRM Password          Medium   Secunia, Advisory:
                     in HP Version Control Repository Manager that could             Disclosure                     SA15790, June 23, 2005
HP Version Control   disclose the proxy password to local users.
Repository Manager                                                                 CAN-2005-2076
V2.x               An update is available: http://h18023.www1.hp.com/
                   support/files/server/us/
                   download/22563.html

                     There is no exploit code required.
Hosting Controller   A vulnerability has been reported in Error.ASP that          Hosting Controller        High    Security Focus, Bugtraq
                     could allow a remote malicious user to perform                  Error.ASP                      ID: 14080, June 28, 2005
Hosting Controller   Cross-Site Scripting attacks.                               Cross-Site Scripting
Error.ASP
                     No workaround or patch available at time of publishing.       CAN-2005-2077

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
IPSwitch             An input validation vulnerability has been reported in        Ipswitch WhatsUp         High    iDEFENSE, Security
                     Ipswitch WhatsUp Professional that could let malicious        Professional SQL                 Advisory 06.22.05, June
WhatsUp              users perform SQL injection.                                Injection Vulnerability            22, 2005
Professional
V2005SP1             Update to Service Pack 1a:                                    CAN-2005-1250
                     http://www.ipswitch.com/Support/
                     whatsup_professional/releases/
                     wup2005sp1a.html

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
Microsoft            A vulnerability has been reported in Microsoft Internet       Microsoft Internet      Medium   Secunia, Advisory,
                     Explorer, which could let malicious websites to spoof       Explorer Dialog Origin             SA15491, June 21, 2005
Microsoft Internet   dialog boxes.                                                     Spoofing
Explorer 6.0,                                                                                                       Microsoft Security
SP1&SP2              Advisory available at:                                                                         Advisory (902333), June
                     http://www.microsoft.com/                                                                      21, 2005
                     technet/security/advisory/
                     902333.mspx

                     Currently we are not aware of any exploit for this
                     vulnerability.
Microsoft            A vulnerability has been reported in Microsoft Log Sink    Microsoft Log Sink Class    High    US-CERT VU#165022
                     Class ActiveX Control that could allow a remote                ActiveX Control
Visio 2002, SP1,     malicious user to create arbitrary files.
SharePoint Portal                                                                   CAN-2005-0360
Server 2001, SP1,   Update available at:
Office XP, SP1-SP3, http://www.microsoft.com/
                    downloads/details.aspx?
                    familyid=0dd4c99a-9196
                    -421b-83f0-3d2f93189028&
                    displaylang=en

                     An exploit has been published.
Microsoft            A remote code execution vulnerability has been                                         High    Microsoft, MS05-030,
                     reported in Outlook Express when it is used as a             Microsoft Outlook                 June 14, 2004
Outlook Express 5.5, newsgroup reader. A malicious user could exploit the        Express Could Allow
6                    vulnerability by constructing a malicious newsgroup        Remote Code Execution               US-CERT VU#130614
                     server that could that potentially allow remote code
                     execution if a user queried the server for news.               CAN-2005-1213                   Security Focus, Bugtraq
                                                                                                                    ID: 13951, June 24, 2005
                     Updates available: http://www.microsoft.com
                     /technet/security/Bulletin/
                     MS05-030.mspx

                     An exploit has been published.
Microsoft          A buffer overflow vulnerability exists when handling                                     High    Microsoft Security Bulletin,
                   Server Message Block (SMB) traffic, which could let a   Microsoft Windows SMB                    MS05-011, February 8,
Windows 2000 SP3 remote malicious user execute arbitrary code.                 Buffer Overflow                      2005
& SP4, Windows XP
64-Bit Edition SP1 Patches available at:                                       CAN-2005-0045                        US-CERT Technical
(Itanium), Windows http://www.microsoft.com/                                                                        Cyber Security Alert
XP 64-Bit Edition  technet/security/bulletin/                                                                       TA05-039A
Version 2003       MS05-011.mspx
(Itanium), Windows                                                                                                  US-CERT Cyber Security
Server 2003,       Microsoft Windows NT 4.0 has also been found                                                     Alert SA05-039A
Windows Server     vulnerable to the issue; however, this platform is no
2003 for           longer publicly supported by Microsoft. A patch is                                               US-CERT Vulnerability
Itanium-based      available for customers that have an active end-of-life                                          Note VU#652537
Systems            support agreement including extended Windows NT 4.0
                   support. Information regarding the end-of-life support                                           Security Focus, 12484,
                   agreement can be found at the following location:                                                March 9, 2005
                   http://www.microsoft.com/
                   presspass/features/2004/                                                                         Security Focus, Bugtraq
                   dec04/12-03NTSupport.asp                                                                         ID: 12484, June 23, 2005

                     An exploit has been published.
MyInternet           A javascript spoofing vulnerability has been reported in     MyInternet Browser       Medium   Security Tracker Alert ID:
                     MyInternet Browser that could let remote malicious           Javascript Spoofing               1014295, June 27, 2005
MyInternet Browser   users spoof Javascript dialog boxes.
V10.0.0.0
                     No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
NetCaptor            A javascript spoofing vulnerability has been reported in      NetCaptor Browser       Medium   Security Tracker Alert ID:
                     NetCaptor Browser that could let remote malicious            Javascript Spoofing               1014265, June 22, 2005
NetCaptor Browse     users spoof Javascript dialog boxes.
V7.5.4
                     No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
Omni                 A javascript spoofing vulnerability has been reported in Omni Browser Javascript      Medium   Security Tracker Alert ID:
                     NetCaptor Browser that could let remote malicious               Spoofing                       1014286, June 23, 2005
Omni Browser 2.0     users spoof Javascript dialog boxes.

                     No workaround or patch available at time of publishing.

                     A Proof of Concept exploit has been published.
Optimal Access       A javascript spoofing vulnerability has been reported in       Optimal Desktop         Medium    Security Tracker Alert ID:
                     Optimal Desktop that could let remote malicious users        Javascript Spoofing                 1014298, June 27, 2005
Optimal Desktop      spoof Javascript dialog boxes.
V4.00
                     No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
Sofotex              A vulnerability has been reported in BisonFTP Server       BisonFTP Server Denial       Low      Security Focus, Bugtraq
                     that could allow remote malicious users to perform a             of Service                      ID: 14079, June 28, 2005
BisonFTP Server      Denial of Service.
V4R1                                                                                CAN-2005-2078
                     No workaround or patch available at time of publishing.

                     An exploit has been published.
Sukru Alatas         A vulnerability has been reported in Sukru Alatas          Sukru Alatas Guestbook      Medium    Secunia Advisory:
                     Guestbook that could allow database disclosure to           Database Disclosure                  SA15832, June 28, 2005
Sukru Alatas         remote malicious users.
Guestbook V3.1
                     No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
TCP-IP Datalook 1.3 A vulnerability has been reported in TCP-IP Datalook        TCP-IP Datalook Denial       Low      Security Tracker Alert ID:
                    that could let a local malicious user perform a Denial of         of Service                      1014291, June 26, 2005
                    Service.

                     No workaround or patch available at time of publishing.

                     An exploit has been published.
Telligent Systems    A vulnerability has been reported in Community Server         Community Server          High     Security Focus, Bugtraq
                     Forums that could let a remote malicious user perform         Forums Cross-Site                  ID: 14078, June 28, 2005
Community Server     Cross-Site Scripting attacks.                                     Scripting
Forums
                     No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.
True North Software An IMAP list command validation vulnerability has been IA eMailServer Denial of          Low      Secunia Advisory:
Inc.                reported in IA eMailServer that could let remote               Service                            SA15838, June 28, 2005
                    malicious users perform a Denial of Service.
IA eMailServer
V5.2.2              Upgrade to version 5.3.4 Build 2019.

                     An exploit script has been published.
Veritas             Multiple vulnerabilities have been reported in Veritas       Veritas Backup Exec         High     Secunia, Advisory:
                    Backup Exec that could let remote malicious users            Multiple Vulnerabilities             SA15789, June 23, 2005
Veritas Backup Exec perform arbitrary code execution, elevate privileges,
10.0                perform a DoS, or even crash systems.                           CAN-2005-0771                     VERITAS Security
                                                                                    CAN-2005-0772                     Advisory VX05-006,
                     A patch is available from the vendor:                          CAN-2005-0773                     VX05-007, VX05-008,
                     http://seer.support.veritas.com/                                                                 June 23, 3005
                     docs/277429.htm
                                                                                                                      US-CERT VU#584505,
                     Currently we are not aware of any exploits for this                                              VU#352625, VU#492105
                     vulnerability.
Wichio              A javascript spoofing vulnerability has been reported in      Wichio 27Tools-in-1       Medium    Security Tracker Alert ID:
                    Wichio 27Tools-in-1 Browser that could let remote             Browser Javascript                  1014297, June 27, 2005
Wichio 27Tools-in-1 malicious users spoof Javascript dialog boxes.                    Spoofing
Browser V4.2
                    No workaround or patch available at time of publishing.

                     There is no exploit code required; however, a Proof of
                     Concept exploit has been published.

[back to top]


UNIX / Linux Operating Systems Only
                                      Vulnerability - Impact
  Vendor & Software                                                               Common Name /
                                     Patches - Workarounds                                                    Risk                  Source
       Name                                                                       CVE Reference
                                         Attacks Scripts
Adobe                   Several vulnerabilities have been reported: a                                        Medium     Secunia
                        vulnerability was reported due to an unspecified        Adobe Reader / Acrobat                  Advisory, SA15827,
Acrobat Reader 7.0.1, error, which could let a remote malicious user            Arbitrary Code Execution                June 28, 2005
7.0, Acrobat 7.0.1, 7.0 execute arbitrary programs via a specially crafted       & Elevated Privileges
                        PDF document that contains JavaScript; and a
                        vulnerability was reported in the updater because          CAN-2005-1623
                        Safari Frameworks folder permissions can be                CAN-2005-1624
                        elevated for all users when downloading updates.
                        Only UNIX running on Mac OS is affected.

                        Upgrades available at:
                         http://www.adobe.com
                         /support/downloads/

                         There is no exploit code required.
Apache                   A vulnerability has been reported that could let                                 Low     Security Tracker Alert ID:
                         remote malicious users cause a Denial of Service. A Apache SpamAssassin                  1014219,
Spam                     remote user can send e-mail containing special      Lets Remote Users Deny               June 16, 2005
Assassin 3.0.1, 3.0.2,   message headers to cause the application to take            Service
3.0.3                    an excessive amount of time to check the message.                                        Fedora Update Notifications,
                                                                                 CAN-2005-1266                    FEDORA-
                         A fixed version (3.0.4) is available at:                                                 2005-427 &
                         http://spamassassin.                                                                     428,
                         apache.org/                                                                              June 16 & 17, 2005
                         downloads.cgi
                                                                                                                  Gentoo Linux Security
                         Fedora:                                                                                  Advisory,
                         http://download.fedora.                                                                  GLSA 200506-17,
                         redhat.com/pub/fedora/                                                                   June 21, 200
                         linux/core/updates/
                                                                                                                  SUSE Security Announce-
                         Gentoo:                                                                                  ment, SUSE-SA:2005:033,
                         http://security.gentoo.org/                                                              June 22, 2005
                         glsa/glsa-200506-17.xml
                                                                                                                  RedHat
                         SUSE:                                                                                    Security Advisory,
                         ftp://ftp.SUSE.com/                                                                      RHSA-2005:
                         pub/SUSE                                                                                 498-10,
                                                                                                                  June 23, 2005
                         RedHat:
                         http://rhn.redhat.com/                                                                   Mandriva Linux Security
                         errata/RHSA-2005-498.html                                                                Update Advisory,
                                                                                                                  MDKSA-2005:106,
                         Mandriva:                                                                                June 28, 2005
                         http://www.mandriva.com/
                         security/advisories

                         There is no exploit code required.
Freedesk                 A vulnerability exists in 'bus/policy.c' due to                                 Medium   Security Tracker Alert
top.org                  insufficient restriction of connections, which could   D-BUS Session Hijack              ID,1013075, February 3, 2005
                         let a malicious user hijack a session bus.
D-BUS 0.23 & prior                                                                CAN-2005-0201                   Mandriva Linux Security
                         Patch available at:                                                                      Update Advisory,
                         https://bugs.freedesktop.org/                                                            MDKSA-2005:105,
                         show_bug.cgi?id=2436                                                                     June 24, 2005

                         Fedora:                                                                                  Ubuntu Security Notice,
                         http://download.fedora.                                                                  USN-144-1,
                         redhat.com/pub/fedora/                                                                   June 27, 2005
                         linux/core/updates/3/

                         RedHat:
                         http://rhn.redhat.com/
                         errata/RHSA-2005-102.html

                         Mandriva:
                         http://www.mandriva.com/
                         security/advisories

                         Ubuntu:
                         http://security.ubuntu.com/
                         ubuntu/pool/main/d
                         /dbus/dbus

                         There is no exploit code required.
FreeRADIUS Server        Two vulnerabilities have been reported: a                                        High    Security Tracker Alert ID:
Project                  vulnerability was reported in the 'radius_xlat()'      FreeRadius 'rlm_sql.c'            1013909, May 6, 2005
                         function call due to insufficient validation, which    SQL Injection & Buffer
FreeRADIUS 1.0.2         could let a remote malicious user execute arbitrary          Overflow                    Gentoo Linux Security
                         SQL code; and a buffer overflow vulnerability was                                        Advisory, GLSA 200505-13,
                         reported in the 'sql_escape_func()' function, which      CAN-2005-1454                   May 17, 2005
                         could let a remote malicious user execute arbitrary      CAN-2005-1455
                         code.                                                                                    SUSE Security Summary
                                                                                                                  Report, SUSE-SR:2005:014,
                         Gentoo:                                                                                  June 7, 2005
                         http://security.gentoo.org/
                         glsa/glsa-200505-13.xml                                                                  Security Focus, 13541, June
                                                                                                                  10, 2005
                         SuSE:
                         ftp://ftp.suse.com/pub/suse/                                                             RedHat
                                                                                                                  Security Advisory,
                         FreeRadius:                                                                              RHSA-2005:
                         ftp://ftp.freeradius.org/pub/                                                            524-05,
                         radius/freeradius-1.0.3.tar.gz                                                           June 23, 2005

