Weekly Vulnerabilities Reports > January 3 to 9, 2000

Overview

21 new vulnerabilities reported during this period, including 8 critical vulnerabilities and 7 high severity vulnerabilities. This weekly summary report vulnerabilities in 23 products from 17 vendors including Microsoft, Redhat, Allaire, SGI, and Debian. Vulnerabilities are notably categorized as and "Improper Restriction of Operations within the Bounds of a Memory Buffer".

  • 16 reported vulnerabilities are remotely exploitables.
  • 21 reported vulnerabilities are exploitable by an anonymous user.
  • Microsoft has the most reported vulnerabilities, with 4 reported vulnerabilities.
  • Redhat has the most reported critical vulnerabilities, with 3 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

8 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-01-08 CVE-2000-1221 SGI
Debian
Redhat
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
10.0
2000-01-08 CVE-2000-1220 SGI
Redhat
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
10.0
2000-01-07 CVE-2000-0061 Microsoft Unspecified vulnerability in Microsoft Internet Explorer

Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading.

10.0
2000-01-06 CVE-2000-0044 Jgaa Unspecified vulnerability in Jgaa Warftpd 1.70B/1.8.2

Macros in War FTP 1.70 and 1.67b2 allow local or remote attackers to read arbitrary files or execute commands.

10.0
2000-01-04 CVE-2000-0062 Zope Unspecified vulnerability in Zope 1.10.3/2.1.1

The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities.

10.0
2000-01-04 CVE-2000-0059 PHP Unspecified vulnerability in PHP

PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.

10.0
2000-01-04 CVE-1999-0894 Redhat Unspecified vulnerability in Redhat Linux

Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.

10.0
2000-01-04 CVE-1999-0876 Microsoft Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft IE and Internet Explorer

Buffer overflow in Internet Explorer 4.0 via EMBED tag.

10.0

7 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-01-04 CVE-2000-0085 Microsoft Remote Security vulnerability in Hotmail

Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute code via the LOWSRC or DYNRC parameters in the IMG tag.

7.5
2000-01-04 CVE-2000-0057 Allaire Unspecified vulnerability in Allaire Coldfusion Server 4.0/4.0.1

Cold Fusion CFCACHE tag places temporary cache files within the web document root, allowing remote attackers to obtain sensitive system information.

7.5
2000-01-04 CVE-2000-0053 Microsoft Unspecified vulnerability in Microsoft Commercial Internet System 2.0/2.5

Microsoft Commercial Internet System (MCIS) IMAP server allows remote attackers to cause a denial of service via a malformed IMAP request.

7.5
2000-01-04 CVE-1999-0744 Netscape Unspecified vulnerability in Netscape Enterprise Server and Fasttrack Server

Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request.

7.5
2000-01-06 CVE-2000-0055 SUN Buffer Overflow vulnerability in SUN Solaris and Sunos

Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option.

7.2
2000-01-04 CVE-2000-0052 Mandrakesoft
Redhat
Turbolinux
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a ..
7.2
2000-01-04 CVE-2000-0049 Nullsoft Unspecified vulnerability in Nullsoft Winamp 2.0/2.10

Buffer overflow in Winamp client allows remote attackers to execute commands via a long entry in a .pls file.

7.2

6 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-01-06 CVE-2000-0084 Globalscape Remote Security vulnerability in CuteFTP

CuteFTP uses weak encryption to store password information in its tree.dat file.

5.0
2000-01-05 CVE-2000-0058 Handspring Unspecified vulnerability in Handspring Visor Network Hotsync 1.0

Network HotSync program in Handspring Visor does not have authentication, which allows remote attackers to retrieve email and files.

5.0
2000-01-05 CVE-2000-0056 Ipswitch Unspecified vulnerability in Ipswitch Imail 5.0.8/6.0/6.1

IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi.

5.0
2000-01-04 CVE-2000-0051 Allaire Unspecified vulnerability in Allaire Spectra 1.0

The Allaire Spectra Configuration Wizard allows remote attackers to cause a denial of service by repeatedly resubmitting data collections for indexing via a URL.

5.0
2000-01-04 CVE-2000-0050 Allaire Unspecified vulnerability in Allaire Spectra 1.0

The Allaire Spectra Webtop allows authenticated users to access other Webtop sections by specifying explicit URLs.

4.6
2000-01-04 CVE-1999-0735 KDE Unspecified vulnerability in KDE K-Mail

KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories.

4.6

0 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS