Summary of Security Items from April 6 through April 12, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, so the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
Active Auction House | Multiple input validation vulnerabilities have been reported that could let a remote malicious user inject SQL commands and conduct Cross-Site Scripting attacks. Input validation errors exist in several scripts and the e-mail field in '/activeauctionsuperstore/sendpassword.asp' permits SQL injection. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | High | Dcrab 's Security Advisory, | |
AN HTTP Server 1.42n | A buffer overflow vulnerability has been reported in 'cmdIS.DLL' that could let a local malicious user execute arbitrary code with the privileges of the web service and remote malicious users conduct Cross-Site Scripting attacks. The server also does not properly validate user-supplied URI input before writing the data to the log file. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | High | SIG^2 Vulnerability Research Advisory,
| |
FirstClass Bookmark 8.0 client | A vulnerability has been reported that could let a remote malicious user execute arbitrary files. This is because a field in the FirstClass bookmark management window is not properly validated. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | High | Security Tracker Alert,1013665, April 8, 2005 | |
eTrust Intrusion Detection 3.0 | A buffer overflow vulnerability has been reported that could let a remote malicious user cause a Denial of Service. This is because the software does not properly validate user-supplied input provided to the Microsoft Crypto API CPImportKey() function. Update for eTrust Intrusion Detection 3.0:
href="http://supportconnectw.ca.com/premium/etrust/et rust_intrusion/downloads/eid-solpatch_r30.asp#rel30">http://supportconnectw.ca.com/premium/etrust/ Update for eTrust Intrusion Detection 3.0 SP1: Currently we are not aware of any exploits for this vulnerability. | Computer Associates eTrust Intrusion Detection Denial of Service Vulnerability href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0968">CAN-2005-0968 | Low | iDEFENSE Security Advisory 04.05.05 |
DameWare Mini Remote Control 3.x prior to 3.80; 4.x prior to 4.9 | A vulnerability has been reported that could let a remote authenticated malicious user gain elevated privileges. Fixed versions (3.80, 4.9) are available: Currently we are not aware of any exploits for this vulnerability. | Medium | DameWare Security Bulletin #: 5, April 5, 2005 | |
DC++ prior to 0.674 | A vulnerability has been reported that could let malicious users append data to arbitrary files. Update to version 0.674: Currently we are not aware of any exploits for this vulnerability. | Medium | DC++ News: Security fix April 11, 2005 | |
Maxthon (MyIE2) 1.2.0 and 1.2.1 | A vulnerability has been reported that could let a remote malicious user execute arbitrary code. This is because the security ID of a plug-in is not properly protected from being included and accessed on an external website via the script tag. Update to version 1.2.2: href="http://www.maxthon.com/download.htm">http://www.maxthon.com/download.htm A Proof of Concept exploit has been published. | High | Aviv Raff Security Advisory, April 8, 2005 | |
DeluxeFTP 6.01 | A security issue has been reported that could let a local malicious user view sensitive information. User credentials are stored in plain text in 'sites.xml.' No workaround or patch available at time of publishing. There is no exploit code required. | Medium | Security Focus, Bugtraq ID 13105, April 12, 2005 | |
MailEnable Enterprise Edition 1.x MailEnable Professional 1.54 | A buffer overflow vulnerability has been reported that could let a remote malicious user cause a Denial of Service and potentially execute arbitrary code. This is due to a boundary error in the IMAP service when handling the 'LOGIN' command. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Low/ High (High if arbitrary code can be executed) | Secunia SA14870, | |
Exchange 2000 Server SP3, 2003, 2003 SP1 | A vulnerability has been reported due to an unchecked buffer in the SMTP service that could let a remote malicious user execute arbitrary code. Updates available:
href="http://www.microsoft.com/technet/security/Bulletin/MS05-021.mspx">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for this vulnerability. | High | Microsoft Security href="http://www.us-cert.gov/cas/techalerts/TA05-102A.html">Technical Cyber Security Alert TA05-102A | |
Internet Explorer 5.01, 5.5, 6 | Multiple vulnerabilities have been reported that include DHTML Object Memory Corruption, URL Parsing Memory Corruption, and Content Advisor Memory Corruption Vulnerability. These vulnerabilities could let remote malicious users execute arbitrary code. Updates available:
href="http://www.microsoft.com/technet/security/Bulletin/MS05-020.mspx">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for these vulnerabilities. | Microsoft Internet Explorer Remote Code Execution Vulnerability
href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0553">CAN-2005-0553 | High | Microsoft Security Bulletin MS05-020, April 12, 2005 href="http://www.us-cert.gov/cas/techalerts/TA05-102A.html">Technical Cyber Security Alert TA05-102A US-CERT VU#774338, |
msjet40.dll library version 4.00.8618.0 | A vulnerability was reported that could let a remote malicious user cause arbitrary code to be executed. This is because the 'msjet40.dll' component does not properly validate user-supplied input when parsing database files. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Microsoft Jet Database Remote Code Execution Vulnerability href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0944">CAN-2005-0944 (Updated CVE) | High | Hexview Advisory, |
Windows Media Player 9 Series, Windows Messenger 5.0, MSN Messenger 6.1, 6.2 | Several vulnerabilities exist: a vulnerability exists in Media Player due to a failure to properly handle PNG files that contain excessive width or height values, which could let a remote malicious user execute arbitrary code; and a vulnerability exists in the Windows and MSN Messenger due to a failure to properly handle corrupt or malformed PNG files, which could let a remote malicious user execute arbitrary code. Patches available at: V1.1: Bulletin updated with information on the mandatory upgrade of vulnerable MSN Messenger clients in the caveat section, as well as changes to the Workarounds for PNG Processing Vulnerability in MSN Messenger – CAN-2004-0597 V1.2: Bulletin updated with correct file version V2.0: The update for Windows Messenger version 4.7.0.2009 (when running on Windows XP Service Pack 1) was failing to install when distributed via SMS or AutoUpdate. An updated package corrects this behavior. An exploit script has been published for MSN Messenger/Windows Messenger PNG Buffer Overflow vulnerability. | Microsoft Media Player & Windows/MSN Messenger PNG Processing | High | Microsoft Security Bulletin, MS05-009, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A US-CERT Cyber Security Alert SA05-039A US-CERT Vulnerability Note VU#259890 SecurityFocus, February 10, 2005 Microsoft Security Bulletin MS05-009 V1.1, February 11, 2005 Microsoft Security Bulletin, MS05-009 V1.2, February 15, 2005 Microsoft Security Bulletin, MS05-009 V2.0, April 12, 2005 |
MSN Messenger 6.2 | A vulnerability has been reported because MSN Messenger may not process a malformed GIF image with an improper height and width. This could let remote malicious users execute arbitrary code. Updates available:
href="http://www.microsoft.com/technet/security/Bulletin/MS05-022.mspx ">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for this vulnerability. | High | Microsoft Security Bulletin MS05-022, April 12, 2005 href="http://www.us-cert.gov/cas/techalerts/TA05-102A.html">Technical Cyber Security Alert TA05-102A | |
Outlook 2003, XP Outlook Web Access 2003
| A vulnerability has been reported that could let a remote malicious user can spoof 'From' addresses. A remote user can send e-mail with a specially crafted 'From' address header line that contains multiple e-mail addresses, the user's client will display only the first address. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Low | iDEFENSE Security Advisory 04.08.05 | |
Windows (XP SP2 is not affected) | A Denial of Service vulnerability exists in the parsing of ANI files. A remote user can cause the target user's system to hang or crash. A remote user can create a specially crafted Windows animated cursor file (ANI file) that, when loaded by the target user, will cause the target system to crash. The malicious file can be loaded via HTML, for example. Updates available at:
href="http://www.microsoft.com/technet/security/bulletin/ms05-002.mspx"> Bulletin V1.1 (January 20, 2005): Updated CAN reference and added acknowledgment to finder for CAN-2004-1305. V1.2 Frequently Asked Questions updated to reflect Windows 98, 98SE and ME security update availability. V2.0 Customers deploying the Windows 98, 98SE and ME security update caused machines to unexpectedly restart. Microsoft has made available revised security updates for these platforms. Another exploit script has been published. | Low | VENUSTECH Security Lab, December 23, 2004 Microsoft Security Bulletin MS05-002, January 11, 2005 Security Focus, January 12, 2005 Technical Cyber Security Alert, TA05-012A, January 12, 2005 Microsoft Security Bulletin, MS05-002, V1.1, January 20, 2005 PacketStorm, January 31, 2005 Microsoft Security Bulletin, MS05-002, V1.2, March 8, 2005 Microsoft Security Bulletin, MS05-002, V2.0, April 12, 2005 | |
Windows 2000 SP3 and SP4 Windows XP SP1 and SP2 Windows XP 64-Bit Edition SP1 and 2003 (Itanium) Windows Server 2003 Windows Server 2003 for Itanium-based Systems Windows 98, 98 SE, and ME | Multiple vulnerabilities have been reported that include errors in the font, Kernel, Object Management Vulnerability and CSRSS. These are due to input validation and buffer overflow errors. A malicious user could deny service or obtain escalated privileges. Updates available:
href="http://www.microsoft.com/technet/security/Bulletin/MS05-018.mspx">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for these vulnerabilities. | Microsoft Windows Kernel Elevation of Privilege and Denial of Service Vulnerabilities
href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0060">CAN-2005-0060 | Low/ Medium (Medium if elevated privileges can be obtained) | Microsoft Security Bulletin MS05-018, April 12, 2005 |
Windows NT Server 4.0 SP6a, Windows NT Server 4.0 Terminal Server Avaya DefinityOne Media Servers; Avaya IP600 Media Servers; Avaya S3400 Message Application Server; Avaya S8100 Media Servers | A buffer overflow vulnerability exists in the License Logging service due to a boundary error, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code. Patches available at:
href="http://www.microsoft.com/technet/security/bulletin/MS05-007.mspx"> A Proof of Concept exploit has been published. | Low/ High (High if arbitrary code can be executed) | Microsoft Security Bulletin, MS05-010, February 8, 2005 US-CERT Technical Cyber Security Alert TA05-039A US-CERT Cyber Security Alert SA05-039A US-CERT Vulnerability Note VU#130433 Security Focus, Bugtraq ID 12481, April 12, 2005 | |
Windows 2000 SP 3 and SP4 Windows XP SP1 Windows XP 64-Bit Edition SP1 Windows 98 and 98 SE | A buffer overflow vulnerability has been reported that could let a remote malicious user execute arbitrary code. Updates available:
href="http://www.microsoft.com/technet/security/Bulletin/MS05-017.mspx">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for this vulnerability. | High | Microsoft Security Bulletin MS05-017, April 12, 2005 | |
Windows 2000 SP3 and SP4 Windows XP SP1 and SP2 Windows XP 64-Bit Edition SP 1 and 2003 (Itanium) Windows Server 2003 Windows Server 2003 for Itanium-based Systems Windows 98, 98 SE, ME | A vulnerability has been reported that could let a remote malicious user execute arbitrary code. This is because of an error in the process to validate which application should load a file. A remote user can convince the Windows Shell to start the HTML Application Host application when that application would not typically be used to process files. Updates available:
href="http://www.microsoft.com/technet/security/Bulletin/MS05-016.mspx ">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for this vulnerability. | Microsoft Windows Shell Remote Code Execution Vulnerability href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0063">CAN-2005-0063 | High | Microsoft Security Bulletin MS05-016, April 12, 2005 |
Windows 2000 SP 3 and SP4 Windows XP SP 1 and SP2 Windows XP 64-Bit Edition SP1 and 2003 (Itanium) Windows Server 2003 Windows Server 2003 for Itanium-based Systems Windows 98, Windows 98 SE, and Windows ME | Multiple vulnerabilities have been reported that include IP Validation, ICMP Connection Reset, ICMP Path MTU, TCP Connection Reset, and Spoofed Connection Request. These vulnerabilities could let remote malicious users execute arbitrary code or execute a Denial of Service. Updates available:
href="http://www.microsoft.com/technet/security/bulletin/MS05-019.mspx">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for these vulnerabilities. | Microsoft Windows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities
href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0048">CAN-2005-0048 | Low/ High (High if arbitrary code can be executed) | Microsoft Security Bulletin MS05-019, April 12, 2005 href="http://www.us-cert.gov/cas/techalerts/TA05-102A.html">Technical Cyber Security Alert TA05-102A |
Word 2000, 2002 Works Suite 2001, 2002, 2003, and 2004 Office Word 2003 | A buffer overflow vulnerability has been reported that could lead to remote execution of arbitrary code or escalation of privilege. Updates available:
href="http://www.microsoft.com/technet/security/Bulletin/MS05-023.mspx">http://www.microsoft.com/technet/ Currently we are not aware of any exploits for this vulnerability. | Microsoft Word Remote Code Execution and Escalation of Privilege Vulnerabilities
href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0963">CAN-2004-0963 | High | Microsoft Security Bulletin MS05-023, April 12, 2005 US-CERT |
'PopUp Plus' 2.0.3.8 plugin for Miranda Instant Messenger | A buffer overflow vulnerability has been reported that could let a remote malicious user execute arbitrary code on the target system. The vulnerability can be exploited if the 'Use SmileyAdd Setting' application menu option is enabled. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | High | sec.org.il Security Advisory, April 6, 2005 | |
Netscape Browser 7.2 and prior versions | A vulnerability has been reported in the Javascript regex parsing that could let a remote malicious user can obtain portions of browser memory. This is because the browser's javascript does not properly parse lamba list regular expressions. The vulnerability is in 'js/src/jsstr.c' in the find_replen() function. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Netscape Browser Information Disclosure Vulnerability | Medium | Security Tracker Alert ID: 1013643, April 5, 2005 |
FTP Now 2.6.14 | A vulnerability has been reported that could let a local malicious user obtain FTP passwords. This is because the application stores FTP username and password values on the system in plaintext form. No workaround or patch available at time of publishing. There is no exploit code required. | Medium | Security Tracker Alert ID: 1013657, April 6, 2005 | |
Ocean12 Membership Manager Pro 1.x | Two vulnerabilities have been reported that could let a remote user conduct Cross-Site Scripting and SQL injection attacks. This is due to input validation errors in the "page" parameter in "main.asp" and the "UserID" parameter in "main.asp." No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | High | Secunia SA14864, April 7, 2005 | |
P2P Share Spy 2.2 | A vulnerability has been reported that could let a local malicious user obtain the password because it is stored in the Windows Registry in plaintext form. No workaround or patch available at time of publishing. There is no exploit code required. | Medium | Security Tracker Alert ID: 1013673, April 11 2005 | |
GetDataBack for NTFS 2.31 | A vulnerability exists that could let a local malicious user obtain the license key. This is because the software stores the username and license key in the Windows Registry. No workaround or patch available at time of publishing. There is no exploit code required. | Medium | Security Tracker Alert ID: 1013644, April 5, 2005 |
name=unix>UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
FreeBSD 4.0 .x, 4.0, -RELENG, alpha, 4.1, 4.1.1, -STABLE, -RELEASE, 4.2, -STABLEpre122300, -STABLEpre050201, -STABLE, -RELEASE, 4.3, -STABLE, -RELENG, -RELEASE-p38, -RELEASE, 4.4, -STABLE, -RELENG, -RELEASE-p42, 4.5, -STABLEpre2002-03-07, -STABLE, -RELENG, -RELEASE-p32, -RELEASE, 4.6, -STABLE, -RELENG, -RELEASE-p20, -RELEASE, 4.6.2, 4.7, -STABLE, -RELENG, -RELEASE-p17, -RELEASE, 4.8, -RELENG, -RELEASE-p7, -PRERELEASE, 4.9, -RELENG, -PRERELEASE, 4.10, -RELENG, -RELEASE, 4.11 -STABLE, 5.0, -RELENG, -RELEASE-p14, alpha, 5.1, -RELENG, | A vulnerability has been reported in portupgrade due to a failure to securely handle temporary files, which could let a malicious user corrupt arbitrary files and potentially execute code.
