Weekly Vulnerabilities Reports > January 24 to 30, 2000

Overview

11 new vulnerabilities reported during this period, including 0 critical vulnerabilities and 7 high severity vulnerabilities. This weekly summary report vulnerabilities in 12 products from 9 vendors including Microsoft, IBM, HP, Qualcomm, and Checkpoint. Vulnerabilities are notably categorized as and "Classic Buffer Overflow".

  • 7 reported vulnerabilities are remotely exploitables.
  • 11 reported vulnerabilities are exploitable by an anonymous user.
  • Microsoft has the most reported vulnerabilities, with 3 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

0 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS

7 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-01-29 CVE-2000-0116 Checkpoint Unspecified vulnerability in Checkpoint Firewall-1 3.0

Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag.

7.5
2000-01-29 CVE-2000-0111 AVT Unspecified vulnerability in AVT Rightfax 5.2

The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions.

7.5
2000-01-27 CVE-2000-0113 Sybergen Unspecified vulnerability in Sybergen Sygate 2.0/3.11

The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics.

7.5
2000-01-30 CVE-2000-0117 SUN Unspecified vulnerability in SUN Cobalt Raq, Cobalt RAQ 2 and Cobalt RAQ 3I

The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root).

7.2
2000-01-27 CVE-2000-1216 IBM Classic Buffer Overflow vulnerability in IBM AIX 4.3.0

Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine.

7.2
2000-01-27 CVE-2000-0130 SCO Unspecified vulnerability in SCO Unixware 7.0/7.0.1/7.1

Buffer overflow in SCO scohelp program allows remote attackers to execute commands.

7.2
2000-01-26 CVE-2000-0096 Qualcomm Buffer Overflow vulnerability in Qualcomm qpopper 'LIST'

Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.

7.2

4 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-01-26 CVE-2000-0126 Microsoft Unspecified vulnerability in Microsoft Internet Information Server 3.0/4.0

Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a ..

5.0
2000-01-26 CVE-2000-0098 Microsoft Unspecified vulnerability in Microsoft Index Server 2.0

Microsoft Index Server allows remote attackers to determine the real path for a web directory via a request to an Internet Data Query file that does not exist.

5.0
2000-01-26 CVE-2000-0097 Microsoft Unspecified vulnerability in Microsoft Index Server 2.0

The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the "Malformed Hit-Highlighting Argument" vulnerability.

5.0
2000-01-24 CVE-2000-0095 HP Unspecified vulnerability in HP Hp-Ux 10.30/11.00

The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier.

5.0

0 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS