ID

VAR-200106-0176


CVE

CVE-2001-0427


TITLE

Sun Solaris SNMP proxy agent /opt/SUNWssp/bin/snmpd contains buffer overflow

Trust: 0.8

sources: CERT/CC: VU#154976

DESCRIPTION

Cisco VPN 3000 series concentrators before 2.5.2(F) allow remote attackers to cause a denial of service via a flood of invalid login requests to (1) the SSL service, or (2) the telnet service, which do not properly disconnect the user after several failed login attempts. The SNMP proxy agent on certain large Solaris systems contains a buffer overflow. It may be possible, though it is unconfirmed, that an intruder could use this flaw to execute code with root privileges. Solaris is the Unix Operating System variant distributed and maintained by Sun Microsystems. Solaris is a freely available operating system designed to run on systems of varying size with maximum scalability. A problem with the SNMP Daemon included in the SUNWsspop package results in a buffer overflow, and potentially the execution of arbitrary code. Upon parsing the argv[0] variable from the command line, this information is stored in a static buffer. The static buffer is vulnerable to being overflowed at 700 bytes of data. This vulnerability is only present on systems acting as the System Service Processor for an E10000, or on any system with the SUNWsspop package installed. VPN 3060 Concentrator is prone to a denial-of-service vulnerability. Concentrators prior to Cisco VPN 3000 Series versions 2.5.2(F) have a vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Internet Security Systems Security Alert Summary April 5, 2001 Volume 6 Number 5 X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php This summary can be found at http://xforce.iss.net/alerts/vol-6_num-5.php _____ Contents: * 80 Reported Vulnerabilities * Risk Factor Key _____ Date Reported: 03/01/2001 Brief Description: Palm OS Debug Mode allows attacker to bypass password Risk Factor: Low Attack Type: Host Based Platforms Affected: Palm OS 3.5.2, Palm OS 3.3 Vulnerability: palm-debug-bypass-password X-Force URL: http://xforce.iss.net/static/6196.php Date Reported: 03/01/2001 Brief Description: Microsoft Exchange malformed URL request could cause a denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Microsoft Exchange 2000 Vulnerability: exchange-malformed-url-dos X-Force URL: http://xforce.iss.net/static/6172.php Date Reported: 03/02/2001 Brief Description: Mailx buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: OpenLinux 2.4, OpenLinux 2.3, Linux Debian 2.2 Vulnerability: mailx-bo X-Force URL: http://xforce.iss.net/static/6181.php Date Reported: 03/02/2001 Brief Description: SunFTP allows attackers to gain unauthorized file access Risk Factor: Low Attack Type: Host Based Platforms Affected: SunFTP 1.0 Build 9 Vulnerability: sunftp-gain-access X-Force URL: http://xforce.iss.net/static/6195.php Date Reported: 03/02/2001 Brief Description: WinZip /zipandemail option buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows 2000 All versions, Winzip 8.0, Windows NT All versions Vulnerability: winzip-zipandemail-bo X-Force URL: http://xforce.iss.net/static/6191.php Date Reported: 03/04/2001 Brief Description: Broker FTP Server allows remote attacker to delete files outside the FTP root Risk Factor: Medium Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-delete-files X-Force URL: http://xforce.iss.net/static/6190.php Date Reported: 03/04/2001 Brief Description: Broker FTP allows remote user to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: Broker FTP Server All versions Vulnerability: broker-ftp-list-directories X-Force URL: http://xforce.iss.net/static/6189.php Date Reported: 03/04/2001 Brief Description: INDEXU allows attackers to gain unauthorized system access Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: INDEXU 2.0beta and earlier Vulnerability: indexu-gain-access X-Force URL: http://xforce.iss.net/static/6202.php Date Reported: 03/04/2001 Brief Description: Fastream FTP++ Client allows user to download files outside of Web root directory Risk Factor: Medium Attack Type: Network Based Platforms Affected: Fastream FTP++ Server 2.0 Vulnerability: fastream-ftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6187.php Date Reported: 03/04/2001 Brief Description: SlimServe HTTPd directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: SlimServe HTTPd 1.1 and earlier Vulnerability: slimserve-httpd-directory-traversal X-Force URL: http://xforce.iss.net/static/6186.php Date Reported: 03/04/2001 Brief Description: WFTPD Pro buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: WFTPD Pro 3.00 Vulnerability: wftpd-pro-bo X-Force URL: http://xforce.iss.net/static/6184.php Date Reported: 03/05/2001 Brief Description: IRCd tkserv buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: IRCd All versions, tkserv 1.3.0 and earlier Vulnerability: irc-tkserv-bo X-Force URL: http://xforce.iss.net/static/6193.php Date Reported: 03/06/2001 Brief Description: War FTPD could allow attackers to list directories outside the FTP root Risk Factor: High Attack Type: Network Based Platforms