Update to version 20041226_2. There is no exploit code required. | FreeBSD PortUpgrade l Insecure | High | Security Focus, 13106, April 12, 2005 |
FreeBSD 5.0, -RELENG,, -RELEASE-p14, | A vulnerability has been reported due to insufficient hardware access restrictions, which could let a malicious user obtain unauthorized access.
Patches available at: Currently we are not aware of any exploits for this vulnerability. | FreeBSD Kernel AMD64 Unprivileged Hardware Access | Medium | FreeBSD Security Advisory, FreeBSD-SA-05:03, April 6, 2005 |
Coreutils 5.2.1 | A vulnerability has been reported in the 'mkdir,' 'mknod,' and 'mkfifo' utilities due to a race condition, which could let a malicious user obtain sensitive information, corrupt data, and potentially obtain elevated privileges.
No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | GNU Core Utilities Race Condition | Medium | Security Focus, 13053, April 7, 2005 |
sharutils 4.2, 4.2.1 | Multiple buffer overflow vulnerabilities exists due to a failure to verify the length of user-supplied strings prior to copying them into finite process buffers, which could let a remote malicious user cause a Denial of Service or execute arbitrary code. Gentoo:
href="http://security.gentoo.org/glsa/glsa-200410-01.xml"> FedoraLegacy: Ubuntu: Fedora: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> We are not aware of any exploits for these vulnerabilities. | Low/ High (High if arbitrary code can be executed) | Gentoo Linux Fedora Legacy Ubuntu Security Fedora Update Notifications, Mandrakelinux Security Update Advisory, MDKSA-2005:067, April 7, 2005 | |
sharutils 4.2, 4.2.1 | A vulnerability has been reported in the 'unshar' utility due to the insecure creation of temporary files, which could let a malicious user create/overwrite arbitrary files. Ubuntu: Gentoo: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> There is no exploit code required. | GNU Sharutils 'Unshar' Insecure Temporary File Creation | Medium | Ubuntu Security Gentoo Linux Security Advisory, GLSA 200504-06, April 6, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:067, April 7, 2005 |
Grip 3.1.2, 3.2 .0 | A buffer overflow vulnerability has been reported in the CDDB protocol due to a boundary error, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code. Fedora: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-21.xml"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-304.html"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Gentoo: SUSE: Currently we are not aware of any exploits for this vulnerability. | Low/ (High if arbitrary code can be executed) | Fedora Update Notifications, Gentoo Linux RedHat Security Advisory, RHSA-2005:304-08, Mandrakelinux Security Update Advisory, Gentoo Linux Security Advisory, GLSA 200504-07, April 8, 2005 SUSE Security Summary Report, SUSE-SR:2005:010, April 8, 2005 | |
Gwenview 1.2 | Multiple vulnerabilities have been reported when allocating heap-based memory and the chunk size is derived from them image height, width, and plane values due to insufficient sanity checks, which could let a remote malicious user cause a Denial of Service or potentially execute arbitrary code.
No workaround or patch available at time of publishing. Currently, we are not aware of any exploits for these vulnerabilities. | GwenView Multiple Image Handling Heap-Based Vulnerabilities | Low/ High (High if arbitrary code can be executed) | Security Focus, 13098, April 11, 2005 |
AIX 5.3
| A vulnerability has been reported in the NIS client which could let a remote malicious user execute arbitrary code with root privileges. Hotfix available at: Currently we are not aware of any exploits for this vulnerability. | IBM AIX NIS Client Remote Arbitrary Code Execution | High | Secunia Advisory, SA14856, April 6, 2005 |
ImageMagick 6.x | A buffer overflow vulnerability exists in 'coders/psd.c' when a specially crafted Photoshop document file is submitted, which could let a remote malicious user execute arbitrary code. Update available at: Ubuntu: Debian: Gentoo: Gentoo: Fedora: SGI: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Currently we are not aware of any exploits for this vulnerability. | ImageMagick Photoshop Document Buffer Overflow CVE Name: | High | iDEFENSE Security Advisory, January 17, 2005 Ubuntu Security Notice, USN-62-1, January 18, 2005 Debian Security Advisory, DSA 646-1, January 19, 2005 Gentoo Linux Security Advisory, GLSA 200501-26, January 20, 2005 Gentoo Linux Security Advisory, GLSA 200501-37, January 26, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:065, April 3, 2005 |
KDE 1.1-1.1.2, 1.2, 2.1-2.1.2, 2.2-2.2.2, 3.0- 3.0.5, 3.1-3.1.5, 3.2-3.2.3, 3.3-3.3.2 | A Denial of Service vulnerability has been reported in the Desktop Communication Protocol (DCOP) daemon due to an error in the authentication process Upgrade available at: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-22.xml"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Fedora: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-325.html"> ALTLinux: RedHat: SUSE: Currently we are not aware of any exploits for this vulnerability. | Low | KDE Security Advisory, March 16, 2005 Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:325-07, March 23, 2005 ALTLinux Security Advisory, March 29, 2005 RedHat Security Advisory, RHSA-2005:307-08, April 6,2005 SUSE Security Announcement, SUSE-SA:2005:022, April 11, 2005 | |
kmail 1.7.1 | A vulnerability has been reported due to insufficient sanitization of HTML email messages, which could let a remote malicious user conduct spoofing attacks. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | KDE KMail HTML EMail Remote Spoofing | Medium | Secunia Advisory, SA14925, April 11, 2005 |
ImageMagick 5.3.3, 5.3.8, 5.4.3, 5.4.4 .5, 5.4.7, 5.4.8 .2-1.1.0, 5.4.8, 5.5.3.2-1.2.0, 5.5.4, 5.5.6.0-20030409, 5.5.6, 5.5.7, 6.0, 6.0.1-6.0.8, 6.1-6.1.8, 6.2 .0.7, 6.2.0.4, 6.2 | Multiple vulnerabilities have been reported when allocating heap-based memory and the chunk size is derived from them image height, width, and plane values due to insufficient sanity checks, which could let a remote malicious user cause a Denial of Service or potentially execute arbitrary code. No workaround or patch available at time of publishing. Currently, we are not aware of any exploits for these vulnerabilities. | ImageMagick Multiple Image Handling Heap-Based Vulnerabilities | Low/ High (High if arbitrary code can be executed) | Security Focus, 13100, April 11, 2005 |
KDE 2.0, beta, 2.0.1, 2.1-2.1.2, 2.2-2.2.2, 3.0-3.0.5, 3.1-3.1.5, 3.2-3.2.3, 3.3-3.3.2, 3.4; Novell Linux Desktop 9; SuSE E. Linux 9.1, x86_64, 9.2, x86_64, 9.3, Linux Enterprise Server 9 | A buffer overflow vulnerability has been reported in the 'kimgio' image library due to insufficient validation of PCX image data, which could let a remote malicious user cause a Denial of Service or possibly execute arbitrary code.
