Weekly Vulnerabilities Reports > May 1 to 7, 2000

Overview

31 new vulnerabilities reported during this period, including 4 critical vulnerabilities and 7 high severity vulnerabilities. This weekly summary report vulnerabilities in 40 products from 26 vendors including Microsoft, Suse, Netwin, Filemaker, and Network Associates. Vulnerabilities are notably categorized as .

  • 25 reported vulnerabilities are remotely exploitables.
  • 31 reported vulnerabilities are exploitable by an anonymous user.
  • Microsoft has the most reported vulnerabilities, with 2 reported vulnerabilities.
  • Lsoft has the most reported critical vulnerabilities, with 1 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

4 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-04 CVE-2000-0428 Trend Micro Unspecified vulnerability in Trend Micro Interscan Viruswall

Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment.

10.0
2000-05-03 CVE-2000-0425 Lsoft Unspecified vulnerability in Lsoft Listserv 1.8

Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands.

10.0
2000-05-02 CVE-2000-0343 Brecht Claerhout Buffer Overflow vulnerability in Brecht Claerhout Sniffit 0.3.6Hip/0.3.7Beta

Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.

10.0
2000-05-01 CVE-2000-0449 Omnis Unspecified vulnerability in Omnis Studio 2.4

Omnis Studio 2.4 uses weak encryption (trivial encoding) for encrypting database fields.

10.0

7 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-04 CVE-2000-0422 Netwin Buffer Overflow vulnerability in Netwin Dmail 2.5D

Buffer overflow in Netwin DMailWeb CGI program allows remote attackers to execute arbitrary commands via a long utoken parameter.

7.5
2000-05-03 CVE-2000-0335 GNU
ISC
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.
7.5
2000-05-02 CVE-2000-0386 Filemaker Remote Security vulnerability in Filemaker 5.0

FileMaker Pro 5 Web Companion allows remote attackers to send anonymous or forged email.

7.5
2000-05-01 CVE-2000-0447 Network Associates Unspecified vulnerability in Network Associates Webshield 4.5.44

Buffer overflow in WebShield SMTP 4.5.44 allows remote attackers to execute arbitrary commands via a long configuration parameter to the WebShield remote management service.

7.5
2000-05-01 CVE-2000-0401 Pdgsoft Buffer Overflow vulnerability in Pdgsoft PDG Shopping Cart 1.5

Buffer overflows in redirect.exe and changepw.exe in PDGSoft shopping cart allow remote attackers to execute arbitrary commands via a long query string.

7.5
2000-05-01 CVE-1999-0427 Qualcomm Denial-Of-Service vulnerability in Qualcomm Eudora, Eudora Light and Eudora PRO

Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.

7.5
2000-05-03 CVE-2000-0378 Redhat Unspecified vulnerability in Redhat Linux 6.0/6.1/6.2

The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.

7.2

18 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-05 CVE-2000-0381 Gossamer Threads Unspecified vulnerability in Gossamer Threads Dbman 2.0.4

The Gossamer Threads DBMan db.cgi CGI script allows remote attackers to view environmental variables and setup information by referencing a non-existing database in the db parameter.

6.4
2000-05-03 CVE-2000-0303 ID Software Unspecified vulnerability in ID Software Quake 3 Arena 1.16N

Quake3 Arena allows malicious server operators to read or modify files on a client via a dot dot (..) attack.

6.4
2000-05-06 CVE-2000-0413 Microsoft Path Disclosure vulnerability in Microsoft products

The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a file that does not exist, which generates an error message that reveals the path.

5.0
2000-05-05 CVE-2000-0426 Ultrascripts Unspecified vulnerability in Ultrascripts Ultraboard 1.6

UltraBoard 1.6 and other versions allow remote attackers to cause a denial of service by referencing UltraBoard in the Session parameter, which causes UltraBoard to fork copies of itself.

5.0
2000-05-05 CVE-2000-0423 Netwin Buffer Overflow vulnerability in Netwin Dnews 5.3

Buffer overflow in Netwin DNEWSWEB CGI program allows remote attackers to execute arbitrary commands via long parameters such as group, cmd, and utag.

5.0
2000-05-03 CVE-2000-0430 Mcmurtrey Whitaker AND Associates Unspecified vulnerability in Mcmurtrey Whitaker and Associates Cart32 3.0

Cart32 allows remote attackers to access sensitive debugging information by appending /expdate to the URL request.

5.0
2000-05-03 CVE-2000-0332 Ultrascripts Unspecified vulnerability in Ultrascripts Ultraboard 1.6

UltraBoard.pl or UltraBoard.cgi CGI scripts in UltraBoard 1.6 allows remote attackers to read arbitrary files via a pathname string that includes a dot dot (..) and ends with a null byte.

5.0
2000-05-02 CVE-2000-0385 Filemaker Security Bypass vulnerability in Filemaker 5.0

FileMaker Pro 5 Web Companion allows remote attackers to bypass Field-Level database security restrictions via the XML publishing or email capabilities.

5.0
2000-05-02 CVE-2000-0347 Microsoft Unspecified vulnerability in Microsoft Windows 95 and Windows 98

Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.

5.0
2000-05-02 CVE-2000-0346 Apple Unspecified vulnerability in Apple Appleshare 6.1/6.2/6.3

AppleShare IP 6.1 and later allows a remote attacker to read potentially sensitive information via an invalid range request to the web server.

5.0
2000-05-02 CVE-2000-0138 A system has a distributed denial of service (DDOS) attack master, agent, or zombie installed, such as (1) Trinoo, (2) Tribe Flood Network (TFN), (3) Tribe Flood Network 2000 (TFN2K), (4) stacheldraht, (5) mstream, or (6) shaft.
5.0
2000-05-01 CVE-2000-0448 Network Associates Unspecified vulnerability in Network Associates Webshield 4.5.44

The WebShield SMTP Management Tool version 4.5.44 does not properly restrict access to the management port when an IP address does not resolve to a hostname, which allows remote attackers to access the configuration via the GET_CONFIG command.

5.0
2000-05-01 CVE-2000-0440 Freebsd
Netbsd
NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option.
5.0
2000-05-01 CVE-2000-0344 Linux Unspecified vulnerability in Linux Kernel 2.1/2.2.0/2.3.0

The knfsd NFS server in Linux kernel 2.2.x allows remote attackers to cause a denial of service via a negative size value.

5.0
2000-05-01 CVE-2000-0341 Atrium Software Unspecified vulnerability in Atrium Software Cassandra Nntp Server 1.10

ATRIUM Cassandra NNTP Server 1.10 allows remote attackers to cause a denial of service via a long login name.

5.0
2000-05-04 CVE-2000-0427 Aladdin Knowledge Systems Unspecified vulnerability in Aladdin Knowledge Systems Etoken 3.3.3

The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM.

4.6
2000-05-04 CVE-2000-0414 HP Unspecified vulnerability in HP Hp-Ux and Vvos

Vulnerability in shutdown command for HP-UX 11.X and 10.X allows allows local users to gain privileges via malformed input variables.

4.6
2000-05-02 CVE-2000-0433 Suse Unspecified vulnerability in Suse Linux

The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles.

4.6

2 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-03 CVE-2000-0345 Cisco Unspecified vulnerability in Cisco products

The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.

2.1
2000-05-02 CVE-2000-0293 Suse Unspecified vulnerability in Suse Linux

aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory.

2.1