                         RedHat:
                         http://rhn.redhat.com/
                         errata/RHSA-2005-524.html

                         There is no exploit code required.
GD Graphics Library      A vulnerability exists in the                                                      High    Secunia Advisory,
                         'gdImageCreateFromPngCtx()' function when                 GD Graphics Library              SA12996, October 28, 2004
gdlib 2.0.23,            processing PNG images due to insufficient sanity        Remote Integer Overflow
2.0.26-2.0.28; Avaya     checking on size values, which could let a remote                                          Gentoo Linux Security
Converged                malicious user execute arbitrary code.                      CAN-2004-0990                  Advisory, GLSA 200411-08,
Communi-cations                                                                      CAN-2004-0941                  November 3, 2004
Server 2.0, Intuity LX   OpenPKG:
Avaya MN100,             ftp://ftp.openpkg.org/release/                                                             Ubuntu Security Notice,
Modular Messaging                                                                                                   USN-21-1, November 9, 2004
(MSS) 1.1, 2.0,          Ubuntu:
Network Routing          http://security.ubuntu.com/                                                                Debian Security Advisories,
Avaya S8300              ubuntu/pool/main/                                                                          DSA 589-1 & 591-1,
R2.0.1,R2.0.0, S8500     libg/libgd2/                                                                               November 9, 2004
R2.0.1, R2.0.0, S8700
R2.0.1, R2.0.0, S8710    Gentoo:                                                                                    Fedora Update Notifications,
R2.0.1, R2.0.0           http://security.gentoo.org/                                                                FEDORA-2004-411 & 412,
                         glsa/glsa-200411-08.xml                                                                    November 11, 2004

                         Debian:                                                                                    Mandrakelinux Security
                         http://security.debian.org/                                                                Update Advisory,
                         pool/updates/main/libg                                                                     MDKSA-2004:132, November
                                                                                                                    15, 2004
                         Fedora:
                         http://download.fedora.                                                                    Trustix Secure Linux Security
                         redhat.com/pub/fedora/                                                                     Advisory, TSLSA-2004-0058,
                         linux/core/updates/                                                                        November 16, 2004

                         Mandrake:                                                                                  Ubuntu Security Notice,
                         http://www.mandrakesecure.                                                                 USN-25-1, November 16, 2004
                         net/en/ftp.php
                                                                                                                    SUSE Security Summary
                         Trustix:                                                                                   Report, SUSE-SR:2004:001,
                         http://http.trustix.org/pub/                                                               November 24, 2004
                         trustix/updates/
                                                                                                                    Debian Security Advisories,
                         SUSE:                                                                                      DSA 601-1 & 602-1,
                         ftp://ftp.SUSE.com/pub/SUSE                                                                November 29, 2004

                         Debian:                                                                                    Red Hat Advisory,
                         http://security.debian.org/pool                                                            RHSA-2004:638-09,
                         /updates/main/libg/libgd/                                                                  December 17, 2004

                         Red Hat:                                                                                   Avaya Security Advisory,
                         http://rhn.redhat.com/                                                                     ASA-2005-017, January 18,
                         errata/RHSA-2004-638.html                                                                  2005

                         Avaya:                                                                                     SGI Security Advisory,
                         http://support.avaya.com/                                                                  20050602-
                         elmodocs2/security/                                                                        01-U, June 23, 2005
                         ASA-2005-017_
                         RHSA-2004-638.pdf

                         SGI:
                         ftp://oss.sgi.com/projects/
                         sgi_propack/download/3/
                         updates/

                         An exploit script has been published.
gFTP                     A Directory Traversal vulnerability exists due to                                 Medium   Security Focus, February 14,
                         insufficient sanitization of input, which could let a   gFTP Remote Directory              2005
gFTP 0.1, 0.2, 0.21,     remote malicious user obtain sensitive information.           Traversal
1.0, 1.1-1.13,                                                                                                      Debian Security Advisory, DSA
2.0-2.0.17               Upgrades available at:                                      CAN-2005-0372                  686-1, February 17, 2005
                         http://www.gftp.org/
                         gftp-2.0.18.tar.gz                                                                         SUSE Security Summary
                                                                                                                    Report, SUSE-SR:2005:005,
                         Debian:                                                                                    February 18, 2005
                         http://security.debian.org/
                         pool/updates/main/g/gftp/                                                                  Gentoo Linux Security
                                                                                                                    Advisory, GLSA 200502-27,
                         Gentoo:                                                                                    February 19, 2005
                         http://security.gentoo.org/
                         glsa/glsa-200502-27.xml                                                                    Mandrakelinux Security
                                                                                                                    Update Advisory,
                         SUSE:                                                                                      MDKSA-2005:050, March 4,
                         ftp://ftp.SUSE.com/                                                                        2005
                         pub/SUSE
                                                                                                                    RedHat Security Advisory,
                         Mandrake:                                                                                  RHSA-2005:410-07, June 13,
                         http://www.mandrakesecure.                                                                 2005
                         net/en/ftp.php
                                                                                                                    Conectiva Security Advisory,
                         Conectiva:                                                                                 CLSA-2005:957, May 31, 2005
                         http://distro.conectiva.com.br/
                        atualizacoes/index.php?id=
                        a&anuncio=000957                                                                             SGI Security Advisory,
                                                                                                                     20050603-01-U, June 23,
                        RedHat:                                                                                      2005
                        http://rhn.redhat.com/
                        errata/RHSA-2005-410.html

                        SGI:
                        ftp://oss.sgi.com/projects/
                        sgi_propack/download/
                        3/updates/

                        There is no exploit code required.
GNOME                   A format string vulnerability has been reported when                                 High    Securiteam, May 22, 2005
                        invoking the program with a filename that includes       Gedit Filename Format
gEdit 2.0.2, 2.2 .0,    malicious format specifiers, which could let a remote             String                     Ubuntu Security Notice,
2.10.2                  malicious user cause a Denial of Service and                                                 USN-138-1, June 09, 2005
                        potentially execute arbitrary code.                          CAN-2005-1686
                                                                                                                     Gentoo Linux Security
                        Ubuntu:                                                                                      Advisory, GLSA 200506-09,
                        http://security.ubuntu.com/                                                                  June 11, 2005
                        ubuntu/pool/main/g/gedit/
                                                                                                                     RedHat Security Advisory,
                        Gentoo:                                                                                      RHSA-2005:499-05, June 13,
                        http://security.gentoo.org/                                                                  2005
                        glsa/glsa-200506-09.xml
                                                                                                                     Mandriva Linux Security
                        RedHat:                                                                                      Update Advisory,
                        http://rhn.redhat.com/                                                                       MDKSA-2005:102, June 16,
                        errata/RHSA-2005-499.html                                                                    2005

                        Mandriva:                                                                                    Turbolinux Security
                        http://www.mandriva.com/                                                                     Advisory,
                        security/advisories                                                                          TLSA-2005-70, June 22, 2005

                        TurboLinux:                                                                                  SGI Security Advisory,
                        ftp://ftp.turbolinux.co.jp/pub/                                                              20050603-01-U, June 23,
                        TurboLinux/TurboLinux/                                                                       2005
                        ia32/Desktop/10/updates/

                        SGI:
                        ftp://oss.sgi.com/projects/
                        sgi_propack/download
                        /3/updates/

                        An exploit has been published.
GNU                       A vulnerability has been reported when an archive is                              Medium   Bugtraq, 395703, April 13,
                          extracted into a world or group writeable directory      CPIO CHMod File                   2005
cpio 1.0-1.3, 2.4.2, 2.5, because non-atomic procedures are used, which          Permission Modification
2.5.90, 2.6               could let a malicious user modify file permissions.                                        Trustix Secure Linux
                                                                                     CAN-2005-1111                   Security Advisory,
                        Trustix:                                                                                     TSLSA-2005-0030, June 24,
                        ftp://ftp.turbolinux.co.jp/                                                                  2005
                        pub/TurboLinux/
                        TurboLinux/

                        There is no exploit code required.
GNU                     A Directory Traversal vulnerability has been                                        Medium   Bugtraq, 396429, April 20,
                        reported when invoking cpio on a malicious archive,      CPIO Directory Traversal            2005
cpio 2.6                which could let a remote malicious user obtain
                        sensitive information.                                       CAN-2005-1229                   Gentoo Linux Security
                                                                                                                     Advisory, GLSA 200506-16,
                        Gentoo:                                                                                      June 20, 2005
                        http://security.gentoo.org/
                        glsa/glsa-200506-16.xml                                                                      Trustix Secure Linux
                                                                                                                     Security Advisory,
                        Trustix:                                                                                     TSLSA-2005-0030, June 24,
                        ftp://ftp.turbolinux.co.jp/                                                                  2005
                        pub/TurboLinux/
                        TurboLinux/

                        A Proof of Concept exploit has been published.
GNU                    A Directory Traversal vulnerability has been                                     Medium   Bugtraq, 396397, April 20,
                       reported due to an input validation error when using         GNU GZip                     2005
gzip 1.2.4 a, 1.2.4,   'gunzip' to extract a file with the '-N' flag, which     Directory Traversal
1.3.3-1.3.5            could let a remote malicious user obtain sensitive                                        Ubuntu Security Notice,
                       information.                                              CAN-2005-1228                   USN-116-1,
                                                                                                                 May 4, 2005
                       Ubuntu:
                       http://security.ubuntu.com/                                                               Trustix Secure Linux Security
                       ubuntu/pool/main/g/gzip/                                                                  Advisory,
                                                                                                                 TSLSA-2005-0018,
                       Trustix:                                                                                  May 6, 2005
                       http://http.trustix.org/
                       pub/trustix/updates/                                                                      Gentoo Linux Security
                                                                                                                 Advisory, GLSA 200505-05,
                       Gentoo:                                                                                   May 9, 2005
                       http://security.gentoo.org/
                       glsa/glsa-200505-05.xml                                                                   Security Focus,13290, May 11,
                                                                                                                 2005
                       IPCop:
                       http://ipcop.org/modules.php?                                                             Mandriva Linux Security
                       op=modload&name=                                                                          Update Advisory,
                       Downloads&file=index                                                                      MDKSA-2005:092, May 19,
                       &req=viewdownload                                                                         2005
                       &cid=3&orderby=dateD
                                                                                                                 Turbolinux Security Advisory,
                       Mandriva:                                                                                 TLSA-2005-59, June 1, 2005
                       http://www.mandriva.com/
                       security/advisories                                                                       FreeBSD
                                                                                                                 Security Advisory,
                       TurboLinux:                                                                               FreeBSD-SA-05:11, June 9,
                       ftp://ftp.turbolinux.co.jp/pub/                                                           2005
                       TurboLinux/TurboLinux/ia32/
                                                                                                                 OpenPKG Security Advisory,
                       FreeBSD:                                                                                  OpenPKG-SA-2005.009, June
                       ftp://ftp.FreeBSD.org/pub/                                                                10, 2005
                       FreeBSD/CERT/patches/
                       SA-05:11/gzip.patch                                                                       RedHat Security Advisory,
                                                                                                                 RHSA-2005:357-19, June 13,
                       OpenPKG:                                                                                  2005
                       http://www.openpkg.org/
                       security/OpenPKG-                                                                         SGI Security Advisory,
                       SA-2005.009-openpkg.html                                                                  20050603-01-U, June 23,
                                                                                                                 2005
                       RedHat:
                       http://rhn.redhat.com/
                       errata/RHSA-2005-357.html

                       SGI:
                       ftp://oss.sgi.com/projects/
                       sgi_propack/download/
                       3/updates/

                       Proof of Concept exploit has been published.
GNU                    A vulnerability has been reported that could let a                               Medium   Secunia Advisory, SA15496,
                       local malicious user gain escalated privileges. The     GNU shtool Insecure               May 25, 2005
shtool 2.0.1 & prior   vulnerability is caused due to temporary files being   Temporary File Creation
                       created insecurely.                                                                       Gentoo Linux Security
                                                                                 CAN-2005-1751                   Advisory, GLSA 200506-08,
                       Gentoo:                                                                                   June 11, 200
                       http://security.gentoo.org/
                       glsa/glsa-200506-08.xml                                                                   OpenPKG Security Advisory,
                                                                                                                 OpenPKG-SA-2005.011,
                       OpenPKG:                                                                                  June 23, 2005
                       ftp://ftp.openpkg.org/
                       release/2.3

                       There is no exploit code required.
GNU                    A vulnerability has been reported when an archive is                             Medium   Security Focus,
                       extracted into a world or group writeable directory, GNU GZip File Permission             12996,
gzip 1.2.4, 1.3.3      which could let a malicious user modify file              Modification                    April 5, 2005
                       permissions.
                                                                               CAN-2005-0988                     Ubuntu Security Notice,
                       Ubuntu:                                                                                   USN-116-1,
                       http://security.ubuntu.com/                                                               May 4, 2005
                       ubuntu/pool/main/g/gzip/
                                                                                                                 Trustix Secure Linux Security
                       Trustix:                                                                                  Advisory,
                       http://http.trustix.org/                                                                  TSLSA-2005-0018,
                       pub/trustix/updates/                                                                      May 6, 2005

                       Gentoo:                                                                                   Gentoo Linux Security
                       http://security.gentoo.org/                                                               Advisory, GLSA 200505-05,
                       glsa/glsa-200505-05.xml                                                                   May 9, 2005

                       Mandriva:                                                                                 Mandriva Linux Security
                       http://www.mandriva.com/                                                                  Update Advisory,
              security/advisories                                                                        MDKSA-2005:092,
                                                                                                         May 19, 2005
              TurboLinux:
              ftp://ftp.turbolinux.co.jp/pub/                                                            Turbolinux Security Advisory,
              TurboLinux/TurboLinux/ia32/                                                                TLSA-2005-59, June 1, 2005