Patches available at: http://bugs.kde.org/attachment.cgi SuSE: Denial of Service Proofs of Concept exploits have been published. | KDE 'kimgio' image library Remote Buffer Overflow | Low/ High (High if arbitrary code can be executed) | SUSE Security Announcement, SUSE-SA:2005:022, April 11, 2005 |
Linux kernel 2.4 .0-test1-test12, 2.4-2.4.29, 2.6, 2.6-test1-test11, 2.6.1-2.6.11 | Multiple vulnerabilities have been reported in the ISO9660 handling routines, which could let a malicious user execute arbitrary code. Fedora: Ubuntu: Fedora: Currently we are not aware of any exploits for these vulnerabilities. | High | Security Focus, Fedora Security Ubuntu Security Notice, USN-103-1, April 1, 2005 Fedora Update Notification | |
MySQL AB MySQL 3.20 .x, 3.20.32 a, 3.21.x, 3.22 .x, 3.22.26-3.22.30, 3.22.32, 3.23 .x, 3.23.2-3.23.5, 3.23.8-3.23.10, 3.23.22-3.23.34, 3.23.36-3.23.54, 3.23.56, 3.23.58, 3.23.59, 4.0.0-4.0.15, 4.0.18, 4.0.20; | A vulnerability exists in the 'GRANT' command due to a failure to ensure sufficient privileges, which could let a malicious user obtain unauthorized access. Upgrades available at: OpenPKG: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2004-611.html"> SuSE: Trustix:
href="ftp://ftp.trustix.org/pub/trustix/updates/"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg/m"> Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/"> TurboLinux: FedoraLegacy: Ubuntu: There is no exploit code required. | Medium | Trustix Secure Linux Security Advisory, TSLSA-2004-0054, October 15, 2004 Fedora Update Notification, Turbolinux Security Announcement, February 17, 2005 Fedora Legacy Update Advisory, FLSA:2129, March 24, 2005 Ubuntu Security Notice, USN-109-1 April 06, 2005 | |
GNOME GdkPixbuf 0.22 | A remote Denial of Service vulnerability has been reported due to a double free error in the BMP loader. Fedora: RedHat: http://rhn.redhat.com/ Ubuntu: SGI: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Currently we are not aware of any exploits for this vulnerability. | GDK-Pixbuf BMP Image Processing Double Free Remote Denial of Service | Low | Fedora Update Notifications, RedHat Security Advisories, Ubuntu Security Notice, USN-108-1 April 05, 2005 SGI Security Advisory, 20050401-01-U, April 6, 2005 Mandrakelinux Security Update Advisory, MDKSA-2005:068 & 069, April 8, 2005 |
Linux kernel 2.4-2.4.29, 2.6 .10, 2.6-2.6.11 | A vulnerability has been reported in the 'bluez_sock_create()' function when a negative integer value is submitted, which could let a malicious user execute arbitrary code with root privileges. Patches available at: Fedora: SUSE: Trustix: Fedora: A Proof of Concept exploit script has been published. | High | Security Tracker SUSE Security Announcement, SUSE-SA:2005 Trustix Secure Fedora Update Notification | |
Linux kernel 2.5.0-2.5.69, 2.6-2.6.11 | A Denial of Service vulnerability has been reported in 'kernel/futex.c.' Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel Futex Denial of Service | Low | Security Tracker Ubuntu Security Notice, USN-110-1 April 11, 2005 |
Linux kernel 2.6 .10, | A Denial of Service vulnerability has been reported in the Netfilter code due to a memory leak. Ubuntu: SuSE:
href=" ftp://ftp.suse.com/pub/suse/"> Fedora: Conectiva: Fedora: Currently we are not aware of any exploits for this vulnerability. | Low | Ubuntu Security SUSE Security Announcement, Fedora Security Conectiva Linux Security Announcement, Fedora Update Notification | |
Linux kernel 2.6 .10, 2.6-2.6.11 | Multiple vulnerabilities exist: a vulnerability exists in the 'radeon' driver due to a race condition, which could let a malicious user obtain elevated privileges; a buffer overflow vulnerability exists in the 'i2c-viapro' driver, which could let a malicious user execute arbitrary code; a buffer overflow vulnerability exists in the 'locks_read_proc()' function, which could let a malicious user execute arbitrary code; a vulnerability exists in 'drivers/char/n_tty.c' due to a signedness error, which could let a malicious user obtain sensitive information; and potential errors exist in the 'atm_get_addr()' function and the 'reiserfs_copy_from_user_to_file_region()' function. Patches available at: SuSE:
href="ftp://ftp.suse.com/pub/suse/"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> Ubuntu: SUSE: Fedora: ALTLinux: Fedora: Exploit scripts have been published. | Linux Kernel
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0529">CAN-2005-0529 | Medium/ High (High if arbitrary code can be executed) | Secunia Advisory, SA14270, February 15, 2005 Conectiva Linux Security Announcement, CLA-2005:930, March 7, 2005 Ubuntu Security Notice, USN-95-1 March 15, 2005 SUSE Security Announcement, SUSE-SA:2005:018, March 24, 2005 Fedora Security Update Notification, ALTLinux Security Advisory, March 29, 2005 Fedora Update Notification
|
Linux Kernel 2.6.10, 2.6 -test1-test11, 2.6-2.6.11 | A Denial of Service vulnerability has been reported in the 'load_elf_library' function. Patches available at: Fedora: Trustix: Fedora: Currently we are not aware of any exploits for this vulnerability. | Low | Fedora Security Trustix Secure Fedora Update Notification | |
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6 -test1-test11, 2.6, 2.6.1 rc1&rc2, 2.6.1-2.6.8 | A remote Denial of Service vulnerability has been reported in the Point-to-Point Protocol (PPP) Driver. Ubuntu: Trustix:
href="http://http.trustix.org/pub/trustix/updates"> SUSE: Fedora: ALTLinux: Fedora: Currently we are not aware of any exploits for this vulnerability. | Low | Ubuntu Security Notice, USN-95-1 March 15, 2005 Trustix Secure Linux Security Advisory, TSL-2005-0009, March 21, 2005 SUSE Security Announcement, SUSE-SA:2005:018, March 24, 2005 Fedora Security Update Notification, ALTLinux Security Advisory, March 29, 2005 Fedora Update Notification
| |
Linux kernel 2.6.10, 2.6 -test9-CVS, 2.6-test1- -test11, 2.6, 2.6.1-2.6.11 ; RedHat Desktop 4.0, Enterprise Linux WS 4, ES 4, AS 4 | Multiple vulnerabilities exist: a vulnerability exists in the 'shmctl' function, which could let a malicious user obtain sensitive information; a Denial of Service vulnerability exists in 'nls_ascii.c' due to the use of incorrect table sizes; a race condition vulnerability exists in the 'setsid()' function; and a vulnerability exists in the OUTS instruction on the AMD64 and Intel EM64T architecture, which could let a malicious user obtain elevated privileges. RedHat:
href="https://rhn.redhat.com/errata/RHSA-2005-092.html"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/1"> SUSE: Fedora: Conectiva: Fedora: Currently we are not aware of any exploits for these vulnerabilities. | Linux Kernel
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0177">
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0176">CAN-2005-0176 | Low/ Medium (Low if a DoS) | Ubuntu Security RedHat Security Advisory, SUSE Security Announcement, Fedora Security Conectiva Linux Security Announcement, Fedora Update Notification |
Linux kernel 2.6.10, 2.6, -test1-test 11, 2.6.1- 2.6.11; | A vulnerability has been reported in the EXT2 filesystem handling code, which could let malicious user obtain sensitive information. Patches available at: Fedora: Trustix: Fedora: Currently we are not aware of any exploits for this vulnerability. | Medium | Security Focus, Trustix Secure Fedora Update Notification
| |
Linux kernel 2.6.8 rc1-rc3, 2.6.8, 2.6.11 -rc2-rc4, 2.6.11
| A Denial of Service vulnerability has been reported due to an error in the AIO (Asynchronous I/O) support in the "is_hugepage_only_range()" function. No workaround or patch available at time of publishing. An exploit script has been published. | Linux Kernel Asynchronous Input/Output Local Denial of Service | Low | Secunia Advisory, SA14718, April 4, 2005 |
Linux kernel 2.6-2.6.11 | A vulnerability has been reported in 'SYS_EPoll_Wait' due to a failure to properly handle user-supplied size values, which could let a malicious user obtain elevated privileges. Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/"> Fedora: An exploit script has been published. | Medium | Security Focus, 12763, March 8, 2005 Ubuntu Security Notice, USN-95-1 March 15, 2005 Security Focus, 12763, March 22, 2005 Fedora Security Update Notification, Fedora Update Notification | |
Linux kernel 2.6-2.6.11 | A vulnerability has been reported in the '/sys' file system due to a mismanagement of integer signedness, which could let a malicious user cause a Denial of Service and potentially execute arbitrary code.
SuSE: Ubuntu: Currently we are not aware of any exploits for this vulnerability. | Linux Kernel SYSFS_Write_File Local Integer Overflow | Low/ High (High if arbitrary code can be executed) | Security Focus, 13091, April 11, 2005 |
RedHat Fedora Core3, Core2; | A remote Denial of Service vulnerability has been reported when an unspecified Jabber file transfer request is handled.
Upgrade available at: Fedora: Gentoo: There is no exploit code required. | Low | Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200504-05, April 06, 2005 | |
RedHat Fedora Core3, Core2; | Two vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported due to a buffer overflow in the 'gaim_markup_strip_html()' function; and a vulnerability has been reported in the IRC protocol plug-in due to insufficient sanitization of the 'irc_msg' data, which could let a remote malicious user execute arbitrary code. Update available at: Fedora: Ubuntu: Gentoo: Currently we are not aware of any exploits for these vulnerabilities. | Gaim 'Gaim_Markup_ | Low/ High (High if arbitrary code can be executed) | Fedora Update Notifications, Ubuntu Security Gentoo Linux Security Advisory, GLSA 200504-05, April 06, 2005 |
X.org X11R6 6.7.0, 6.8, 6.8.1; | An integer overflow vulnerability exists in 'scan.c' due to insufficient sanity checks on on the 'bitmap_unit' value, which could let a remote malicious user execute arbitrary code. Patch available at:
link="#999999"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-08.xml"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/l/lesstif1-1/"> Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200503-15.xml"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/x/xfree86/"> ALTLinux: Fedora: RedHat: SGI: RedHat: Currently we are not aware of any exploits for this vulnerability. | High | Security Focus, Gentoo Linux Ubuntu Security Gentoo Linux Ubuntu Security ALTLinux Security Advisory, March 29, 2005 Fedora Update Notifications, RedHat Security Advisory, SGI Security Advisory, 20050401-01-U, April 6, 2005 RedHat Security Advisory, RHSA-2005:044-15, April 6, 2005 | |
Vixie Cron 4.1 | A vulnerability has been reported due to insecure creation of temporary files when crontab is executed with the '-e' option, which could let a malicious user obtain sensitive information.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Vixie Cron Crontab Information Disclosure | Medium | Security Focus, 13024, April 6, 2005 |
Pavuk 0.9pl28i, 0.928r2, 0.928r1, 0.9pl30b, 0.9 pl28, 0.9.31 | Multiple unspecified security vulnerabilities have been reported which may result in boundary condition errors. The impact was not specified.
Upgrades available at: Currently we are not aware of any exploits for this vulnerability. | Pavuk Multiple Unspecified Security Vulnerabilities | Not Specified | Secunia Advisory, SA14571, April 5, 2005 |
PHP Group pp 4.3.7 and prior | Updates to fix multiple vulnerabilities with php4 which could allow remote code execution. Debian: Slackware:
href="http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.406480"> Fedora: TurboLinux:
href="ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/"> Apple: Debian: Slackware: An exploit script has been published. | High | Secunia, SA12113 and SA12116, July 21, 2004 Debian, Slackware, and Fedora Security Advisories Turbolinux Security Advisory TLSA-2004-23, September 15, 2004 PacketStorm, December 11, 2004 Apple Security Update, APPLE-SA-2005-01-25, January 26, 2005 Debian Security Advisory DSA, 669-1, February 7, 2005 Slackware Security Advisory, SSA:2005-095-01, April 6, 2005 | |
phpMyAdmin 2.0-2.0.5, 2.1- 2.1.2, 2.2, pre 1&pre2, rc1-rc3, 2.2.2-2.2.6, 2.3.1, 2.3.2, 2.4.0, 2.5.0-2.5.2, 2.5.4-2.5.7, 2.6.0pl1-2.6.0pl3, 2.6.1, pl1&pl3, 2.6.1 -rc1 | A Cross-Site Scripting vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'convcharset' parameter, which could let a remote malicious user execute arbitrary HTML and script code. Upgrades available at: Gentoo: There is no exploit code required; however, a Proof of Concept exploit has been published. | phpMyAdmin 'convcharset' Cross-Site Scripting | High | phpMyAdmin Gentoo Linux Security Advisory, GLSA 200504-08, April 11, 2005 |
snapshot utility 1.0.10, 1.1-1.1.6, 1.2 | A vulnerability has been reported in the 'copy_symlink()' function due to improper modification of ownership settings of symbolic link files, which could let a malicious user obtain elevated privileges.
Upgrades available at: There is no exploit code required. | RSnapshot File Privilege Elevation | Medium | Security Tracker Alert, 1013674, April 11, 2005 |
Open Server 5.0.6, 5.0.7 | Several buffer overflow vulnerabilities have been reported in the 'auditsh,' 'atcronsh,' and 'termsh' programs when handling the 'HOME' variable, which could let a malicious user execute arbitrary code.
Upgrades available at: Currently we are not aware of any exploits for these vulnerabilities. | SCO OpenServer Auditsh HOME Environment Variable Buffer Overflow | High | SCO Security Advisory, SCOSA-2005.15, April 7, 2005 |
IRIX 6.5.22 m | Two vulnerabilities have been reported in 'gr_osview' which could let a malicious user cause a Denial of Service, obtain sensitive information, or modify system/user information. Patches available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | SGI IRIX GR_OSView Vulnerabilities | Low/ Medium (Medium if sensitive information can be obtained or system/user information modified) | SGI Security Advisory, 20050402-01-P, April 7, 2005 |
Linux 1.0, 2.0, 3.0, 4.0, 4.2, 4.3, 4.4, 4.4.1, 5.0-5.3, 6.0-6.4, 7.0, sparc, ppc, i386, alpha, 7.1, x86, sparc, ppc, alpha, 7.2, i386, 7.3, sparc, ppc, i386, 8.0, i386, 8.1, 8.2, 9.0 x86_64 | A symbolic link vulnerability has been reported in Texex, which could let a malicious user obtain sensitive information.
Upgrades available at: There is no exploit code required. | SUSE Tetex tmp File Existence Disclosure | Medium | SUSE Security Summary Report, SUSE-SR:2005:010, April 8, 2005 |
Novell Linux Desktop 9.0 | A vulnerability has been reported in Netapplet due to insufficient input validation of user-supplied input to network scripts, which could let a malicious user obtain root privileges. Updates available at: Currently we are not aware of any exploits for this vulnerability. | SUSE Netapplet Root Privileges | High | SUSE Security Summary Report, SUSE-SR:2005:010, April 8, 2005 |
Pine 4.0.2, 4.0.4, 4.2 x, 4.10, 4.20, 4.21, 4.30, 4.33, 4.44, 4.50, 4.52, 4.53, 4.56, 4.58, 4.62 | A vulnerability has been reported in 'rpdump' due to a race condition, which could let a malicious user potentially replace a file with a hardlink to a target file
No workaround or patch available at time of publishing. There is no exploit code required. | Pine RPDump Local File Corruption | Medium | Security Focus, 13093, April 11, 2005 |
id=other name=other>Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
Access_user Class 1.6 | A vulnerability has been reported because the application retains 'new' as a valid password, which could let a remote malicious user obtain unauthorized access.
Upgrade available at: There is no exploit code required. | Access_User Class | Medium | Secunia Advisory, |
aeDating 3.2 | Multiple vulnerabilities have been reported: a vulnerability has been reported in 'index.php' due to insufficient verification of input passed to the 'skin' parameter, which could let a malicious user include arbitrary files; a vulnerability has been reported in 'sdating.php' due to insufficient sanitization of input passed to the 'event' parameter, which could let a malicious user inject arbitrary SQL code; and a Cross-Site Scripting vulnerability has been reported in the control panel due to insufficient sanitization of certain input, which could let a malicious user execute arbitrary HTML and script code.
