Weekly Vulnerabilities Reports > May 15 to 21, 2000

Overview

26 new vulnerabilities reported during this period, including 5 critical vulnerabilities and 8 high severity vulnerabilities. This weekly summary report vulnerabilities in 34 products from 23 vendors including Redhat, Microsoft, MIT, Cygnus, and BE. Vulnerabilities are notably categorized as and "Resource Management Errors".

  • 22 reported vulnerabilities are remotely exploitables.
  • 26 reported vulnerabilities are exploitable by an anonymous user.
  • Redhat has the most reported vulnerabilities, with 4 reported vulnerabilities.
  • Redhat has the most reported critical vulnerabilities, with 3 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

5 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-18 CVE-2000-0437 Network Associates Remote Buffer Overflow vulnerability in Gauntlet Firewall

Buffer overflow in the CyberPatrol daemon "cyberdaemon" used in gauntlet and WebShield allows remote attackers to cause a denial of service or execute arbitrary commands.

10.0
2000-05-16 CVE-2000-0405 Atstake Unspecified vulnerability in Atstake Antisniff 1.0/1.0.1

Buffer overflow in L0pht AntiSniff allows remote attackers to execute arbitrary commands via a malformed DNS response packet.

10.0
2000-05-16 CVE-2000-0391 Cygnus
MIT
Redhat
Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges.
10.0
2000-05-16 CVE-2000-0390 Cygnus
MIT
Redhat
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges.
10.0
2000-05-16 CVE-2000-0389 Cygnus
MIT
Redhat
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
10.0

8 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-19 CVE-2000-0305 BE
Microsoft
Resource Management Errors vulnerability in multiple products

Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.

7.8
2000-05-17 CVE-2000-0464 Microsoft Unspecified vulnerability in Microsoft Internet Explorer

Internet Explorer 4.x and 5.x allows remote attackers to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.

7.6
2000-05-18 CVE-2000-0450 Sean Macguire Buffer Overflow vulnerability in Big Brother bbd.c

Vulnerability in bbd server in Big Brother System and Network Monitor allows an attacker to execute arbitrary commands.

7.5
2000-05-16 CVE-2000-0432 Matt Kruse Unspecified vulnerability in Matt Kruse Calendar Script 2.2

The calender.pl and the calendar_admin.pl calendar scripts by Matt Kruse allow remote attackers to execute arbitrary commands via shell metacharacters.

7.5
2000-05-15 CVE-2000-0424 George Burgyan Unspecified vulnerability in George Burgyan CGI Counter 4.0.2/4.0.7

The CGI counter 4.0.7 by George Burgyan allows remote attackers to execute arbitrary commands via shell metacharacters.

7.5
2000-05-17 CVE-1999-1008 Freebsd
Mandrakesoft
xsoldier program allows local users to gain root access via a long argument.
7.2
2000-05-16 CVE-2000-0393 KDE Unspecified vulnerability in KDE

The KDE kscd program does not drop privileges when executing a program specified in a user's SHELL environmental variable, which allows the user to gain privileges by specifying an alternate program to execute.

7.2
2000-05-16 CVE-2000-0392 Cygnus
MIT
Redhat
Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.
7.2

12 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-17 CVE-2000-0465 Microsoft Unspecified vulnerability in Microsoft Internet Explorer

Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files via the frame, aka the "Frame Domain Verification" vulnerability.

5.1
2000-05-19 CVE-2000-0451 Intel Unspecified vulnerability in Intel Express 8100

The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets.

5.0
2000-05-19 CVE-2000-0436 Metaproducts Unspecified vulnerability in Metaproducts Offline Explorer 1.0/1.1/1.2

MetaProducts Offline Explorer 1.2 and earlier allows remote attackers to access arbitrary files via a ..

5.0
2000-05-18 CVE-2000-0463 BE Unspecified vulnerability in BE Beos 5.0

BeOS 5.0 allows remote attackers to cause a denial of service via fragmented TCP packets.

5.0
2000-05-18 CVE-2000-0453 Xfree86 Project Unspecified vulnerability in Xfree86 Project X11R6 3.3.5/3.3.6/4.0

XFree86 3.3.x and 4.0 allows a user to cause a denial of service via a negative counter value in a malformed TCP packet that is sent to port 6000.

5.0
2000-05-18 CVE-2000-0452 Lotus Unspecified vulnerability in Lotus Domino Enterprise Server and Domino Mail Server

Buffer overflow in the ESMTP service of Lotus Domino Server 5.0.1 allows remote attackers to cause a denial of service via a long MAIL FROM command.

5.0
2000-05-18 CVE-2000-0394 Axent Unspecified vulnerability in Axent Netprowler 3.0

NetProwler 3.0 allows remote attackers to cause a denial of service by sending malformed IP packets that trigger NetProwler's Man-in-the-Middle signature.

5.0
2000-05-17 CVE-2000-0417 Cayman Unspecified vulnerability in Cayman 3220-H DSL Router and Gatorsurf

The HTTP administration interface to the Cayman 3220-H DSL router allows remote attackers to cause a denial of service via a long username or password.

5.0
2000-05-17 CVE-2000-0350 Networkice Unspecified vulnerability in Networkice Icecap Manager

A debugging feature in NetworkICE ICEcap 2.0.23 and earlier is enabled, which allows a remote attacker to bypass the weak authentication and post unencrypted events.

5.0
2000-05-16 CVE-2000-0395 Computalynx Unspecified vulnerability in Computalynx Cproxy Server 3.3Sp2

Buffer overflow in CProxy 3.3 allows remote users to cause a denial of service via a long HTTP request.

5.0
2000-05-16 CVE-1999-0980 Microsoft Unspecified vulnerability in Microsoft Windows NT 4.0

Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request.

5.0
2000-05-15 CVE-2000-0397 Seattle LAB Software Unspecified vulnerability in Seattle LAB Software Emurl 2.0

The EMURL web-based email account software encodes predictable identifiers in user session URLs, which allows a remote attacker to access a user's email account.

5.0

1 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2000-05-16 CVE-2000-0379 Netopia Unspecified vulnerability in Netopia R-Series Routers 4.6.2

The Netopia R9100 router does not prevent authenticated users from modifying SNMP tables, even if the administrator has configured it to do so.

3.6