              FreeBSD:                                                                                   FreeBSD Security Advisory,
              ftp://ftp.FreeBSD.org/pub/                                                                 FreeBSD-SA-05:11, June 9,
              FreeBSD/CERT/patches/                                                                      2005
              SA-05:11/gzip.patch
                                                                                                         RedHat Security Advisory,
              RedHat:                                                                                    RHSA-2005:357-19, June 13,
              http://rhn.redhat.com/                                                                     2005
              errata/RHSA-2005-357.html
                                                                                                         SGI Security Advisory,
              SGI:                                                                                       20050603-01-U, June 23,
              ftp://oss.sgi.com/projects/                                                                2005
              sgi_propack/download
              /3/updates/

              There is no exploit code required.
GNU           A vulnerability exists which could permit a remote                                Medium   Security Tracker Alert ID:
              malicious user to create or overwrite files on the  GNU wget File Creation &               1012472, December 10, 2004
wget 1.9.1    target user's system. wget does not properly              Overwrite
              validate user-supplied input. A remote user can                                            SUSE Security Summary
              bypass the filtering mechanism if DNS can be           CAN-2004-1487                       Report, SUSE-SR:2005:004,
              modified so that '..' resolves to an IP address. A     CAN-2004-1488                       February 11, 2005
              specially crafted HTTP response can include control
              characters to overwrite portions of the terminal                                           SUSE Security Summary
              window.                                                                                    Report, SUSE-SR:2005:006,
                                                                                                         February 25, 2005
              SUSE:
              ftp://ftp.SUSE.com                                                                         SUSE Security Summary
              /pub/SUSE                                                                                  Report, SUSE-SR:2005:011,
                                                                                                         April 15, 2005
              Mandriva:
              http://www.mandriva.com/                                                                   Mandriva Linux Security
              security/advisories                                                                        Update Advisory,
                                                                                                         MDKSA-2005:098, June 9,
              Trustix:                                                                                   2005
              http://http.trustix.org/
              pub/trustix/updates/                                                                       Trustix Secure Linux Security
                                                                                                         Advisory, TLSA-2005-0028,
              RedHat:                                                                                    June 13, 2005
              http://rhn.redhat.com/
              errata/RHSA-2005-357.html                                                                  Turbolinux Security Advisory,
                                                                                                         TLSA-2005-66, June 15, 2005
              TurboLinux:
              ftp://ftp.turbolinux.co.jp/pub/                                                            Ubuntu Security Notice,
              TurboLinux/TurboLinux/ia32/                                                                USN-145-1, June 28, 2005

              Ubuntu:
              http://security.ubuntu.com/
              ubuntu/pool/main/w/wget/

              A Proof of Concept exploit script has been
              published.
GNU           A vulnerability has been reported in 'zgrep.in' due to                             High    Security Tracker Alert,
              insufficient validation of user-supplied arguments,        Gzip Zgrep Arbitrary            1013928, May 10, 2005
zgrep 1.2.4   which could let a remote malicious user execute            Command Execution
              arbitrary commands.                                                                        Mandriva Linux Security
                                                                           CAN-2005-0758                 Update Advisory,
              A patch for 'zgrep.in' is available in the following bug                                   MDKSA-2005:092, May 19,
              report:                                                                                    2005
              http://bugs.gentoo.org/
              show_bug.cgi?id=90626                                                                      Turbolinux Security Advisory,
                                                                                                         TLSA-2005-59, June 1, 2005
              Mandriva:
              http://www.mandriva.com/                                                                   RedHat Security Advisory,
              security/advisories                                                                        RHSA-2005:357-19, June 13,
                                                                                                         2005
              TurboLinux:
              ftp://ftp.turbolinux.co.jp/pub/                                                            RedHat Security Advisory,
              TurboLinux/TurboLinux/ia32/                                                                RHSA-2005:474-15, June 16,
                                                                                                         2005
              RedHat:
              http://rhn.redhat.com/                                                                     SGI Security Advisory,
              errata/RHSA-2005-357.html                                                                  20050603-01-U, June 23,
                                                                                                         2005
              RedHat:
              http://rhn.redhat.com/                                                                     Fedora Update Notification,
              errata/RHSA-2005-474.html                                                                  FEDORA-2005-471, June 27,
                                                                                                         2005
              SGI:
              ftp://oss.sgi.com/projects/
              sgi_propack/download/
                          3/updates/

                          Fedora:
                          http://download.fedora.
                          redhat.com/pub/fedora/
                          linux/core/updates/3/

                          There is no exploit code required.
LibTIFF                   A buffer overflow vulnerability has been reported in                              High    Gentoo Linux Security
                          the 'TIFFOpen()' function when opening malformed         LibTIFF TIFFOpen                 Advisory, GLSA 200505-07,
LibTIFF 3.4,              TIFF files, which could let a remote malicious user    Remote Buffer Overflow             May 10, 2005
3.5.1-3.5.5, 3.5.7, 3.6   execute arbitrary code.
.0, 3.6.1, 3.7, 3.7.1                                                               CAN-2005-1544                   Ubuntu Security Notice,
                          Patches available at:                                     CAN-2005-1472                   USN-130-1, May 19, 2005
                          http://bugzilla.remotesensing.org/
                          attachment.cgi?id=238                                                                     SUSE Security Summary
                                                                                                                    Report, SUSE-SR:2005:014,
                          Gentoo:                                                                                   June 7, 2005
                          http://security.gentoo.org/
                          glsa/glsa-200505-07.xml                                                                   Turbolinux Security
                                                                                                                    Advisory, TLSA-2005-72,
                          Ubuntu:                                                                                   June 28, 2005
                          http://security.ubuntu.com/
                          ubuntu/pool/main/t/tiff/

                          SuSE:
                          ftp://ftp.suse.com/pub/suse/

                          TurboLinux:
                          ftp://ftp.turbolinux.co.jp/pub/
                          TurboLinux/TurboLinux/ia32/

                          Currently we are not aware of any exploits for this
                          vulnerability.
Linux Support            A buffer overflow vulnerability has been reported in     Linux Support Services    High    Security Tracker Alert,
Services, Inc.           the manager interface due to insufficient bounds            Asterisk Manager               1014268, June 22, 2005
                         checks, which could let a remote malicious user         Interface Remote Buffer
Asterisk 1.0.7, Asterisk execute arbitrary code. Note: The manager interface             Overflow
CVS HEAD                 is not enabled by default.

                          Updates available at:
                          http://www.asterisk.org/
                          index.php?menu=download

                          Currently we are not aware of any exploits for this
                          vulnerability.
Multiple Vendors          A vulnerability was reported in FreeBSD when using                               Medium   FreeBSD Security Advisory,
                          Hyper-Threading Technology due to a design error, Multiple Vendor FreeBSD                 FreeBSD-SA-05:09, May 13,
FreeBSD 5.4 & prior       which could let a malicious user obtain sensitive     Hyper-Threading                     2005
                          information and possibly elevated privileges.       Technology Support
                                                                             Information Disclosure                 SCO Security Advisory,
                          Patches and updates available at:                                                         SCOSA-2005.24, May 13,
                          ftp://ftp.freebsd.org/pub/FreeBSD/                     CAN-2005-0109                      2005
                          CERT/advisories/
                          FreeBSD-SA-05:09.htt.asc                                                                  Ubuntu Security Notice,
                                                                                                                    USN-131-1, May 23, 2005
                          SCO:
                          ftp://ftp.sco.com/pub/updates/                                                            US-CERT VU#911878
                          UnixWare/SCOSA-2005.24
                                                                                                                    RedHat Security Advisory,
                          Ubuntu:                                                                                   RHSA-2005:476-08, June 1,
                          http://security.ubuntu.com/                                                               2005
                          ubuntu/pool/main/l/
                                                                                                                    Sun(sm) Alert Notification,
                          RedHat:                                                                                   101739, June 1, 2005
                          http://rhn.redhat.com/
                          errata/RHSA-2005-476.html                                                                 Mandriva Linux Security
                                                                                                                    Update Advisory,
                          Sun:                                                                                      MDKSA-2005:096, June 7,
                          http://sunsolve.sun.com/                                                                  2005
                          search/document.do?
                          assetkey=1-26-101739-1                                                                    Trustix Secure Linux Security
                                                                                                                    Advisory, TLSA-2005-0028,
                          Mandriva:                                                                                 June 13, 2005
                          http://www.mandriva.com/
                          security/advisories                                                                       SGI Security Advisory,
                                                                                                                    20050602-01-U, June 23,
                          Trustix:                                                                                  2005
                          ftp://ftp.trustix.org/pub/trustix/
                          updates/

                          SGI:
                          ftp://oss.sgi.com/projects/
                          sgi_propack/download/
                          3/updates/
                       Currently we are not aware of any exploits for this
                       vulnerability.
Multiple Vendors       A remote Denial of Service vulnerability exists in                                 Low     Security Focus, November 15,
                       'ms_fnmatch()' function due to insufficient input     Multiple Vendors Samba               2004
Gentoo Linux;          validation.                                           Remote Wild Card Denial
Samba Samba                                                                          of Service                   Trustix Secure Linux Security
3.0-3.0.7              Patch available at:                                                                        Advisory, TSLSA-2004-0058,
                       http://us4.samba.org/samba/                               CAN-2004-0930                    November 16, 2004
                       ftp/patches/security/samba-
                       3.0.7-CAN-2004-0930.patch                                                                  RedHat Security Advisory,
                                                                                                                  RHSA-2004:632-17,
                       Gentoo:                                                                                    November 16, 2004
                       http://security.gentoo.org/
                       glsa/glsa-200411-21.xml                                                                    Conectiva Linux Security
                                                                                                                  Announce-
                       Mandrake:                                                                                  ment, CLA-2004:899,
                       http://www.mandrakesecure.                                                                 November 25, 2004
                       net/en/ftp.php
                                                                                                                  Fedora Update Notifications,
                       SuSE:                                                                                      FEDORA-2004-459 & 460,
                       ftp://ftp.suse.com/pub/suse/                                                               November 29, 2004
                       i386/update/
                                                                                                                  Turbolinux Security Advisory,
                       Ubuntu:                                                                                    TLSA-2004-32, December 8,
                       http://security.ubuntu.com/                                                                2004
                       ubuntu/pool/main/s/samba/
                                                                                                                  SGI Security Advisory,
                       RedHat:                                                                                    20041201-01-P, December 13,
                       http://rhn.redhat.com/                                                                     2004
                       errata/RHSA-2004-632.html
                                                                                                                  OpenPKG Security Advisory,
                       Trustix:                                                                                   OpenPKG-SA-2004.054
                       http://http.trustix.org/pub/                                                               December 17, 2004
                       trustix/updates/
                                                                                                                  SCO Security Advisory,
                       Conectiva:                                                                                 SCOSA-2005.17, March 7,
                       ftp://atualizacoes.conectiva.                                                              2005
                       com.br/
                                                                                                                  Sun(sm) Alert Notification,
                       Fedora:                                                                                    101783, June 23, 2005
                       http://download.fedora.
                       redhat.com/pub/fedora/
                       linux/core/updates/

                       SGI:
                       http://www.sgi.com/
                       support/security/

                       TurboLinux:
                       ftp://ftp.turbolinux.co.jp
                       /pub/TurboLinux
                       /TurboLinux/ia32/
                       Server/10/updates/

                       OpenPKG:
                       http://www.openpkg.org/
                       security.html

                       SCO:
                       ftp://ftp.sco.com/pub/updates/
                       UnixWare/SCOSA-2005.17

                       Sun:
                       http://sunsolve.sun.com/
                       search/document.do?
                       assetkey=1-26-101783-1

                       There is no exploit code required.
Multiple Vendors       A vulnerability has been reported because             Linux Kernel Unauthorized   Medium   Security Focus, 14040, June
                       commands sent to a SCSI device can change the              SCSI Command                    23, 2005
Linux kernel           driver parameters, which could let a malicious user
2.6.1-2.6.11, 2.6      obtain unauthorized access.
test1-test11
                       Updates available at:
                       http://kernel.org/pub/linux/|
                       kernel/v2.6/testing/
                       ChangeLog-2.6.12-rc1

                       Currently we are not aware of any exploits for this
                       vulnerability.
Multiple Vendors     A remote Denial of Service vulnerability has been                                    Low     Security Tracker Alert,
                     reported in the 'bgp_update_print()' function in      TCPDump BGP Decoding                   1014133, June 8, 2005
RedHat Fedora Core3; 'print-bgp.c' when a malicious user submits specially Routines Denial of Service
LBL tcpdump 3.9.1,   crafted BGP protocol data.                                                                   Fedora Update Notification,
3.9, 3.8.1-3.8.3,                                                               CAN-2005-1267                     FEDORA-2005-406, June 9,
3.7-3.7.2, 3.6.3, 3.6.2,                                                                                            2005
3.5.2, 3.5, alpha, 3.4,    Update available at:
3.4 a6                     http://cvs.tcpdump.org/cgi-bin/                                                          Trustix Secure Linux Security
                           cvsweb/tcpdump/print-bgp.c                                                               Advisory, TLSA-2005-0028,
                                                                                                                    June 13, 2005
                           Fedora:
                           http://download.fedora.                                                                  Mandriva Linux Security
                           redhat.com/pub/fedora/                                                                   Update Advisory,
                           linux/core/updates/3/                                                                    MDKSA-2005:101, June 15,
                                                                                                                    2005
                           Trustix:
                           ftp://ftp.trustix.org/pub/trustix/                                                       Fedora Update Notification,
                           updates/                                                                                 FEDORA-2005-407, June 16,
                                                                                                                    2005
                           Mandriva:
                           http://www.mandriva.com/                                                                 Ubuntu Security Notice,
                           security/advisories                                                                      USN-141-1, June 21, 2005

                           Fedora:                                                                                  Turbolinux Security
                           http://download.fedora.                                                                  Advisory, TLSA-2005-69,
                           redhat.com/pub/fedora/                                                                   June 22, 2005
                           linux/core/updates/4/

                           Ubuntu:
                           http://security.ubuntu.com/
                           ubuntu/pool/main/t/tcpdump/

                           TurboLinux:
                           ftp://ftp.turbolinux.co.jp
                           /pub/TurboLinux/
                           TurboLinux/ia32/

                           A Proof of Concept exploit script has been
                           published.
Multiple Vendors           A vulnerability exists when using the Netscape                                  Medium   Secunia Advisory, SA14451,
                           Set-Cookie recommendations for handling cookies        Squid Proxy Set-Cookie            March 3, 2005
Squid Web                  in caches due to a race condition, which could let a    Headers Information
Proxy Cache 2.5            malicious user obtain sensitive information.                 Disclosure                  Ubuntu Security
.STABLE9, .STABLE8,                                                                                                 Notice,
.STABLE7            Patches available at:                                            CAN-2005-0626                  USN-93-1
                    http://www.squid-cache.org/                                                                     March 08, 2005
                    Versions/v2/2.5/bugs/
                    squid-2.5.STABLE9-                                                                              Fedora Update Notifications,
                    setcookie.patch                                                                                 FEDORA-2005-
                                                                                                                    275 & 276,
                           Ubuntu:                                                                                  March 30, 2005
                           http://security.ubuntu.com/
                           ubuntu/pool/main/s/squid/                                                                Conectiva Linux Security
                                                                                                                    Announce-
                           Fedora:                                                                                  ment, CLA-2005:948, April 27,
                           http://download.fedora.                                                                  2005
                           redhat.com/pub/fedora/
                           linux/core/updates/                                                                      Mandriva Linux Security
                                                                                                                    Update Advisory,
                           Conectiva:                                                                               MDKSA-2005:078, April 29,
                           ftp://atualizacoes.                                                                      2005
                           conectiva.com.br/
                                                                                                                    RedHat Security Advisory,
                           Mandrake:                                                                                RHSA-2005:415-16, June 14,
                           http://www.mandrakesecure.                                                               2005
                           net/en/ftp.php
                                                                                                                    Turbolinux Security
                           RedHat:                                                                                  Advisory, TLSA-2005-71,
                           http://rhn.redhat.com/                                                                   June 28, 2005
                           errata/RHSA-2005-415.html

                           TurboLinux:
                           ftp://ftp.turbolinux.co.jp/
                           pub/TurboLinux/
                           TurboLinux/ia32/

                           There is no exploit code required.
Multiple Vendors           Multiple vulnerabilities have been reported: a heap                              High    Gentoo Linux Security
                           overflow vulnerability was reported when loading           GDB Multiple                  Advisory, GLSA 200505-15,
Gentoo Linux;              malformed object files, which could let a remote           Vulnerabilities               May 20, 2005
GNU GDB 6.3                malicious user execute arbitrary code; and a
                           vulnerability was reported which could let a              CAN-2005-1704                  Turbolinux Security
                           malicious user obtain elevated privileges.                CAN-2005-1705                  Advisory, TLSA-2005-68,
                                                                                                                    June 22, 2005
                           Gentoo:
                           http://security.gentoo.org/
                           glsa/glsa-200505-15.xml

                           Ubuntu:
                           http://security.ubuntu.com/
                           ubuntu/pool/main/g/gdb/
                           http://security.ubuntu.com/
                           ubuntu/pool/main/b/binutils/

                           Mandriva:
                           http://www.mandriva.com/
                           security/advisories

                           Trustix:
                           http://http.trustix.org/pub/
                           trustix/updates/

                           TurboLinux:
                           ftp://ftp.turbolinux.co.jp/
                           pub/TurboLinux/
                           TurboLinux/ia32/

                           Currently we are not aware of any exploits for these
                           vulnerabilities.
Multiple Vendors         Multiple vulnerabilities exist: a vulnerability exists                                           Security Tracker Alert ID,
                         when decoding BMP images, which could let a               gdk-pixbug BMP, ICO,        Low/High   1011285, September 17, 2004
GNU Debian Linux 3.0, remote malicious user cause a Denial of Service; a              and XPM Image
sparc, s/390, ppc,       vulnerability exists when decoding XPM images,              Processing Errors          (High if    Gentoo Linux Security
mipsel, mips, m68k,      which could let a remote malicious user cause a                                     arbitrary code Advisory, GLSA 200409-28,
ia-64, ia-32, hppa, arm, Denial of Service or execute arbitrary code; and a           CAN-2004-0753             can be      September 21, 2004
alpha;                   vulnerability exists when attempting to decode ICO           CAN-2004-0782            executed)
GNOME gdk-pixbug         images, which could let a remote malicious user              CAN-2004-0783                         US-CERT VU#577654,
0.22 & prior; GTK        cause a Denial of Service.                                   CAN-2004-0788                         VU#369358, VU#729894,
GTK+ 2.0.2, 2.0.6,                                                                                                          VU#825374, October 1, 2004
2.2.1, 2.2.3, 2.2.4;     Debian:
MandrakeSoft Linux       http://security.debian.org/pool/                                                                 Conectiva Linux Security
Mandrake 9.2, amd64, updates/main/g/gdk-pixbuf/                                                                           Announce-
10.0, AMD64;                                                                                                              ment, CLA-2004:875, October
RedHat Advanced          Fedora:                                                                                          18, 2004
Workstation for the      http://download.fedora.
Itanium Processor 2.1, redhat.com/pub/fedora/                                                                             Fedora Legacy Update
IA64, Desktop 3.0,       linux/core/updates/                                                                              Advisory, FLSA:2005,
Enterprise Linux WS 3,                                                                                                    February 24, 2005
WS 2.1 IA64, WS 2.1, Mandrake:
                                                                                                                          Sun(sm) Alert Notification,
ES 3, ES 2.1 IA64, ES http://www.mandrakesecure.net/
                                                                                                                          101776, June 23, 2005
2.1, AS 3, AS 2.1 IA64, en/ftp.php
AS 2.1,
RedHat Fedora            RedHat:
Core1&2;                 http://download.fedora.
SuSE. Linux 8.1, 8.2, redhat.com/pub/fedora/
9.0, x86_64, 9.1,        linux/core/updates/
Desktop 1.0,
                         SuSE:
Enterprise Server 9, 8
                         ftp://ftp.suse.com/pub/suse/

                           Gentoo:
                           http://security.gentoo.org/
                           glsa/glsa-200409-28.xml

                           Conectiva:
                           ftp://atualizacoes.conectiva.
                           com.br/

                           Fedora:
                           http://download.fedoralegacy.org/
                           redhat/

                           Sun:
                           http://sunsolve.sun.com/
                           search/document.do?
                           assetkey=1-26-101776-1

                           We are not aware of any exploits for these
                           vulnerabilities.
Multiple Vendors           A remote Denial of Service vulnerability has been                                     Low      Gentoo Linux Security
                           reported due to a failure to handle malformed XWD           ImageMagick &                      Advisory, GLSA 200505-16,
Graphics                   image files.                                             GraphicsMagick XWD                    May 21, 2005
Magick Graphics                                                                   Decoder Remote Denial of
Magick 1.0, 1.0.6, 1.1,    Gentoo:                                                        Service                         Ubuntu Security Notice,
1.1.3-1.1.6;               http://security.gentoo.org/                                                                    USN-132-1, May 23, 2005
ImageMagick                glsa/glsa-200505-16.xml                                    CAN-2005-1739
ImageMagick 5.3.3,                                                                                                        Fedora Update Notification,
5.3.8, 5.4.3, 5.4.4 .5,    Ubuntu:                                                                                        FEDORA-2005-395, May 26,
5.4.7, 5.4.8,              http://security.ubuntu.com/                                                                    2005
5.5.3.2-1.2.0, 5.5.4,      ubuntu/pool/main/i/
5.5.6 .0-20030409,         imagemagick/                                                                                   RedHat Security Advisory,
5.5.6, 5.5.7, 6.0-6.0.8,                                                                                                  RHSA-2005:480-03, June 2,
6.1-6.1.8, 6.2.0.7, 6.2    Fedora:                                                                                        2005
.0.4, 6.2-6.2.2            http://download.fedora.
                           redhat.com/pub/fedora/                                                                         SGI Security Advisory,
                           linux/core/updates/3/                                                                          20050602-01-U, June 23,
                                                                                                                       2005
                         RedHat:
                         http://rhn.redhat.com/                                                                        Mandriva Linux Security
                         errata/RHSA-2005-480.html                                                                     Update Advisory,
                                                                                                                       MDKSA-2005:107, June 28,
                         SGI:                                                                                          2005
                         ftp://oss.sgi.com/projects/
                         sgi_propack/download/
                         3/updates/

                         Mandriva:
                         http://www.mandriva.com/
                         security/advisories

                         Currently we are not aware of any exploits for this
                         vulnerability.
Multiple Vendors         A buffer overflow vulnerability has been reported in                                  High    Secunia Advisory, SA15341,
                         the 'elf_core_dump()' function due to a signedness      Linux Kernel ELF Core                 May 12, 2005
Linux kernel 2.2.x,      error, which could let a malicious user execute         Dump Buffer Overflow
2.4.x, 2.6.x             arbitrary code with ROOT privileges.                                                          Trustix Secure Linux Security
                                                                                     CAN-2005-1263                     Advisory, 2005-0022, May 13,
                         Update available at:                                                                          2005
                         http://kernel.org/
                                                                                                                       Ubuntu Security Notice,
                         Trustix:                                                                                      USN-131-1, May 23, 2005
                         http://www.trustix.org/
                         errata/2005/0022/                                                                             RedHat Security Advisory,
                                                                                                                       RHSA-2005:472-05, May 25,
                         Ubuntu:                                                                                       2005
                         http://security.ubuntu.com/
                         ubuntu/pool/main/l/                                                                           Avaya Security Advisory,
                                                                                                                       ASA-2005-120, June 3, 2005
                         RedHat:
                         http://rhn.redhat.com/                                                                        Trustix Secure Linux Bugfix
                         errata/RHSA-2005-472.html                                                                     Advisory, TSLSA-2005-0029,
                                                                                                                       June 24, 2005
                         Avaya:
                         http://support.avaya.com/
                         elmodocs2/security/
                         ASA-2005-120_
                         RHSA-2005-283_
                         RHSA-2005-284_
                         RHSA-2005-293_
                         RHSA-2005-472.pdf

                         SUSE:
                         ftp://ftp.SUSE.com/
                         pub/SUSE

                         Trustix:
                         ftp://ftp.turbolinux.co.jp/
                         pub/TurboLinux/T
                         urboLinux/

                         An exploit script has been published.
Multiple Vendors         A vulnerability has been reported in the                                             Medium   Security Tracker Alert ID:
                         'restore_sigcontext()' function due to a failure to          Linux Kernel 64 Bit              1014275, June 23, 2005
Linux kernel 2.6 prior   restrict access to the 'ar.rsc' register, which could let 'AR-RSC' Register Access
to 2.6.12.1              a malicious user cause a Denial of Service or obtain
                         elevated privileges.                                          CAN-2005-1761

                         Updates available at:
                         http://www.kernel.org/

                         Currently we are not aware of any exploits for this
                         vulnerability.
Multiple Vendors         A Denial of Service vulnerability has been reported                                   Low     Security Tracker Alert ID:
                         in the subthread exec signal processing that has a      Linux Kernel Subthread                1014274, June 23, 2005
Linux kernel 2.6 prior   timer pending.                                          Exec Denial of Service
to 2.6.12.1
                         Updates available at:                                       CAN-2005-1913
                         http://www.kernel.org/

                         Currently we are not aware of any exploits for this
                         vulnerability.
Multiple Vendors       A remote Denial of Service vulnerability exists in the                                  Low     Secunia Advisory,
                       NTLM fakeauth_auth helper when running under a               Squid NTLM                         SA13789, January 11, 2005
Squid 2.x; Gentoo      high load or for a long period of time, and a specially  fakeauth_auth Helper
Linux;Ubuntu Linux 4.1 crafted NTLM type 3 message is submitted.               Remote Denial of Service                Gentoo Linux Security Advisor,
ppc, ia64, ia32;Ubuntu                                                                                                 GLSA 200501-25, January 17,
Linux 4.1 ppc, ia64,   Patch available at:                                         CAN-2005-0096                       2005
ia32; Conectiva Linux http://www.squid-cache.org/
9.0, 10.0              Versions/v2/2.5/bugs/                                                                           Ubuntu Security Notice,
                       squid-2.5.STABLE7-                                                                              USN-67-1, January 20, 2005
                       fakeauth_auth.patch
                                                                                                                       Conectiva Linux Security
                                                                                                                   Announce-
                       Gentoo:                                                                                     ment, CLA-2005:923, January
                       http://security.gentoo.org/                                                                 26, 2005
                       glsa/glsa-200501-25.xml
                                                                                                                   Fedora Update Notifications,
                       Ubuntu:                                                                                     FEDORA-2005-105 & 106,
                       http://security.ubuntu.com/                                                                 February 1, 2005
                       ubuntu/pool/main/
                                                                                                                   SUSE Security Summary
                       Conectiva:                                                                                  Report, SUSE-SR:2005:003,
                       ftp://atualizacoes.conectiva.                                                               February 4, 2005
                       com.br/
                                                                                                                   SUSE Security Announce-
                       Fedora:                                                                                     ment, SUSE-SA:2005:006,
                       http://download.fedora.                                                                     February 10, 2005
                       redhat.com/pub/fedora/
                       linux/core/updates                                                                          Trustix Secure Linux Security
                                                                                                                   Advisory, TSLSA-2005-0003,
                       RedHat:                                                                                     February 11, 2005
                       http://rhn.redhat.com/errata/
                       RHSA-2005-061.html                                                                          RedHat Security Advisory,
                                                                                                                   RHSA-2005:061-19, February
                       SUSE:                                                                                       11, 2005
                       ftp://ftp.suse.com/pub/suse/
                                                                                                                   Security Focus, 12324, March
                       Trustix:                                                                                    7, 2005
                       http://www.trustix.org/
                       errata/2005/0003/                                                                           Turbolinux Security
                                                                                                                   Advisory, TLSA-2005-71,
                       Astaro:                                                                                     June 28, 2005
                       http://www.astaro.org/
                       showflat.php?Cat=&Number=
                       56136&page=0&view=collapsed
                       &sb=5&o=&fpart=1#56136

                       TurboLinux:
                       ftp://ftp.turbolinux.co.jp/
                       pub/TurboLinux/
                       TurboLinux/ia32/

                       Currently we are not aware of any exploits for this
                       vulnerability.
Multiple Vendors       A vulnerability has been reported when handling                                    Medium   Squid Proxy Cache Security
                       upstream HTTP agents, which could let a remote            Squid Proxy Remote                Update Advisory,
Squid Web Proxy        malicious user poison the web proxy cache.                 Cache Poisoning                  SQUID-2005:4, April 23, 2005
Cache 2.0 PATCH2,
2.1 PATCH2, 2.3        Patches available at:                                       CAN-2005-0174                   Fedora Update Notification,
STABLE5, 2.3           http://www.squid-cache.org/                                                                 FEDORA-2005-373, May 17,
STABLE4, 2.4           Versions/v2/2.5/squid-                                                                      2005
STABLE7, 2.4           2.5.STABLE9.tar.gz
STABLE6, 2.4,                                                                                                      Turbolinux Security
STABLE2, 2.5           Fedora:                                                                                     Advisory, TLSA-2005-71,
STABLE3-STABLE7,       http://download.fedora.                                                                     June 28, 2005
2.5 STABLE1            redhat.com/pub/fedora/
                       linux/core/updates/3/

                       TurboLinux:
                       ftp://ftp.turbolinux.co.jp/
                       pub/TurboLinux/
                       TurboLinux/ia32/

                       There is no exploit code required.
OpenSSL Project        A vulnerability exists due to the insecure creation of          OpenSSL            Medium   Trustix Secure Linux Bugfix
                       temporary files, which could possibly let a malicious    Insecure Temporary File            Advisory, TSL-2004-0050,
OpenSSL 0.9.6, 0.9.6   user overwrite arbitrary files.                                  Creation                   September 30, 2004
a-0.9.6 m, 0.9.7c
                       Trustix:                                                    CAN-2004-0975                   Gentoo Linux Security
                       ftp://ftp.trustix.org/pub/                                                                  Advisory, GLSA 200411-15,
                       trustix/updates/                                                                            November 8, 2004

                       Gentoo:                                                                                     Ubuntu Security Notice,
                       http://security.gentoo.org/                                                                 USN-24-1, November 11, 2004
                       glsa/glsa-200411-15.xml
                                                                                                                   Debian Security Advisory
                       Ubuntu:                                                                                     DSA-603-1, December 1, 2004
                       http://security.ubuntu.com/
                       ubuntu/pool/main/o/openssl/                                                                 Mandrakesoft Security
                                                                                                                   Advisory, MDKSA-2004:147,
                       Debian:                                                                                     December 6, 2004
                       http://www.debian.org/
                       security/2004/dsa-603                                                                       Turbolinux Security Announce-
                                                                                                                   ment, 20050131, January 31,
                       Mandrakesoft:                                                                               2005
                       http://www.mandrakesoft.com/
                       security/advisories?name=                                                                   SGI Security Advisory,
                       MDKSA-2004:147                                                                              20050602-01-U, June 23,
                                                                                                                   2005
                 TurboLinux:
                 ftp://ftp.turbolinux.co.jp/pub/
                 TurboLinux/TurboLinux/ia32/

                 FedoraLegacy:
                 http://download.fedora.
                 redhat.com/pub/fedora/
                 linux/core/updates/3/

                 RedHat:
                 http://rhn.redhat.com/
                 errata/RHSA-2005-476.html

                 SGI:
                 ftp://oss.sgi.com/projects/
                 sgi_propack/download
                 /3/updates/

                 There is no exploit code required.
Postgre          Two vulnerabilities have been reported: a                                                        Security Tracker Alert,
SQL              vulnerability was reported because a remote                PostgreSQL Remote         Low/ High   1013868, May 3, 2005
                 authenticated malicious user can invoke some                Denial of Service &
PostgreSQL 7.3   client-to-server character set conversion functions      Arbitrary Code Execution      (High if    Ubuntu Security Notice,
through 8.0.2    and supply specially crafted argument values to                                     arbitrary code USN-118-1, May 04, 2005
                 potentially execute arbitrary commands; and a                CAN-2005-1409             can be
                 remote Denial of Service vulnerability was reported          CAN-2005-1410            executed) Trustix Secure Linux Security
                 because the 'contrib/tsearch2' module incorrectly                                                  Advisory, TSLSA-2005-0018,
                 declares several functions as returning type                                                       May 6, 2005
                 'internal.'
                                                                                                                  Gentoo Linux Security
                 Fix available at:                                                                                Advisory, GLSA 200505-12,
                 http://www.postgresql.org/                                                                       May 16, 2005
                 about/news.315
                                                                                                                  Trustix Secure Linux Bugfix
                 Trustix:                                                                                         Advisory, TSL-2005-0023, May
                 http://http.trustix.org/                                                                         16, 2005
                 pub/trustix/updates/
                                                                                                                  Turbolinux Security Advisory ,
                 Gentoo:                                                                                          TLSA-2005-62, June 1, 2005
                 http://security.gentoo.org/
                 glsa/glsa-200505-12.xml                                                                          RedHat Security Advisory,
                                                                                                                  RHSA-2005:433-17, June 1,
                 Trustix:                                                                                         2005
                 http://www.trustix.org/
                 errata/2005/0023/                                                                                SGI Security Advisory,
                                                                                                                  20050602-01-U, June 23,
                 TurboLinux:                                                                                      2005
                 ftp://ftp.turbolinux.co.jp/pub/
                 TurboLinux/TurboLinux/ia32/

                 RedHat:
                 http://rhn.redhat.com/
                 errata/RHSA-2005-433.html

                 SGI:
                 ftp://oss.sgi.com/projects/
                 sgi_propack/download/
                 3/updates/

                 Currently we are not aware of any exploits for these
                 vulnerabilities.



Raxnet           Several vulnerabilities have been reported: an SQL                                      High     Secunia Advisory: SA15490,
                 injection vulnerability was reported in                   RaXnet Cacti Multiple                  June 23, 2005
Cacti 0.x        'config_settings.php' due to insufficient sanitization      Input Validation
                 of the 'id' parameter before using in an SQL query,                                              Gentoo Linux Security
                 which could let a remote malicious user execute             CAN-2005-1524                        Advisory, GLSA 200506-20,
                 arbitrary SQL code; and a vulnerability was reported        CAN-2005-1525                        June 22, 2005
                 in 'congif_settings.php' due to insufficient                CAN-2005-1526
                 sanitization of the 'config[include_path]' parameter
                 and in 'top_graph_header.php' due to insufficient
                 sanitization of the 'config[library_path]' parameter,
                 which could let a remote malicious user execute
                 arbitrary code.

                 Upgrades available at:
                 http://www.cacti.net/
                 download_cacti.php

                 Gentoo:
                 http://security.gentoo.org/
                 glsa/glsa-200506-20.xml

                 An exploit script has been published.
RedHat                 A vulnerability has been reported in the Sysreport                                  Medium   RedHat Security Advisory,
                       proxy due to a failure to ensure that sensitive         RedHat Linux SysReport               RHSA-2005:502-03, June 13,
sysreport 1.1-1.3,     information is not included in generated reports,          Proxy Information                 2005
Enterprise Linux WS 4, which could let a remote malicious user obtain                Disclosure
WS 3, WS 2.1 IA64,     sensitive information.                                                                       SGI Security Advisory,
WS 2.1, ES 4, ES 3,                                                                CAN-2005-1760                    20050603-01-U, June 23,
ES 2.1 IA64, ES 2.1,   Updates available at:                                                                        2005
AS 4, AS 3, AS 2.1     http://rhn.redhat.com/
IA64, AS 2.1, Desktop errata/RHSA-2005-502.html
4.0, 3.0, Advanced
Workstation for the    SGI:
Itanium Processor 2.1, ftp://oss.sgi.com/projects/
IA64                   sgi_propack/download/
                       3/updates/

                         There is no exploit code required.
Sendmail Consortium      A remote Denial of Service vulnerability has been                                  Low     Security Focus, 14047, June
                         reported in the milter interface due to the           Sendmail Milter Remote               23
Sendmail 8.8.8 , 8.9     configuration of overly long default timeouts.           Denial of Service
.0-8.9.2, 8.10-8.10.2,
8.11-8.11.7,             No workaround or patch available at time of               CAN-2005-2070
8.12.1-8.12.9, 8.12.11   publishing.

                         There is no exploit code required.
Sun Micro-systems,       Multiple buffer overflow vulnerabilities have been                                 High    Security Focus, 14049, June
Inc.                     reported when handling excessive data supplied         Sun Solaris Traceroute              24, 2005
                         through command line arguments, which could let a     Multiple Buffer Overflows
Solaris 10.0             malicious user execute arbitrary code.
                                                                                   CAN-2005-2071
                         No workaround or patch available at time of
                         publishing.

                         Proofs of Concept exploit scripts have been
                         published.
Sun Micro-systems,       A vulnerability has been reported in LD_AUDIT,'                                    High    Security Focus, 14074, June
Inc.                     which could let a malicious user obtain superuser       Sun Solaris Runtime                28, 2005
                         privileges.                                              Linker 'LD_AUDIT'
Solaris 10.0, 9.0 _x86,                                                          Elevated Privileges
9.0                     No workaround or patch available at time of
                        publishing.                                                CAN-2005-2072

                         There is no exploit code required; however, a Proof
                         of Concept exploit has been published.
Todd Miller              A race condition vulnerability has been reported                                   High    Security Focus, 13993, June
                         when the sudoers configuration file contains a        Todd Miller Sudo Local               20, 2005
Sudo 1.6-1.6.8,          pseudo-command 'ALL' that directly follows a users       Race Condition
1.5.6-1.5.9              sudoers entry, which could let a malicious user                                            Ubuntu Security Notice,
                         execute arbitrary code.                                   CAN-2005-1993                    USN-142-1, June 21, 2005

                         Upgrades available at:                                                                     Fedora Update Notifications,
                         http://www.sudo.ws/sudo/                                                                   FEDORA-2005-472 & 473,
                         dist/sudo-1.6.8p9.tar.gz                                                                   June 21, 2005

                         OpenBSD:                                                                                   Slackware Security
                         http://www.openbsd.org/                                                                    Advisory, SSA:2005-172-01,
                         errata.html                                                                                June 22, 2005

                         Ubuntu:                                                                                    Mandriva Linux Security
                         http://security.ubuntu.com/                                                                Update Advisory,
                         ubuntu/pool/main/s/sudo/                                                                   MDKSA-2005:103, June 22,
                                                                                                                    2005
                         Fedora:
                         http://download.fedora.                                                                    OpenPKG Security Advisory,
                         redhat.com/pub/fedora/                                                                     OpenPKG-SA-2005.012,
                         linux/core/updates/                                                                        June 23, 2005

                         Slackware:                                                                                 Gentoo Linux Security
                         ftp://ftp.slackware.com/                                                                   Advisory, GLSA 200506-22,
                         pub/slackware/                                                                             June 23, 2005

                         Mandriva:                                                                                  Trustix Secure Linux
                         http://www.mandriva.com/                                                                   Security Advisory,
                         security/advisories                                                                        TSLSA-2005-0030, June 24,
                                                                                                                    2005
                         OpenPKG:
                         ftp://ftp.openpkg.org/release/                                                             SUSE Security Announce-
                                                                                                                    ment, SUSE-SA:2005:036,
                         Gentoo:                                                                                    June 24, 2005
                         http://security.gentoo.org/
                         glsa/glsa-200506-22.xml                                                                    Turbolinux Security
                                                                                                                    Advisory, TLSA-2005-73,
                         SUSE:                                                                                      June 28, 2005
                         ftp://ftp.SUSE.com/
                         pub/SUSE
                        TurboLinux:
                        ftp://ftp.turbolinux.co.jp/
                        pub/TurboLinux/
                        TurboLinux/ia32/

                        There is no exploit code required.
Vipul                   Two vulnerabilities have been reported that could let                            Low    Security Focus, Bugtraq ID
                        malicious users cause a Denial of Service. This is        Vipul Razor-agents            13984, June 17, 2005
Razor-agents prior to   due to an unspecified error in the preprocessing of       Denials of Service
2.72                    certain HTML and an error in the discovery logic.                                       Gentoo Linux Security
                                                                                   CAN-2005-2024                Advisory, GLSA 200506-17,
                        Updates available at:                                                                   June 21, 2005
                        http://prdownloads.sourceforge.net/
                        razor/razor-agents-2.72.                                                                SUSE Security Announce-
                        tar.gz?down load                                                                        ment, SUSE-SA:2005:035,
                                                                                                                June 23, 2005
                        Gentoo:
                        http://security.gentoo.org/                                                             Trustix Secure Linux
                        glsa/glsa-200506-17.xml                                                                 Security Advisory,
                                                                                                                TSLSA-2005-0030, June 24,
                        SUSE:                                                                                   2005
                        ftp://ftp.SUSE.com/
                        pub/SUSE

                        Trustix:
                        ftp://ftp.turbolinux.co.jp/
                        pub/TurboLinux/
                        TurboLinux/

                        Currently we are not aware of any exploits for these
                        vulnerabilities.
xmlsoft.org             Multiple buffer overflow vulnerabilities exist: a                                High   Security Tracker Alert I,
                        vulnerability exists in the 'xmlNanoFTPScanURL()'         xmlsoft.org Libxml2           1011941, October 28, 2004
Libxml2 2.6.12-2.6.14   function in 'nanoftp.c' due to a boundary error, which   Multiple Remote Stack
                        could let a remote malicious user execute arbitrary        Buffer Overflows             Fedora Update Notification,
                        code; a vulnerability exists in the                                                     FEDORA-2004-353,
                        'xmlNanoFTPScanProxy()' function in 'nanoftp.c,'           CAN-2004-0989                November 2, 2004
                        which could let a remote malicious user execute            CAN-2004-0110
                        arbitrary code; and a vulnerability exists in the                                       Gentoo Linux Security
                        handling of DNS replies due to various boundary                                         Advisory, GLSA 200411-05,
                        errors, which could let a remote malicious user                                         November 2,2 004
                        execute arbitrary code.
                                                                                                                Mandrakelinux Security
                        Upgrades available at:                                                                  Update Advisory,
                        http://xmlsoft.org/sources/                                                             MDKSA-2004:127, November
                        libxml2-2.6.15.tar.gz                                                                   4, 2004