No workaround or patch available at time of publishing. There is no exploit code required. | AEwebworks | High | Secunia Advisory, SA14913, April 12, 2005 |
Axel 1.0 a | A buffer overflow vulnerability has been reported when handling HTTP redirection, which could let a remote malicious user execute arbitrary code. Upgrade available at: Currently we are not aware of any exploits for this vulnerability. | Axel HTTP Redirection Buffer Overflow | High | Secunia Advisory, SA14831, April 7, 2005 |
AzDGDatingPlatinum 1.1 .0 | Multiple vulnerabilities have been reported: SQL injection vulnerabilities have been reported which could let a remote malicious user inject arbitrary SQL code; and Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code.
No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | Azerbaijan Development Group AzDGDating | High | Security Focus, 13082, April 9, 2005 |
brooky.com
CubeCart 2.0.0-2.0.6 | Vulnerabilities have been reported in the 'index.php,' 'tellafriend.php,' 'view_cart.php,' and 'view_product.php' scripts due to insufficient sanitization of user-supplied input, which could let a remote malicious user inject arbitrary SQL code.
No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | CubeCart
| High | Security Focus, 13050, April 6, 2005 |
CubeCart 2.x | A vulnerability has been reported in 'index.php' due to insufficient verification of the 'language' parameter, which could let a remote malicious user obtain sensitive information.
Update available at: Proofs of Concept exploits have been published. | CubeCart | Medium | Security Tracker Alert, 1013660, April 7, 2005 |
IOS 12.x, R12.x | Two vulnerabilities have been reported; a vulnerability has been reported due to an error when processing IKE (Internet Key Exchange) XAUTH messages, which could let a remote malicious user obtain unauthorized access; and a vulnerability has been reported when handling ISAKMP profile attributes, which could let a remote malicious user obtain unauthorized access. Patches available at: Currently we are not aware of any exploits for these vulnerabilities. | Cisco IOS XAUTH Authentication Bypass | Medium | Cisco Security Advisory, cisco-sa-20050406, April 6, 2005 |
IOS 12.x, R12.x | Two vulnerabilities have been reported: a Denial of Service vulnerability has been reported when the device is configured to employ SSHv2 for remote management and Terminal Access Controller Access Control System Authentication (TACACS+); and a Denial of Service vulnerability has been reported due to a memory leak when authenticating SSH users against a TACACS+ server.
Upgrades available at: There is no exploit code required. | Cisco IOS Secure Shell Server | Low | Cisco Security Advisory, 64439, April 6, 2005 |
BrightStor ARCServe Backup for Windows 9.0.1, 11.0, 11.1, 11.1 (All), (Client) 11.1, (Eng-All) 9.01, (Eng-Cli) 9.01, (NoEng-All) 9.01, (NoEng-Cli) 9.01, 64 bit 9.0.1, 64 bit 11.0, 64 bit 11.1, BrightStor Enterprise Backup 10.0, 10.5, BrightStor Enterprise Backup for Windows 64 bit 10.5 | A buffer overflow vulnerability has been reported in the 'option' field due to a boundary error when receiving certain agent requests, which could let a remote malicious user cause a Denial of Service or execute arbitrary code. Updates available at: Currently we are not aware of any exploits for this vulnerability. | Computer | Low/ High (High if arbitrary code can be executed) | iDEFENSE Security Advisory, April 11, 2005 |
DLMan Pro 0.9.8 | A vulnerability has been reported in the DLMan Pro mod for phpBB due to insufficient sanitization of user-supplied input before used in an SQL query, which could let a remote malicious user execute arbitrary SQL code.
Upgrade available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | DLMan Pro Module | High | Security Focus, 13028, April 7, 2005 |
sCssBoard 1.0, 1.1, 1.11 | Several vulnerabilities have been reported: a vulnerability has been reported because input passed to '[url]' tags may contain JavaScript links, which could let a remote malicious user inject arbitrary script code; and an unspecified error has been reported in the 'profile' page.
Upgrades available at: There is no exploit code required. | SCSSBoard | High | Secunia Advisory, SA14694, April 7, 2005 |
PHP-Nuke 6.0, 6.5, RC1-RC3, 6.5 FINAL, BETA 1, 6.6, 6.7, 6.9, 7.0 FINAL, 7.0-7.3, 7.6 | Cross-Site Scripting vulnerabilities has been reported in the 'Your_Account' module due to insufficient sanitization of the 'username' and 'Avatarcategory' parameters, in the 'Downloads' module, and in 'Banners.PHP,' which could let a remote malicious user execute arbitrary HTML and script code; and an SQL injection vulnerability has been reported in the 'Top' module due to insufficient sanitization of user-supplied input, which could let a remote malicious user inject arbitrary SQL code. No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | PHP-Nuke | High | SecurityReason Advisory, April 5, 2005 |
PHP-Nuke 7.6 | A vulnerability has been reported in the 'Web_Links' and 'Downloads' modules due to insufficient sanitization of user-supplied input, which could let a remote malicious ser inject arbitrary SQL code.
No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | PHP-Nuke | High | SECURITY REASON.COM Advisory, April 3, 2005 |
OpenView Network Node Manager 6.2, Solaris, NT 4.X/Windows 2000, HP-UX 11.X, 6., Solaris, NT 4.X/Windows 2000, HP-UX 11.X, 6.31, Solaris, NT 4.X/Windows 2000, HP-UX 11.X, 7.0 1, Windows 2000/XP, Solaris, HP-UX 11.X, 7.50, Windows 2000/XP, Solaris, Linux, 7.50 HP-UX 11.X | An unspecified remote Denial of Service vulnerability has been reported. Upgrades available at: Currently we are not aware of any exploits for this vulnerability.
| HP OpenView | Low | HP Security Advisory, HPSBMA01125, April 6, 2005 |
Invision Board 1.0, 1.0.1, 1.1.1, 1.1.2, 1.2, 1.3, Final, 1.3.1 Final | A vulnerability has been reported in the 'st' parameter due to insufficient filter of user-supplied data, which could let a malicious user inject arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Invision Power | High | Security Focus, 13097, April 11, 2005 |
Web Portal 2.3.1 | A vulnerability has been reported in the 'haslo' variable due to insufficient sanitization of user-supplied input passed to the 'module/banner.inc.php' module, which could let a remote malicious user inject arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | JPortal | High | Secunia Advisory, SA14919, April 12, 2005 |
Squirrelcart | A vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'crn' and 'rn' parameters, which could let a remote malicious user execute arbitrary SQL code. Please contact the vendor to obtain a patch or upgrade. There is no exploit code required; however, a Proof of Concept exploit script has been published. | Lighthouse Development Squirrelcart SQL Injection | High | Dcrab 's Security Advisory, Security Focus, 12944, April 6, 2005 |
WET11 Wireless Ethernet Bridge, 1.4.3, 1.5.4 | A vulnerability has been reported when processing password change requests due to insufficient validation of authentication credentials, which could let a remote malicious user bypass certain security restrictions. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Linksys WET11 Password Update Remote Authentication Bypass | Medium | Secunia Advisory, SA14871, April 7, 2005 |
Linkz Pro 1.0.3 beta2 | A vulnerability has been reported in the Linkz Pro mod for phpBB due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary SQL code.
Patch available at: | There is no exploit code required; however, a Proof of Concept exploit has been published. | Linkz Pro Module SQL Injection | High | Security Focus, 13030, April 7, 2005 |
ColdFusion Server MX 6.1 | A vulnerability has been reported due to an error in the MX 6.1 updater, which could let a malicious user obtain sensitive information.
Workaround available at: There is no exploit code required. | Macromedia ColdFusion MX Updater Remote Information Disclosure | Medium | Macromedia Security Bulletin, MPSB05-02, April 7, 2005 |
File Upload Script 1.1 | A vulnerability has been reported in the 'up.php' script due to insufficient restriction of file contents and filename extensions, which could let a remote malicious user execute arbitrary script code.
No workaround or patch available at time of publishing. There is no exploit code required | Meilad File Upload Script PHPBB Module Arbitrary Code Execution | High | Security Tracker Alert, 1013671, April 9, 2005 |
ModernBill 4.3 | Several vulnerabilities have been reported: a Cross-Site Scripting vulnerability has been reported in 'orderwiz.php' due to insufficient sanitization of the 'c_code' and 'aid' parameters, which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability has been reported in 'news.php' due to insufficient verification of the 'DIR' parameter, which could let a remote malicious user include arbitrary files.
Update available at: There is no exploit code required; however, Proofs of Concept exploits have been published. | ModernGigabyte ModernBill Cross-Site Scripting & File Include | High | GulfTech Security Research Advisory, April 10th, 2005 |
E-Xoops 1.0 5r3; RunCMS 1.1 A, 1.1 | A vulnerability has been reported in the file upload function if the 'Allow custom avatar upload' is enabled due to an input validation error, which could let a malicious user upload arbitrary files. RunCMS: There is no exploit code required. | RunCMS | High | Secunia Advisory, SA14869, April 7, 2005 |
ALT Linux Compact 2.3, Junior 2.3; Apple Mac OS X 10.0-10.0.4, 10.1-10.1.5, 10.2-10.2.8, 10.3-10.3.8, Mac OS X Server 10.0, 10.1-10.1.5, 10.2-10.2.8, 10.3-10.3.8; MIT Kerberos 5 1.0, 5 1.0.6, 5 1.0.8, 51.1-5 1.4; Netkit Linux Netkit 0.9-0.12, 0.14-0.17, 0.17.17; Openwall GNU/*/Linux (Owl)-current, 1.0, 1.1; FreeBSD 4.10-PRERELEASE, 2.0, 4.0 .x, -RELENG, alpha, 4.0, 4.1, 4.1.1 -STABLE, -RELEASE, 4.1.1, 4.2, -STABLEpre122300, -STABLEpre050201, 4.2 -STABLE, -RELEASE, | Two buffer overflow vulnerabilities have been reported in Telnet: a buffer overflow vulnerability has been reported in the 'slc_add_reply()' function when a large number of specially crafted LINEMODE Set Local Character (SLC) commands is submitted, which could let a remote malicious user execute arbitrary code; and a buffer overflow vulnerability has been reported in the 'env_opt_add()' function, which could let a remote malicious user execute arbitrary code. ALTLinux:
href="http://lists.altlinux.ru/pipermail/security-announce/2005-March/000287.html"> Apple: Debian:
href="http://security.debian.org/pool/updates/main/n/netkit-telnet/"> Fedora: FreeBSD: MIT Kerberos:
href="http://web.mit.edu/kerberos/advisories/2005-001-patch_1.4.txt"> Netkit:
href="ftp://ftp.uk.linux.org/pub/linux/Networking/netkit/"> Openwall:
href="http://www.openwall.com/Owl/CHANGES-current.shtml"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-327.html"> Sun:
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1"> SUSE: Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/n/netkit-telnet/"> OpenBSD: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> Gentoo: http://security.gentoo.org/ Debian: Gentoo: SGI: SCO: Sun: Openwall: Currently we are not aware of any exploits for these vulnerabilities. | High | iDEFENSE Security Advisory, Mandrakelinux Security Update Advisory, MDKSA-2005:061, Gentoo Linux Security Advisories, GLSA 200503-36 & GLSA 200504-01, March 31 & Debian Security Advisory, DSA 703-1, April 1, 2005 Gentoo Linux Security Advisory, GLSA 200504-04, SGI Security Advisory, 20050401-01-U, April 6, 2005 Sun(sm) Alert Notification, 57761, SCO Security Advisory, SCOSA-2005.21, | |
SurgeFTP 2.2 m1, 2.2 k3 | A remote Denial of Service vulnerability has been reported when the LEAK command is issued to the FTP server.
Updates available at: There is no exploit code required. | SurgeFTP LEAK Command Remote Denial of Service | Low | SIG^2 Vulnerability Research Advisory, April 7, 2005 |
Netware 6.0, SP1-SP3, 6.5, SP1.1(b), SP1.1(a), SP1-SP3 | A remote Denial of Service vulnerability has been reported due to a failure to handle exceptional network traffic in the TCP stack. Patches available at: Currently we are not aware of any exploits for this vulnerability. | Novell NetWare | Low | Novell Technical Information Documents, TID2970467, April 8, 2005 |
PHP prior to 5.0.4 | Multiple Denial of Service vulnerabilities have been reported in 'getimagesize().' Upgrade available at: Ubuntu: Slackware: Currently we are not aware of any exploits for these vulnerabilities. | PHP | Low | iDEFENSE Security Advisory, Ubuntu Security Notice, USN-105-1 Slackware Security Advisory, SSA:2005- |
PostNuke Phoenix 0.760 RC3 | Multiple vulnerabilities have been reported: Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of the 'module' parameter in 'admin.php' and the 'op' parameter in 'user.php,' which could let a remote malicious user execute arbitrary HTML and script code; and a vulnerability has been reported due to insufficient sanitization of the 'sid' parameter before used in a SQL query, which could let a remote malicious user inject arbitrary SQL code. No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | PostNuke Phoenix Remote Cross-Site Scripting & SQL Injection | High | Dcrab 's Security Advisory, April 8, 2005 |
PunBB 1.0, RC1&RC2, beta1-beta3, alpha, 1.0.1, 1.1-1.1.5, 1.2.1-1.2.4 | Two vulnerabilities have been reported: a vulnerability was reported in the 'profile.php' script due to insufficient sanitization, which could let a remote malicious user obtain administrative access; and a Cross-Site Scripting vulnerability has been reported due to insufficient sanitization os user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit script has been published. | PunBB | High | Secunia Advisory, SA14882, April 8, 2005 |
LiteCommerce | Multiple SQL injection vulnerabilities have been reported: an input validation vulnerability has been reported in 'cart.php' due to insufficient validation of the 'category_id' and 'product_id' parameters, which could let a remote malicious user inject arbitrary SQL commands; and a vulnerability has been reported when a remote malicious user submits a specially crafted 'target' parameter value, which could lead to the disclosure of sensitive information. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | LiteCommerce Multiple SQL | Medium/ High (High if arbitrary code can be executed) | Security Tracker Alert, 1013658, April 6, 2005 |
RadBids Gold v2 | Multiple vulnerabilities have been reported: Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of some user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code; a vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'mode' parameter, which could let a remote malicious user inject arbitrary SQL code; and a Directory Traversal vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'read' parameter before used to read files, which could let a remote malicious user obtain sensitive information.
No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | RadScripts | Medium/ High (High if arbitrary code can be executed) | Secunia Advisory, SA14906, April 11, 2005 |
prior to 2.6.8 | A vulnerability has been reported in 'libs/plugins/modifier.regex_replace.php' due to insufficient validation of the 'search' parameter, which could let a malicious user execute PHP code. Update available at:
href=" http://smarty.php.net/download.php"> Gentoo: Currently we are not aware of any exploits for this vulnerability. | High | Security Tracker Alert, 1013556, March 24, 2005 Gentoo Linux Security Advisory [UPDATE], GLSA 200503-35:02, | |
Java 2 Standard Edition SDK 1.4.2, 1.5 | A Directory Traversal vulnerability has been reported in the Java Archive Tool, which could let a remote malicious user obtain sensitive information.
No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Sun J2SE Software Development Kit | Medium | Securiteam, April 11, 2005 |
OpenOffice 1.1.4, 2.0 Beta | A vulnerability has been reported due to a heap overflow when a specially crafted malformed '.doc' file is opened, which could lead to a Denial of Service or execution of arbitrary code.
No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | OpenOffice Malformed | Low/ High (High if arbitrary code can be executed) | Security Focus, 13092, April 11, 2005 |
Adaptive Server Enterprise 11.0.3.3Linux, 11.5 Win, Sun, HP, 11.5.1 Win, Sun, HP, Digital UNIX, 11.9.2 Sun, HP, Digital UNIX, 12.0 Win, Sun, HP, 12.0 .0.8 EDS#3, 12.0.1 Win, Sun, HP, Digital UNIX, 12.5 Win, Sun, SGI, HP, Digital UNIX, 12.5.2, 12.5.3 | Buffer overflow vulnerabilities have been reported in 'attrib_valid,' ''convert,' 'declare data type,' 'abstract plan' syntax, and the 'install java, which could let a remote malicious user execute arbitrary code; and a Denial of Service vulnerability exists in 'XP_SERVER' due to a failure to properly handle malformed network data.