Affected: WarFTPD 1.67b4 Vulnerability: warftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6197.php Date Reported: 03/06/2001 Brief Description: Internet Explorer could allow execution of commands when used with Telnet Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Internet Explorer 5.5, Services for Unix 2.0, Windows NT All versions, Windows 2000 All versions, Internet Explorer 5.01 Vulnerability: ie-telnet-execute-commands X-Force URL: http://xforce.iss.net/static/6230.php Date Reported: 03/07/2001 Brief Description: Cisco Aironet Web access allows remote attacker to view/modify configuration Risk Factor: Low Attack Type: Network Based Platforms Affected: Aironet 340 Series Wireless Bridge Firmware 8.07, Aironet 340 Series Wireless Bridge Firmware 8.24, Aironet 340 Series Wireless Bridge Firmware 7.x Vulnerability: cisco-aironet-web-access X-Force URL: http://xforce.iss.net/static/6200.php Date Reported: 03/07/2001 Brief Description: Netscape Directory Server buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Netscape Directory Server 4.1, Netscape Directory Server 4.12, Windows NT All versions Vulnerability: netscape-directory-server-bo X-Force URL: http://xforce.iss.net/static/6233.php Date Reported: 03/07/2001 Brief Description: Proftpd contains configuration error in postinst script when running as root Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-postinst-root X-Force URL: http://xforce.iss.net/static/6208.php Date Reported: 03/07/2001 Brief Description: proftpd /var symlink Risk Factor: Medium Attack Type: Host Based Platforms Affected: Linux Debian 2.2 Vulnerability: proftpd-var-symlink X-Force URL: http://xforce.iss.net/static/6209.php Date Reported: 03/07/2001 Brief Description: man2html remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: man2html prior to 1.5.23 Vulnerability: man2html-remote-dos X-Force URL: http://xforce.iss.net/static/6211.php Date Reported: 03/07/2001 Brief Description: Linux ePerl buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, ePerl prior to 2.2.14, Linux Debian 2.2, Linux Mandrake 7.1 Vulnerability: linux-eperl-bo X-Force URL: http://xforce.iss.net/static/6198.php Date Reported: 03/08/2001 Brief Description: Novell NetWare could allow attackers to gain unauthorized access Risk Factor: Medium Attack Type: Network Based Platforms Affected: Novell NetWare 4.01, Novell NetWare 5.1, Novell NetWare 3.1, Novell NetWare 4.11, Novell NetWare 5.0 Vulnerability: novell-netware-unauthorized-access X-Force URL: http://xforce.iss.net/static/6215.php Date Reported: 03/08/2001 Brief Description: Linux sgml-tools symlink attack Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, sgml-tools prior to 1.0.9-15, Linux Mandrake 7.2, Linux Immunix OS 6.2, Linux Immunix OS 7.0 Beta, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Red Hat 6.2, Linux Debian 2.2, Linux Mandrake 7.1, Linux Red Hat 5.2 Vulnerability: sgmltools-symlink X-Force URL: http://xforce.iss.net/static/6201.php Date Reported: 03/08/2001 Brief Description: HP-UX asecure denial of service Risk Factor: Medium Attack Type: Host Based Platforms Affected: HP-UX 10.10, HP-UX 10.20, HP-UX 11, HP-UX 10.01 Vulnerability: hp-asecure-dos X-Force URL: http://xforce.iss.net/static/6212.php Date Reported: 03/08/2001 Brief Description: ascdc Afterstep buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: ascdc 0.3 Vulnerability: ascdc-afterstep-bo X-Force URL: http://xforce.iss.net/static/6204.php Date Reported: 03/08/2001 Brief Description: Microsoft IIS WebDAV denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: IIS 5.0 Vulnerability: iis-webdav-dos X-Force URL: http://xforce.iss.net/static/6205.php Date Reported: 03/08/2001 Brief Description: WEBsweeper HTTP request denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: WEBsweeper 4.0, Windows NT All versions Vulnerability: websweeper-http-dos X-Force URL: http://xforce.iss.net/static/6214.php Date Reported: 03/09/2001 Brief Description: FOLDOC allows remote attackers to execute commands Risk Factor: Medium Attack Type: Network Based Platforms Affected: FOLDEC All versions Vulnerability: foldoc-cgi-execute-commands X-Force URL: http://xforce.iss.net/static/6217.php Date Reported: 03/09/2001 Brief Description: slrn newsreader wrapping/unwrapping buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Immunix OS 7.0 Beta, Linux Debian 2.2, Linux Red Hat 7.0, Linux Immunix OS 6.2, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2 Vulnerability: slrn-wrapping-bo X-Force URL: http://xforce.iss.net/static/6213.php Date Reported: 03/09/2001 Brief Description: Linux mutt package contains format string when using IMAP Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux Mandrake 7.2, Linux Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, Linux Red Hat 7.0, Linux Mandrake 7.0, Linux Mandrake 7.1, Linux Conectiva, Linux Red Hat 6.0, Linux Red Hat 6.1, Linux Red Hat 6.2, Linux Red Hat 5.2 Vulnerability: mutt-imap-format-string X-Force URL: http://xforce.iss.net/static/6235.php Date Reported: 03/10/2001 Brief Description: FormMail could be