                        OpenPKG:                                                                                OpenPKG Security Advisory,
                        ftp://ftp.openpkg.org/release/                                                          OpenPKG-SA-2004.050,
                                                                                                                November 1, 2004
                        Trustix:
                        ftp://ftp.trustix.org/                                                                  Trustix Secure Linux Security
                        pub/trustix/updates/                                                                    Advisory, TSLSA-2004-0055,
                                                                                                                November 1, 2004
                        Fedora:
                        http://download.fedora.                                                                 Ubuntu Security Notice,
                        redhat.com/pub/                                                                         USN-10-1, November 1, 2004
                        fedora/linux/core/updates/2/
                                                                                                                Red Hat Security Advisory,
                        Gentoo:                                                                                 RHSA-2004:615-11,
                        http://security.gentoo.org/                                                             November 12, 2004
                        glsa/glsa-200411-05.xml
                                                                                                                Conectiva Linux Security
                        Mandrake:                                                                               Announce-
                        http://www.mandrakesoft.com/                                                            ment, CLA-2004:890,
                        security/advisories                                                                     November 18, 2004

                        OpenPKG:                                                                                Red Hat Security Advisory,
                        ftp://ftp.openpkg.org/release/                                                          RHSA-2004:650-03,
                                                                                                                December 16, 2004
                        Trustix:
                        http://www.trustix.org/                                                                 Apple Security Update,
                        errata/2004/0055/                                                                       APPLE-SA-2005-01-25,
                                                                                                                January 26, 2005
                        Ubuntu:
                        http://security.ubuntu.com/                                                             Turbolinux Security Advisory,
                        ubuntu/pool/main/libx/                                                                  TLSA-2005-11, January 26,
                        libxml2/                                                                                2005

                        RedHat:                                                                                 Ubuntu Security Notice,
                        http://rhn.redhat.com/errata/                                                           USN-89-1, February 28, 2005
                        RHSA-2004-615.html
                                                                                                                SGI Security Advisory,
                        Conectiva:                                                                              20050602-
                        ftp://atualizacoes.                                                                     01-U,
                        conectiva.com.br/1                                                                             June 23, 2005

                        RedHat (libxml):
                        http://rhn.redhat.com/errata
                        /RHSA-2004-650.html

                        Apple:
                        http://www.apple.com
                        /support/downloads/

                        TurboLinux:
                        ftp://ftp.turbolinux.co.jp/
                        pub/TurboLinux/
                        TurboLinux/ia32/

                        Ubuntu:
                        http://security.ubuntu.com/
                        ubuntu/pool/main/libx/libxml/

                        SGI:
                        ftp://oss.sgi.com/projects/
                        sgi_propack/download/
                        3/updates/

                        An exploit script has been published.
Yukihiro Matsumoto      A vulnerability has been reported in the XMLRPC                                      High      Fedora Update Notifications,
                        server due to a failure to set a valid default value    Yukihiro Matsumoto Ruby                FEDORA-
Ruby 1.8.2              that prevents security protection using handlers,           XMLRPC Server                      2005-474 & 475, June 21,
                        which could let a remote malicious user execute          Unspecified Command                   2005
                        arbitrary code.                                                 Execution
                                                                                                                       Turbolinux Security
                        Fedora:                                                     CAN-2005-1992                      Advisory,
                        http://download.fedora.                                                                        TLSA-2005-74, June 28, 2005
                        redhat.com/pub/
                        fedora/linux/core/updates/

                        TurboLinux:
                        ftp://ftp.turbolinux.co.jp/
                        pub/TurboLinux/
                        TurboLinux/ia32/

                        Currently we are not aware of any exploits for this
                        vulnerability.

[back to top]


Multiple Operating Systems - Windows / UNIX / Linux / Other
                                      Vulnerability - Impact
    Vendor & Software                                                            Common Name /
                                     Patches - Workarounds                                                Risk                 Source
         Name                                                                    CVE Reference
                                         Attacks Scripts
Adobe                    A vulnerability has been reported that could let      Adobe Reader / Adobe    Medium       Adobe
                         remote malicious users access system                    Acrobat Local File                 Advisory Document 331710,
Acrobat and Reader 7.0 information. This is because there is an error in             Detection                      June 15, 2005
and 7.0.1 for Mac OS and the Adobe Reader control that makes it
Windows.                 possible to determine whether or not a                   CAN-2005-1306                     Adobe
                         particular file exists                                                                     Advisory Document 331710,
                         on a user's system via XML scripts embedded                                                Updated
                         in JavaScript.                                                                             June 27, 2005

                          Update to version 7.0.2 for Windows:
                          http://www.adobe.com/
                          support/downloads/

                          Mac Os available at:
                          http://www.adobe.com/
                          support/downloads/

                          Currently we are not aware of any exploits for
                          this vulnerability.
CarLine                 Several vulnerabilities have been reported:            CarLine Forum Russian      High      RST/GHC Advisory #29, June 21,
                        SQL injection vulnerabilities were reported due         Board Multiple Input                2005
Forum Russian Board 4.2 to insufficient sanitization of user-supplied                Validation
                        input before using in an SQL query, which
                        could let a remote malicious user execute
                        arbitrary SQL code; Cross-Site Scripting
                        vulnerabilities were reported due to insufficient
                        sanitization of certain input, which could let a
                        remote malicious user execute arbitrary HTML
                        and script code; and a vulnerability was
                        reported due to insufficient verification of the
                        '[img]' BB code tag , which could let a remote
                        malicious execute arbitrary code.
                    No workaround or patch available at time of
                    publishing.

                    There is no exploit code required; however, a
                    Proof of Concept exploit script has been
                    published.
Clam AntiVirus      A Denial of Service vulnerability has been                                     Low     Secunia
                    reported in the Quantum decompressor due to           ClamAV Quantum                   Advisory, SA15811,
ClamaAV 0.x         an unspecified error.                               Decompressor Denial of             June 24, 2005
                                                                              Service
                    Updates available at:                                                                  Gentoo Linux Security
                    http://prdownloads.                                     CAN-2005-2056                  Advisory,
                    sourceforge.net/                                                                       GLSA 200506-23, June 27,
                    clamav/clamav-                                                                         2005

                    Gentoo:
                    http://security.gentoo.org/
                    glsa/glsa-200506-23.xml

                    Currently we are not aware of any exploits for
                    this vulnerability.
Craig Knudsen       A vulnerability has been reported in the                Craig Knudsen         Medium   Secunia
                    'assistant_edit.php' script due to a failure to     WebCalendar 'Assistant_            Advisory, SA15788,
WebCalendar 0.9.x   perform authentication, which could let a                 Edit.PHP'                    June 27, 2005
                    remote malicious user bypass security                 Security Restriction
                    restrictions. It is also possible to disclose the          Bypass
                    full path to 'view_entry.php' by accessing it
                    directly.

                    Upgrades available at:
                    http://prdownloads.
                    sourceforge.net/
                    webcalendar/
                    WebCalendar-
                    1.0.0.tar.g z?download

                    There is no exploit code required.
DUware              Multiple SQL injection vulnerabilities have                                    High    Security Focus, 14034,
                    been reported due to insufficient sanitization of    DUware DUpaypal Pro               June 22, 2005
DUpaypal 3.0        user-supplied input before using in an SQL           Multiple SQL Injection
                    query, which could let a remote malicious user
                    execute arbitrary SQL code.                             CAN-2005-2047

                    No workaround or patch available at time of
                    publishing.

                    There is no exploit code required; however, a
                    Proof of Concept exploit has been published.
DUware              Multiple SQL injection vulnerabilities have                                    High    Security Focus, 14033,
                    been reported due to insufficient sanitization of   DUware DUamazon Pro                June 22, 2005
DUamazon 3.1, 3.0   user-supplied input before using in an SQL           Multiple SQL Injection
                    query, which could let a remote malicious user
                    execute arbitrary SQL code.                             CAN-2005-2046

                    No workaround or patch available at time of
                    publishing.

                    There is no exploit code required; however, a
                    Proof of Concept exploit has been published.
DUware              Multiple SQL injection vulnerabilities have                                    High    Security Focus, 14036,
                    been reported due to insufficient sanitization of    DUware DUclassmate                June 22, 2005
DUclassmate 1.2     user-supplied input before using in an SQL           Multiple SQL Injection
                    query, which could let a remote malicious user
                    execute arbitrary SQL code.                             CAN-2005-2049

                    No workaround or patch available at time of
                    publishing.

                    There is no exploit code required; however, a
                    Proof of Concept exploit has been published.
DUware              Multiple SQL injection vulnerabilities have                                    High    Security Focus, 14035,
                    been reported due to insufficient sanitization of DUware DUforum Multiple              June 22, 2005
DUforum 3.1         user-supplied input before using in an SQL            SQL Injection
                    query, which could let a remote malicious user
                    execute arbitrary SQL code.                          CAN-2005-2048

                    No workaround or patch available at time of
                    publishing.

                    There is no exploit code required; however, a
                    Proof of Concept exploit has been published.
DUware                     Multiple SQL injection vulnerabilities have                                     High    Security Focus, 14029,
                           been reported due to insufficient sanitization of     DUware DUportal Pro               June 22, 2005
DUportal Pro 3.4.3         user-supplied input before using in an SQL            Multiple SQL Injection
                           query, which could let a remote malicious user
                           execute arbitrary SQL code.                             CAN-2005-2045

                           No workaround or patch available at time of
                           publishing.

                           There is no exploit code required; however, a
                           Proof of Concept exploit has been published.
Francisco Burzi            A Cross-Site Scripting vulnerability has been            Francisco Burzi        High    Secunia Advisory, SA15829,
                           reported in the 'Link to off-site Avatar' field due        PHP-Nuke                     June 27, 2005
PHP-Nuke 7.7, 7.6,         to insufficient sanitization, which could let a         Avatar Cross-Site
7.0-7.3,                   malicious user execute arbitrary HTML and                   Scripting
                           script code. Note: the 'Enable remote avatars'
                           setting must be enabled (disabled by default).

                           No workaround or patch available at time of
                           publishing.

                           There is no exploit code required.
IBM                        A vulnerability has been reported due to a                                     Medium   IBM Advisory, IY73104,
                           failure to properly enforce authorization                  IBM DB2                      June 24, 2005
DB2 Universal Database     restrictions for database users, which could let       Universal Database
8.x                        a malicious user with 'SELECT' privileges                Authorization
                           bypass security restrictions.                                Bypass

                           FixPaks available at:                                   CAN-2005-2073
                           http://www.ibm.com/
                           software/data/db2/
                           udb/support/

                           Currently we are not aware of any exploits for
                           this vulnerability.
Infopop                   Multiple vulnerabilities have been reported:                                     High    GulfTech
                          Cross-Site Scripting vulnerabilities have been            Infopop                        Security
UBB.threads 6.5-6.5.1 .1, reported in the 'Searchpage' parameter in             UBBThreads                         Research Team Advisory,
6.2.3, 6.0                'dosearch.php,' the 'what' and 'page'            Multiple Input Validation               June 24, 2005
                          parameters in 'newreply.php,' the 'Number,'
                          'Board.' and 'what' parameters in                   CAN-2005-2057
                          'showprofile.php.' the 'fpart' and 'page'           CAN-2005-2058
                          parameters in 'showflat.php,' the 'like'            CAN-2005-2059
                          parameter in 'showmembers.php,' and the 'Cat'       CAN-2005-2060
                          parameter in 'toggleshow.php,'                      CAN-2005-2061
                          'togglecats.php,' and 'showprofile.php' due to
                          insufficient sanitization before returned to the
                          user, which could let a remote malicious user
                          execute arbitrary HTML and script code; an
                          SQL injection vulnerability was reported in the
                          'Number,' 'year,' 'month,' 'message,' 'main,'
                          'posted,' and 'Forum[ ]' parameters due to
                          insufficient sanitization before using in an SQL
                          query, which could let a remote malicious user
                          execute arbitrary SQL code; a vulnerability was
                          reported in the 'language' parameter due to
                          insufficient verification before used to include
                          files, which could let a remote malicious user
                          include arbitrary files; and a vulnerability was
                          reported because it is possible to trick a user
                          into performing certain actions when logged in
                          by following a specially crafted link.

                           Upgrades available at:
                           http://www.infopop.com/
                           members/members.php

                           There is no exploit code required; however,
                           Proofs of Concept exploits have been
                           published.
Infra dig                  Multiple buffer overflow vulnerabilities have      Infra dig Infra mail         Low     Secunia Advisory: SA15828,
                           been reported: a remote Denial of Service       Advantage Server Edition                June 28, 2005
Infra mail Advantage       vulnerability was reported due to an error when Multiple Remote Buffer
Server Edition 6.0 6.37    processing the SMTP 'MAIL FROM' command                 Overflow
                           that contains an argument of approximately
                           40960 bytes; and a remote Denial of Service
                           vulnerability was reported due to an error when
                           processing the FTP 'NLST' command twice
                           with an argument of approximately 102400
                           bytes.

                           No workaround or patch available at time of
                           publishing.

                           Proof of Concept exploit scripts have been
                          published.
J. C. Stierheim           A vulnerability was reported in the 'index.php'    JCDex Lite Arbitrary Code    High    Security Tracker Alert ID:
                          script because a file relative to the                     Execution                     1014306, June 27, 2005
JCDex Lite 2.0, 3.0       user-supplied 'thispath' parameter is included,
                          which could let a remote malicious user
                          execute arbitrary code.