Upgrades available at: http://downloads.sybase.com/ Currently we are not aware of any exploits for these vulnerabilities. | Sybase Adaptive Server Enterprise Multiple Vulnerabilities | High | NGSSoftware Insight Security Research Advisory, April 5, 2005 |
TowerBlog 0.2, 0.4 -r1, 0.6 -r1, 0.6 | A vulnerability has been reported in '_dat/login' because user credentials are stored inside the web root, which could let a remote malicious user obtain sensitive information.
No workaround or patch available at time of publishing. There is no exploit code required. | TowerBlog Information | Medium | Securiteam, April 11, 2005 |
WebCT Campus Edition 4.1 | A vulnerability has been reported due to insufficient sanitization of user-supplied input before used in dynamically generated content, which could let a remote malicious user execute arbitrary HTML and script code.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | WebCT | High | Security Focus, 13101, April 11, 2005 |
Apache Distribution 1.4.1-1.4.13, Apache Distribution for Solaris 0.1-0.3 | Vulnerabilities has been reported in 'cds.php, 'Guestbook-EN.PL,' 'Phonebook.PHP' due to insufficient sanitization of user-supplied input before included in dynamically generated Web content, which could let a remote malicious user execute arbitrary script code; and a vulnerability has been reported due to a failure to properly secure password access, which could let a remote malicious user obtain administrative access.
No workaround or patch available at time of publishing. There is no exploit code required. | XAMPP Remote HTML Injection & Password | High | Security Focus, 13126, 13127, 13128, 13131, April 12, 2005 |
zOOm Media Gallery 2.1.2 | A vulnerability has been reported in 'index.php' due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary code.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | zOOm | High | Securiteam, April 11, 2005 |
[back to top] Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
Date of Script | Script name | Workaround or Patch Available | Script Description |
April 11, 2005 | kMailEmailSpoofingPoC.pl | No | Proof of Concept exploit for the KDE KMail HTML EMail Remote Email Content Spoofing vulnerability. |
April 8, 2005 | punbb_sql.py | No | Exploit for the PunBB 'Profile.PHP' SQL Injection vulnerability. |
April 6, 2005 | aiodio_read.c | No | Exploit for the Linux Kernel Asynchronous Input/Output Local Denial of Service vulnerability. |
April 5, 2005 | mailenable_smtpd.pl | Yes | Perl script that exploits the MailEnable SMTP Malformed EHLO Request Denial of Service vulnerability. |
[back to
top]
name=trends>Trends
- Virginia lawmakers aim to hook cyberscammers: The Virginia General Assembly passed several new bills this year aimed at cracking down on computer and online crimes, including a statute that observers say is the nation's first law that criminalizes "phishing" schemes. Source: http://www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html.
- Authorities on trail of identity theft rings:
According to law enforcement officials recent investigations of online identity-theft rings show a disturbing pattern. Large groups of criminals are banding together to steal financial data from individuals, and then trade or sell that data on underground Internet sites. Source: http://www.capecodonline.com/cctimes/biz/authoritieson10.htm. - IM threats rising sharply, reports confirm: According to new research in a report issued by the IMlogic Threat Center, IM-borne security threats have increased dramatically in volume since the start of 2005.
The quantity of instant messaging threats increased 250 percent in the first quarter of 2005, compared with the same period last year. The research, which tracks viruses, worms, spam and phishing attacks sent over public IM networks, also contends that reported incidents of newly discovered IM threats have grown by 271 percent this year.Source: http://news.com.com/IM+threats+rise+sharply%2C+report+confirms/2100-7349_3-5655267.html. - Fighting back against phishing: Phishing exploits continue to increase at an alarming rate. In the past year, attacks have grown in volume and sophistication, but online merchants are on the offensive with consumer education and new authentication tools. Source: http://www.nwfusion.com/research/2005/041105phish.html?ts
- Security jargon confuses Internet users: The average home computer user is confused by technology jargon which is used to warn people about the most serious security threats online. Many are often left vulnerable because they have no idea what they are supposed to be protecting themselves against, a survey for AOL UK has found. For example, eighty-four percent did not know that phishing describes faked e-mail scams. Source: http://news.bbc.co.uk/1/hi/technology/4413155.stm
- Web postcards hide Trojan horse programs: SANS Institute's Internet Storm Center (ISC) is warning about e-mail messages that pose as Web postcards, then direct recipients to a Web site that installs a Trojan horse program. The new attacks use sophisticated social engineering techniques to trick users into installing Trojan remote access programs that can fool antivirus and firewall software by appearing to be authorized applications like Internet Relay Chat (IRC) software, the ISC said. Source:
http://www.computerworld.com/securitytopics/security/hacking/story/0,10801,100874,00.html - Antivirus firm warns of Microsoft security Trojan horse: A new campaign by malicious hackers uses a Web site designed to look like Microsoft's Windows update page to trick Internet users into infecting their computers with a Trojan horse remote-access program, according to antivirus experts at Sophos PLC. The scam uses e-mail messages that appear to come from Microsoft to get recipients to visit a Web page that uploads the malicious program. Source: http://www.computerworld.com/securitytopics/security/virus/story/0,10801,100954,00.html?from=story%5Frules
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trends |
face="Arial, Helvetica, sans-serif">Date |
1 | Netsky-P | Win32 Worm | Stable | March 2004 |
2 | Netsky-Q | Win32 Worm | Stable | March 2004 |
3 | Zafi-D | Win32 Worm | Stable | December 2004 |
4 | Mytob.C | Win32 Worm | New to Table | March 2005 |
5 | Bagle.BJ | Win32 Worm | Decrease | January 2005 |
6 | Netsky-D | Win32 Worm | Stable | March 2004 |
6 | Netsky-Z | Win32 Worm | Increase | April 2004 |
7 | Zafi-B | Win32 Worm | Decrease | June 2004 |
7 | Netsky-B | Win32 Worm | Stable | February 2004 |
8 | Bagle-AU | Win32 Worm | Increase | October 2004 |
8 | Sober-I | Win32 Worm | Increase | November 2004 |
face="Arial, Helvetica, sans-serif"> face="Arial, Helvetica, sans-serif"> face="Arial, Helvetica, sans-serif">Table Updated April 12, 2005
Viruses or Trojans Considered to be a High Level of Threat
- Crowt.D: A new variant of the Crowt worm blocks an infected user's browser from accessing certain antivirus vendors' Web sites. The virus is noteworthy because it has the potential to send a victim to a phishing Web site even when they have manually typed in a Web address, which is especially dangerous when using an online banking service. Source: http://www.zdnet.com.au/news/security/0,2000061744,39187608,00.htm
- Fontal.A: This Trojan, reported by F-Secure, affects Nokia Series 60 handsets running the Symbian operating system and can cause the phone to crash. Fontal.A tries to install a corrupted file, called "Kill Saddam By OID500.sis," into the infected device, causing it to fail at the next reboot. F-Secure did not say whether any infections had been reported. Source: http://news.com.com/Trojan+horse+takes+down+smart+phones/2100-7349_3-5657724.html?tag=nefd.top
The following table provides, in alphabetical order, a list of new viruses, variations of previously encountered viruses, and Trojans that have been discovered during the period covered by this bulletin. This information has been compiled from the following anti-virus vendors: Sophos, Trend Micro, Symantec, McAfee, Network Associates, Central Command, F-Secure, Kaspersky Labs, MessageLabs, Panda Software, Computer Associates, and The WildList Organization International. Users should keep anti-virus software up to date and should contact their anti-virus vendors to obtain specific information on the Trojans and Trojan variants that anti-virus software detects.
NOTE: At times, viruses and Trojans may contain names or content that may be considered offensive.
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.