Weekly Vulnerabilities Reports > July 26 to August 1, 1999

Overview

12 new vulnerabilities reported during this period, including 0 critical vulnerabilities and 6 high severity vulnerabilities. This weekly summary report vulnerabilities in 13 products from 11 vendors including Microsoft, Linux, Midnight Commander, Checkpoint, and Fujitsu. Vulnerabilities are notably categorized as and "Improper Restriction of Operations within the Bounds of a Memory Buffer".

  • 7 reported vulnerabilities are remotely exploitables.
  • 12 reported vulnerabilities are exploitable by an anonymous user.
  • Microsoft has the most reported vulnerabilities, with 2 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

0 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS

6 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
1999-07-28 CVE-2000-0323 Microsoft Unspecified vulnerability in Microsoft JET 3.5/3.51/4.0

The Microsoft Jet database engine allows an attacker to modify text files via a database query, aka the "Text I-ISAM" vulnerability.

7.6
1999-07-29 CVE-1999-1078 Ipswitch Unspecified vulnerability in Ipswitch WS FTP PRO 6.0

WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges.

7.5
1999-07-28 CVE-1999-1017 Seattle LAB Software Unspecified vulnerability in Seattle LAB Software Emurl

Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message.

7.5
1999-07-27 CVE-1999-1018 Linux Unspecified vulnerability in Linux Kernel

IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.

7.5
1999-07-30 CVE-1999-1536 Acushop Unspecified vulnerability in Acushop Salesbuilder 2.6

.sbstart startup script in AcuShop Salesbuilder is world writable, which allows local users to gain privileges by appending commands to the file.

7.2
1999-07-30 CVE-1999-1227 Ethereal Group Unspecified vulnerability in Ethereal Group Ethereal

Ethereal allows local users to overwrite arbitrary files via a symlink attack on the packet capture file.

7.2

5 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
1999-07-29 CVE-1999-0700 Microsoft Buffer Errors vulnerability in Microsoft Windows 2000 and Windows NT

Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.

6.2
1999-08-01 CVE-1999-0672 Fujitsu Unspecified vulnerability in Fujitsu Chocoa 1.0Beta7R

Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics.

5.1
1999-07-30 CVE-1999-1130 Netscape Unspecified vulnerability in Netscape Enterprise Server

Default configuration of the search engine in Netscape Enterprise Server 3.5.1, and possibly other versions, allows remote attackers to read the source of JHTML files by specifying a search command using the HTML-tocrec-demo1.pat pattern file.

5.0
1999-07-30 CVE-1999-0683 Network Associates Unspecified vulnerability in Network Associates Gauntlet Firewall 5.0

Denial of service in Gauntlet Firewall via a malformed ICMP packet.

5.0
1999-08-01 CVE-1999-1337 Midnight Commander Unspecified vulnerability in Midnight Commander Midnight Commander

FTP client in Midnight Commander (mc) before 4.5.11 stores usernames and passwords for visited sites in plaintext in the world-readable history file, which allows other local users to gain privileges.

4.6

1 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
1999-07-29 CVE-1999-0770 Checkpoint Unspecified vulnerability in Checkpoint Firewall-1 3.0/4.0

Firewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an attacker to conduct a denial of service via a large number of connection attempts to unresponsive systems.

2.1