                          No workaround or patch available at time of
                          publishing.

                          Currently we are not aware of any exploit for
                          this vulnerability.

K-COLLECT                 A vulnerability has been reported in the           CSV_DB / i_DB Arbitrary      High    Secunia Advisory, SA15842,
                          'csv_db.cgi' script due to insufficient validation      Command                         June 28, 2005
CSV_DB 1.x,               of the 'file' parameter, which could let a remote       Execution
i_DB 1.x                  malicious user execute arbitrary commands.

                          No workaround or patch available at time of
                          publishing.

                          A Proof of Concept exploit script has been
                          published.
Legal Case Management A vulnerability has been reported in the log           Legal Case Management       Medium   Security Focus, 14060,
                      directory in the default installation due to             Log File Information               June 24,2005
LCM 0.6, 0.4-0.4.5    missing access restrictions, which could let a                Disclosure
                      remote malicious user obtain sensitive
                      information.

                          Upgrades available at:
                          http://prdownloads.
                          sourceforge.net/
                          legalcase/legalcase-
                          0.6.1.tar.gz?do

                          There is no exploit code required.
Mamboforge                A vulnerability has been reported that could let                                High    Secunia SA15710,
                          remote malicious users conduct SQL injection                Mambo                       June 15, 2005
Mambo 4.5.2.2 and prior   attacks. Input passed to the 'user_rating'               'user_rating'
                          parameter when voting isn't properly validated.          SQL Injection                  Security Focus, 13966,
                                                                                                                  June 22, 2005
                          Update to version 4.5.2.3:                             CAN-2005-2002
                          http://mamboforge.net/
                          frs/?group_id=5

                          An exploit script has been published.
Mensajeitor               A Cross-Site Scripting vulnerability has been           Mensajeitor 'IP'        High    Security Focus, 14071,
                          reported in the 'IP' parameter due to                    Parameter                      June 27, 2005
Mensajeitor 1.8.9         insufficient sanitization of user-supplied input         Cross-Site
                          before using in dynamically generated content,            Scripting
                          which could let a remote malicious user
                          execute arbitrary HTML and script code.

                          No workaround or patch available at time of
                          publishing.

                          There is no exploit code required; however, a
                          Proof of Concept exploit has been published.
Multiple Vendors         A vulnerability has been reported in the DNS                               Medium   Security Focus, 13592,
                         client when handling DNS responses, which           Squid Proxy DNS                 May 11, 2005
Squid Web Proxy          could let a remote malicious user spoof DNS             Spoofing
Cache2.5.                lookups.                                                                            Trustix Secure Linux Security
STABLE9 & prior                                                               CAN-2005-1519                  Advisory,
                         Patch available at:                                                                 2005-0022,
                         http://www.squid-cache.org/                                                         May 13, 2005
                         Versions/v2/2.5/bugs/
                         squid-2.5.STABLE9-                                                                  Fedora Update Notification,
                         dns_query-4.patch                                                                   FEDORA-
                                                                                                             2005-373,
                         Trustix:                                                                            May 17, 2005
                         http://www.trustix.org/
                         errata/2005/0022/                                                                   Ubuntu Security Notice,
                                                                                                             USN-129-1
                         Fedora:                                                                             May 18, 2005
                         http://download.fedora.
                         redhat.com/pub/fedora/                                                              RedHat Security Advisory,
                         linux/core/updates/3/                                                               RHSA-2005:415-16, June 14,
                                                                                                             2005
                         Ubuntu:
                         http://security.ubuntu.com/                                                         Turbolinux Security Advisory,
                         ubuntu/pool/main/s/squid/                                                           TLSA-2005-71, June 28, 2005

                         RedHat:
                         http://rhn.redhat.com/
                         errata/RHSA-2005-415.html

                         TurboLinux:
                         ftp://ftp.turbolinux.co.jp/
                         pub/TurboLinux/
                         TurboLinux/ia32/

                         Currently we are not aware of any exploits for
                         this vulnerability.
Multiple Vendors         An information disclosure vulnerability has       Multiple Vendor Telnet   Medium   Microsoft,
                         been reported that could let a remote malicious    Client Information               MS05-033,
Windows XP, Server       user read the session variables for users who           Disclosure                  June 14, 2004
2003                     have open connections to a malicious telnet
                         server.                                              CAN-2005-1205                  US-CERT VU#800829
Windows Services for                                                          CAN-2005-0488
UNIX 2.2, 3.0, 3.5 when Updates available: http://www.microsoft.com/                                         iD EFENSE Security Advisory,
running on Windows 2000 tech net/security/Bulletin/                                                          June 14, 2005
                         MS05-033.mspx
Berbers V5 Release 1.3.6                                                                                     Red Hat Security Advisory,
                         RedHat:                                                                             RHSA-2005:
AAA Intuit LX, Converged ftp://updates.redhat.com/                                                           504-00,
Communications Server enterprise                                                                             June 14, 2005
(CCS) 2.x, MN100,
Modular Messaging 2.x, Microsoft:                                                                            Microsoft Security Bulletin,
S8XXX Media Servers      http://www.microsoft.com/                                                           MS05-033 & V1.1,
                         tech net/security/Bulletin/                                                         June 14 & 15, 2005
                         MS05-033.mspx
                                                                                                             SUSE Security Summary
                         SUSE:                                                                               Report,
                         ftp://ftp.SUSE.com/                                                                 SUSE-SR:2005:016, June 17,
                         pub/SUSE                                                                            2005

                         AAA:                                                                                AAA Security Advisory,
                         http://support.avaya.com/                                                           ASA-2005-145,
                         elmodocs2/security/                                                                 June 17, 2005
                         ASA-2005-145_
                         RHSA-2005-504.pdf                                                                   Trustix Secure Linux Security
                                                                                                             Advisory, TSLSA-2005-0030,
                         Trustix:                                                                            June 24, 2005
                         ftp://ftp.turbolinux.co.jp/
                         pub/TurboLinux/
                         TurboLinux/

                         Currently we are not aware of any exploits for
                         this vulnerability.
Multiple Vendors         A vulnerability has been reported due to an                                Medium   Gentoo Linux Security Advisory,
                         unspecified error, which could let la remote         Tor Information                GLSA 200506-18,
Tor Tor 0.0.10-0.0.9;    malicious user obtain sensitive information.           Disclosure                   June 21, 2005
Gentoo Linux
                         Tor:                                                                                Secunia Advisory, SA15764,
                         http://tor.eff.org/download.html                                                    June 22, 2005

                         Gentoo:
                         http://www.gentoo.org/security/
                         en/glsa/glsa-200506-18.xml

                         Currently we are not aware of any exploits for
                         this vulnerability.
Opera Software              A vulnerability has been reported that could let                                  High    Secunia, SA15411,
                            remote malicious users conduct Cross-Site              Opera 'javascript:' URL            June 16, 2005
Opera 8.0                   Scripting attacks and read local files. This is         Cross-Site Scripting
                            due to Opera not properly restricting the                                                 SUSE Security Announce-
                            privileges of 'javascript:' URLs when opened in           CAN-2005-1669                   ment, SUSE-SA:2005:034, June
                            e.g. new windows or frames.                                                               22, 2005

                            Update to version 8.01: http://www.opera.com
                            /download/

                            SUSE:
                            ftp://ftp.SUSE.com/
                            pub/SUSE

                            There is no exploit code required.
Opera Software              A vulnerability has been reported that could let                                 Medium   Secunia SA15008, June 16, 2005
                            remote malicious users steal content or               Opera XMLHttpRequest
Opera 8.0                   perform actions on other web sites with the              Security Bypass                  SUSE Security Announce-
                            privileges of the user. This is due to insufficient                                       ment, SUSE-SA:2005:034, June
                            validation of server side redirects.                      CAN-2005-1475                   22, 2005

                            Update to version 8.01: http://www.opera.com/                                             US-CERT VU#612949
                            download/

                            SUSE:
                            ftp://ftp.SUSE.com/
                            pub/SUSE

                            Currently we are not aware of any exploits for
                            this vulnerability.
PHP-Fusion                  Several vulnerabilities have been reported: a                                     High    Security Focus, 14066,
                            Cross-Site Scripting vulnerability was reported          PHP-Fusion                       June 27, 2005
PHP-Fusion 6.0.105          in the 'submit.php' script, which could let a     'SUBMIT.PHP' Cross-Site
                            remote malicious user execute arbitrary HTML        Scripting & Information
                            and script code; and stores the database file              Disclosure
                            with a vulnerability was reported because a
                            predictable                                            CAN-2005-2074
                            filename that has insufficient access controls is      CAN-2005-2075
                            stored under the web document root, which
                            could let a remote malicious user obtain
                            sensitive information.

                            No workaround or patch available at time of
                            publishing.

                            There is no exploit code required.
Real Networks               A vulnerability has been reported when a                                          High    eEye Digital Security Advisory,
                            specially crafted media file is opened, which         RealNetworks RealPlayer             EEYEB-20050504,
RealPlayer G2, 6.0          could let a remote malicious user execute                Unspecified Code                 May 5, 2005
Win32, 6.0, 7.0 Win32,      arbitrary code.                                              Execution
7.0 Unix, 7.0 Mac, 8.0                                                                                                RedHat Security Advisories,
Win32, 8.0 Unix, 8.0 Mac,   RealNetworks:                                             CAN-2005-1277                   RHSA-2005:
10.0 BETA, 10.0             http://service.real.com/                                  CAN-2005-1766                   517-02 &
v6.0.12.690, 10.0, 0.5      help/faq/security/                                                                        RHSA-2005:
v6.0.12.1059                050623_player/EN/                                                                         523-05,
10.5 v6.0.12.1056,                                                                                                    June 23, 2005
v6.0.12.1053,               RedHat:
v6.0.12.1040, 10.5 Beta     http://rhn.redhat.com/                                                                    Fedora Update Notifications,
v6.0.12.1016, 10.5, 10      errata/RHSA-2005-517.html                                                                 FEDORA-2005-483 & 484,
Japanese, German,                                                                                                     June 25, 2006
English, 10 for Linux, 10   http://rhn.redhat.com/
for Mac OS Beta, 10 for     errata/RHSA-2005-523.html                                                                 SUSE Security Announce-
Mac OS 10.0.0.325, 10                                                                                                 ment, SUSE-SA:2005:037, June
for Mac OS 10.0.0.305,      Fedora:                                                                                   27, 2005
10 for Mac OS, 10 for       http://download.fedora.
Mac OS 10.0 v10.0.0.331,    redhat.com/pub/fedora/
RealPlayer 8, RealPlayer    linux/core/updates/
Enterprise 1.1, 1.2,
1.5-1.7, RealPlayer For     SUSE:
Unix 10.0.3, 10.0.4,        ftp://ftp.SUSE.com/
RealPlayer for Windows      pub/SUSE
7.0, RealPlayer Intranet
7.0, 8.0                    Currently we are not aware of any exploits for
                            this vulnerability.
Simple Machines             An SQL injection vulnerability has been           Simple Machines 'Msg'           High    Secunia Advisory: SA15784,
                            reported due to insufficient sanitization of the Parameter SQL Injection                  June 23, 2005
SMF 1.0.4, 1.0.2, 1.0       'msg' parameter before using in an SQL query,
-beta5p & beta4p, 1.0       which could let a remote malicious user
-beta4.1                    execute arbitrary SQL code.

                            Updates available at:
                            http://www.simplemachines.org/
                            download.php

                            There is no exploit code required.
Sun Micro-systems, Inc.   Several vulnerabilities have been reported: a                                 High    Sun(sm) Alert Notification,
                          vulnerability was reported due to an                  Java Web Start /                101748 & 101749,
Java Web Start 1.x,       unspecified error which could let malicious           Sun JRE Sandbox                 June 13, 2005
Sun Java JDK 1.5.x,       untrusted applications execute arbitrary code;         Security Bypass
1.4.x, Sun Java JRE       and a vulnerability was reported due to an                                            Slackware Security Advisory,
1.4.x, 1.5.x              unspecified error which could let a malicious          CAN-2005-1973                  SSA:2005-170-01,
                          untrusted applets execute arbitrary code.              CAN-2005-1974                  June 20, 2005

                          Upgrades available at:                                                                SUSE Security Announce-
                          http://java.sun.com/                                                                  ment, SUSE-SA:2005:032, June
                          j2se/1.5.0/index.jsp                                                                  22, 2005

                          http://java.sun.com/
                          j2se/1.4.2/download.html

                          Slackware:
                          ftp://ftp.slackware.com/pub/
                          slackware/slackware-current/

                          SUSE:
                          ftp://ftp.SUSE.com/
                          pub/SUSE

                          Currently we are not aware of any exploits for
                          these vulnerabilities.
Sun Micro-systems, Inc.  A vulnerability has been reported due to                                      Medium   Sun(sm) Alert Notification, 57740,
                         insufficient validation of user-supplied input           Sun Java                      March 16, 2005
Sun Java 2 Runtime       before considered as trusted, which could let a       Web Start System
Environment 1.3 0_01-1.3 remote malicious user obtain obtain elevated         Remote Unauthorized               SUSE Security Announce-
0_05, 1.3 .0, 1.3.1 _08, privileges.                                                Access                      ment, SUSE-SA:2005:032, June
1.3.1 _04, 1.3.1 _01a,                                                                                          22, 2005
1.3.1 _01, 1.3.1, 1.4.1, Upgrades available at:                                  CAN-2005-0836
1.4.2 _01-1.4.2 _06,     http://java.sun.com/j2se/
1.4.2,
Java Web Start 1.2       Apple:
                         http://www.apple.com/
                         support/downloads/

                          Gentoo:
                          http://security.gentoo.org/
                          glsa/glsa-200503-28.xml

                          SUSE:
                          ftp://ftp.SUSE.com/
                          pub/SUSE

                          Currently we are not aware of any exploits for
                          this vulnerability.
Veritas Software          A remote Denial of Service vulnerability has                                  Low     Veritas Security Advisories,
                          been reported due to a boundary error when             Veritas Backup                 VX05-001 & VX05-008, June 22,
NetBackup Business        handling request packets.                          Exec/NetBackup Request             2005
Server 4.x, NetBackup                                                            Packet Remote
DataCenter 4.x,           Patches available at:                                 Denial of Service
NetBackup Enterprise      http://support.veritas.com/docs/
Server 5.x, NetBackup                                                            CAN-2005-0772
Server 5.x                Currently we are not aware of any exploits for
                          this vulnerability.
Whois.Cart                Several vulnerabilities have been reported; a                                 High    Secunia Advisory, SA15783,
                          Cross-Site Scripting vulnerability was reported Whois.Cart 'Profile.PHP'              June 23, 2005
Whois.Cart                in 'Profile.php' due to insufficient sanitization of   Cross-Site
2.2.77, 2.2.76, 2.2.74,   the 'page' parameter, which could let a remote Scripting & File Inclusion
2.2.70                    malicious user execute arbitrary HTML and
                          script code; and a vulnerability was reported in
                          'index.php' due to insufficient verification of the
                          'language' parameter, which could let a
                          malicious user include arbitrary files.

                          No workaround or patch available at time of
                          publishing.

                          There is no exploit code required; however, a
                          Proof of Concept exploit has been published.
WordPress                 An SQL injection vulnerability has been                                       High    Secunia Advisory, SA15517,
                          reported due to insufficient sanitization of the        Wordpress                     May 30, 2005
WordPress                 'cat_ID' parameter before using in an SQL                 Cat_ID
1.5, 1.5.1                query, which could let a remote malicious user     Parameter SQL Injection            Gentoo Linux Security Advisory,
                          execute arbitrary SQL code.                                                           GLSA
                                                                                 CAN-2005-1810                  200506-04, June 6, 2005
                          Upgrades available at:
                          http://wordpress.org/latest.tar.gz                                                    Security Focus, 13809, June 22,
                                                                                                                2005
                          Gentoo:
                          http://security.gentoo.org/
                          glsa/glsa-200506-04.xml
                              Another exploit script has been published.


Wireless
The section below contains wireless vulnerabilities, articles, and viruses/trojans identified during this reporting period.

       Sand ia Develops Secure Ultramodern Wireless Network: A group led by researchers at Sandia National Laboratories have developed a wireless network based
       on wavelengths in the Ultramodern spectrum. According to Sand ia, the network is secure enough to be used for national-defense purposes, to help sensors
       monitor U.S. Air Force bases or Department of Energy nuclear facilities. It could also be used to control remotely operated weapon systems wirelessly. Source:
       http://news.yahoo.com/s/NFL/20050623/tycoon/36740;Yalta=Happy%20WFTn_
       aT81drbhp20jtBAF;ylem=X3oDMTBiMW04NW9mBHNlYwMlJVRPUCUl.
       BlackBerry endures another outage: On June 22nd, a number of BlackBerry handheld wireless devices experienced service problems, marking the second time
       in less than a week that the popular devices lost their data connections. According to a RIM representative, a hardware failure Wednesday triggered a backup
       system that operated at a lower capacity "than expected." Service has been restored. Source:
       http://news.com.com/BlackBerry+endures+another+outage/2100-1039_3-5758043.html?tag=ne fd.top.
       kismet-2005-06-R1.tar.gz: An 802.11 layer 2 wireless network sniff er that can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any
       wireless card supported in Linux, which currently divide into cards handled by slipcase and the Linux-Wireless extensions (such as Cisco Baronet), and cards
       supported by the Wan-NG project which use the Prism/2 chipset (such as Links, Dl ink, and Zoom). Besides Linux, Kismet also supports Free BSD, Open BSD and
       Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bs sid), IP block detection via ARP and DHCP packet
       dissection, Cisco product detection via CDP, Ethereal and tcp dump compatible file logging, Air snort-compatible"interesting" (cryptographically weak) logging,
       Secure SUID behavior, GPS devices and wireless devices fingerprinting.

Wireless Vulnerabilities

       Nothing significant to report.

[back to top]


Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column
indicates if vendors, security vulnerability blisters, or Computer Emergency Response Teams (CERT's) have published workarounds or patches.

Note: At times, scripts/techniques may contain names or content that may be considered offensive.

   Date of Script
     (Reverse                                         Workaround or
                                Script name                                                                      Script Description
   Chronological                                      Patch Available
      Order)
June 28, 2005           dos_bison.py                          No          Exploit for the Softie Bison FTP Remote Denial of Service vulnerability.
June 28, 2005           Inframail_SMTPOverflow.pl             No          Proof of Concept exploits for the Infra dig Infra mail Advantage Server Edition Multiple Remote
                        Inframail_FTPOverflow.pl                          Buffer Overflow vulnerabilities.
June 27, 2005           IAeMailServer_DOS.pl                  No          Perl script that exploits the True North Software IA EMailServer Remote Format String
                                                                          vulnerability.
June 27, 2005           ipdatalook_dos.c                      No          Exploits for the TCP-IP Datalook Denial of Service vulnerability.
                        ipdatalook.txt
June 26, 2005           fusionDB.pl.txt                       No          Proof of Concept exploit for the PHP-Fusion Database Backup vulnerability.
June 25, 2005           traceSolaris.txt                      No          Proofs of Concept exploits for the Sun Solaris Traceroute Multiple Local Buffer Overflows.
                        solaris_tracroute_exp.pl
June 25, 2005           ubb652.txt                           Yes          Proofs of Concept exploits for the UBB Threads Cross-Site Scripting, SQL injection, HTTP
                                                                          response splitting, and local file inclusion vulnerabilities.
June 24, 2005           clamav-0.86.1.tar.gz                 N/A          A flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic
                                                                          updating via Internet.
June 24, 2005           csv_db.c                              No          Proof of Concept exploit for the CSV_DB / i_DB Arbitrary Command Execution vulnerability.
June 24, 2005           mssmb_poc.c                          Yes          Proof of Concept exploit for the Microsoft Windows SMB Buffer Overflow vulnerability.
June 24, 2005           nessQuick-v0.05.zip                   NA          Perl scripts designed to assist in managing the output from Nessus scans and creating an
                                                                          alternate report format.
June 23, 2005           adv21-theday-2005.txt                 No          Proof of Concept exploit for the ActiveBuyAndSEL SQL injection and Cross-Site Scripting
                        adv19-theday-2005.txt                             vulnerabilities.
June 23, 2005           cacti.pl.txt                         Yes          Exploit for the RaXnet Cacti Multiple Input Validation vulnerabilities.
June 23, 2005           igallery22.txt                        No          Proof of Concept exploit for the BlueCollar Productions i-Gallery Cross-Site Scripting & Directory
                                                                          Traversal vulnerability.
June 23, 2005           kismet-2005-06-R1.tar.gz             N/A          An 802.11 layer 2 wireless network sniff er that can sniff 802.11b, 802.11a, and 802.11g traffic. It
                                                                          is capable of sniffing using almost any wireless card supported in Linux, which currently divide
                                                                          into cards handled by slipcase and the Linux-Wireless extensions (such as Cisco Baronet), and
                                                                          cards supported by the Wan-NG project which use the Prism/2 chipset (such as Links, Dl ink,
                                                                          and Zoom).
June 23, 2005           NsT-phpBBDoS.pl.txt                  Yes          Exploit scripts for the phpBB 'bbcode.php' Input Validation vulnerability.
                        NsT-phpBBDoS.c
June 23, 2005           r57frb.pl                             No          A Proof of Concept exploit for the CarLine Forum Russian Board Multiple Input Validation
                                                                          vulnerability.
June 23, 2005           r57mambo.pl                          Yes          Perl script that exploits the Mambo SQL injection vulnerability.
June 23, 2005           r57wp.pl                              No           Perl script that exploits the MercuryBoard 'Index.PHP' Remote SQL Injection vulnerability.
June 22, 2005           mambo_user_rating_sql.pl              Yes          Perl script that exploits the Mambo 'user_rating' SQL Injection vulnerability.
June 22, 2005           wordpress1511newadmin.pl              Yes          Perl script that exploits the Wordpress Cat_ID Parameter SQL Injection vulnerability.


[back to top]


Trends
        Scanning Activity on Port 445/tcp: US-CERT has seen reports indicating an increase in scanning activity of port 445/tcp. This port is used by
        Server Message Block(SMB) to share files, printers, serial ports and communicate between computers in a Microsoft Windows environment.
        Source: http://www.us-cert.gov/current/current_activity.html#smb.
        Exploit for Vulnerability in VERITAS Backup Exec Remote Agent: US-CERT has received reports of increased scanning activity on port
        10000/tcp. This increase is believed to be related to the public release of a new exploit for a recently published vulnerability in VERITAS Backup
        Exec Remote Agent. Source: http://www.us-cert.gov/current/current_activity.html#smb.
        Exploit for Vulnerability in Outlook Express: US-CERT has received reports of the existence of a working exploit for a recently published
        vulnerability in Microsoft Outlook Express. While reports of successful system compromise using this vulnerability have not yet been confirmed.
        Source: http://www.us-cert.gov/current/current_activity.html#smb.
        Users at Continued Risk from Phishing Attempts: US-CERT continues to receive reports of phishing attempts. Because of recent media
        reports regarding attacks against financial institutions, users may see an increase in targeted phishing emails. Phishing emails may appear as
        requests from a financial institution asking the user to click on a link that takes them to a fraudulent site that looks like the legitimate one. The user
        is then asked to provide personal information that can further expose them to future compromises. Source:
        http://www.us-cert.gov/current/current_activity.html#smb.
        Hackers spread Microsoft attack flaw exploit: The risk of an attack related to a flaw in Microsoft Outlook Express climbed after underground
        hacking sites began circulating sample code for exploiting it. The exploit is designed to take complete control of PCs with certain versions of the
        Outlook Express email program installed on them when users visit newsgroups controlled by the hackers. Source:
        http://software.silicon.com/malware/0,3800003100,39131415,00.htm.
        ID theft concerns grow, tools lacking: Consumers are overwhelmed by a flood of bad ID theft news and are concerned that the government is
        not doing enough to protect them. In one of the most extensive studies yet on consumer attitudes about identity theft, Gartner Inc. found that
        about half those polled either were not’t aware they were entitled to a free credit report or considered them “not effective” in fighting ID theft. The
        survey, also found that one-third of consumers are "very concerned" about being victims of identity theft, and nearly half are altering their online
        activities as a result. Source: http://msnbc.msn.com/id/8322300/.
        Increased port 'sniffing' could herald attack, Gartner warns: According to an analyst from Gartner, Inc. there has been an increase in "sniffing" activity on a port
        associated with a recently patched Microsoft Corp. vulnerability. This may signal an impending attack attempting to exploit the flaw. Source:
        http://www.computerworld.com/securitytopics/security/story/0,10801,102687,00.html.

[back to top]


Viruses/Trojans
Top Ten Virus Threats

A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the
table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection.
It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each
month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers
are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected),
common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and
approximate date first found.

           Common
 Rank                    Type of Code            Trend                Date                                                Description
            Name
                                                                                    A mass-mailing worm with IRC backdoor functionality which can also infect computers
    1     Mytob.C       Win32 Worm         Stable             March 2004            vulnerable to the Windows LSASS (MS04-011) exploit. The worm will attempt to harvest
                                                                                    email addresses from the local hard disk by scanning files.
                                                                                    A mass-mailing worm that uses its own SMTP engine to send itself to the email
                                                                                    addresses it finds when scanning the hard drives and mapped drives. The worm also
    2     Netsky-P      Win32 Worm         Stable             March 2004
                                                                                    tries to spread through various file-sharing programs by copying itself into various
                                                                                    shared folders.
                                                                                    A mass-mailing worm that attempts to launch Denial of Service attacks against several
    3     Netsky-Q      Win32 Worm         Stable             March 2004            web pages, deletes the entries belonging to several worms, and emits a sound through
                                                                                    the internal speaker.
                                                                                    A mass-mailing worm that sends itself to email addresses gathered from the infected
    4     Zafi-D        Win32 Worm         Stable             December 2004         computer. The worm may also attempt to lower security settings, terminate processes,
                                                                                    and open a back door on the compromised computer.
                                                                                    A simplified variant of the Netsky mass-mailing worm in that it does not contain many of
    5     Netsky-D      Win32 Worm         Stable             March 2004            the text strings that were present in NetSky.C and it does not copy itself to shared
                                                                                    folders. Netsky.D spreads itself in e-mails as an executable attachment only.
                                                                                    A mass-mailing worm that propagates via by using MAPI as a reply to messages, by
    6     Lovgate.w     Win32 Worm         Stable             April 2004            using an internal SMTP, by dropping copies of itself on network shares, and through
                                                                                    peer-to-peer networks. Attempts to access all machines in the local area network.
                                                                                    A mass-mailing worm that spreads via e-mail using several different languages,
    7     Zafi-B        Win32 Worm         Stable             June 2004             including English, Hungarian and Russian. When executed, the worm makes two copies
                                                                                    of itself in the %System% directory with randomly generated file names.
                                                                        A mass-mailing worm that is very close to previous variants. The worm spreads in
    8     Netsky-Z     Win32 Worm        Stable   April 2004            e-mails, but does not spread to local network and P2P and does not uninstall Bagle
                                                                        worm. The worm has a backdoor that listens on port 665.
                                                                        A mass-mailing worm that uses its own SMTP engine to send itself to the email
    9     Netsky-B     Win32 Worm        Stable   February 2004         addresses it finds when scanning the hard drives and mapped drives. Also searches
                                                                        drives for certain folder names and then copies itself to those folders.
                                                                        A mass-mailing worm that uses its own SMTP engine to generate email messages. It
   10     MyDoom-O     Win32 Worm        Stable   July 2004             gathers its target email addresses from files with certain extension names. It also avoids
                                                                        sending email messages to email addresses that contain certain strings.

                                                         Table Updated June 28, 2005

Viruses or Trojans Considered to be a High Level of Threat

        Nothing significant to report.
[back to top]




                                                               Last updated July 11, 2005

								
To top