used to flood servers with anonymous email Risk Factor: High Attack Type: Network Based Platforms Affected: FormMail 1.0 to 1.6, Linux All versions Vulnerability: formmail-anonymous-flooding X-Force URL: http://xforce.iss.net/static/6242.php Date Reported: 03/11/2001 Brief Description: Half-Life Server config file buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-config-file-bo X-Force URL: http://xforce.iss.net/static/6221.php Date Reported: 03/11/2001 Brief Description: Half-Life Server exec command buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-exec-bo X-Force URL: http://xforce.iss.net/static/6219.php Date Reported: 03/11/2001 Brief Description: Half-Life Server map command buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-bo X-Force URL: http://xforce.iss.net/static/6218.php Date Reported: 03/11/2001 Brief Description: Half-Life Server 'map' command format string Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Half-Life Dedicated Server All versions Vulnerability: halflife-map-format-string X-Force URL: http://xforce.iss.net/static/6220.php Date Reported: 03/11/2001 Brief Description: Ikonboard allows remote attackers to read files Risk Factor: Medium Attack Type: Network Based Platforms Affected: Ikonboard 2.1.7b and earlier Vulnerability: ikonboard-cgi-read-files X-Force URL: http://xforce.iss.net/static/6216.php Date Reported: 03/12/2001 Brief Description: timed daemon remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Linux SuSE 7.1, Linux Mandrake 7.2, Linux SuSE 7.0, Linux- Mandrake Corporate Server 1.0.1, Linux Mandrake 6.0, Linux Mandrake 6.1, FreeBSD 4.x, Linux Mandrake 7.0, Linux SuSE 6.1, Linux Mandrake 7.1, FreeBSD 3.x, Linux SuSE 6.3, Linux SuSE 6.4, Linux SuSE 6.2 Vulnerability: timed-remote-dos X-Force URL: http://xforce.iss.net/static/6228.php Date Reported: 03/12/2001 Brief Description: imap, ipop2d and ipop3d buffer overflows Risk Factor: Low Attack Type: Network Based Platforms Affected: OpenLinux eServer 2.3.1, OpenLinux eBuilder for ECential 3.0, OpenLinux eDesktop 2.4, OpenLinux 2.3, Linux SuSE 6.1, Linux Conectiva Vulnerability: imap-ipop2d-ipop3d-bo X-Force URL: http://xforce.iss.net/static/6269.php Date Reported: 03/12/2001 Brief Description: rwhod remote denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: FreeBSD 3.x, FreeBSD 4.x, Unix All versions Vulnerability: rwhod-remote-dos X-Force URL: http://xforce.iss.net/static/6229.php Date Reported: 03/13/2001 Brief Description: SunOS snmpd argv[0] buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: SunOS 5.8 Vulnerability: snmpd-argv-bo X-Force URL: http://xforce.iss.net/static/6239.php Date Reported: 03/13/2001 Brief Description: Mesa utah-glx symbolic link Risk Factor: Medium Attack Type: Host Based Platforms Affected: Mesa prior to 3.3-14, Linux Mandrake 7.2 Vulnerability: mesa-utahglx-symlink X-Force URL: http://xforce.iss.net/static/6231.php Date Reported: 03/14/2001 Brief Description: Linux FTPfs buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Linux 2.2.x, FTPfs 0.1.1 Vulnerability: ftpfs-bo X-Force URL: http://xforce.iss.net/static/6234.php Date Reported: 03/15/2001 Brief Description: Solaris snmpXdmid malformed DMI request buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Solaris 7, Solaris 8, Solaris 2.6 Vulnerability: solaris-snmpxdmid-bo X-Force URL: http://xforce.iss.net/static/6245.php Date Reported: 03/15/2001 Brief Description: vBulletin PHP Web forum allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Network Based Platforms Affected: vBulletin 1.1.5 and earlier, vBulletin 2.0beta2 and earlier, Windows All versions, Unix All versions Vulnerability: vbulletin-php-elevate-privileges X-Force URL: http://xforce.iss.net/static/6237.php Date Reported: 03/15/2001 Brief Description: MDaemon WorldClient Web services denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows NT All versions, Windows 2000 All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-webservices-dos X-Force URL: http://xforce.iss.net/static/6240.php Date Reported: 03/16/2001 Brief Description: SSH ssheloop.c denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: SSH for Windows Server 2.4, SSH for Windows Server 2.5, Windows All versions Vulnerability: ssh-ssheloop-dos X-Force URL: http://xforce.iss.net/static/6241.php Date Reported: 03/18/2001 Brief Description: Eudora HTML emails could allow remote execution of code Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows All versions, Eudora 5.0.2 Vulnerability: eudora-html-execute-code X-Force URL: http://xforce.iss.net/static/6262.php Date Reported: 03/19/2001 Brief Description: ASPSeek s.cgi buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Linux All versions, ASPSeek 1.0.3 and earlier Vulnerability: aspseek-scgi-bo X-Force URL: http://xforce.iss.net/static/6248.php Date Reported: 03/20/2001 Brief Description: HSLCTF HTTP denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: AIX All versions, Unix All versions, HSLCTF 1.0 Vulnerability: hslctf-http-dos X-Force URL: http://xforce.iss.net/static/6250.php Date Reported: 03/20/2001 Brief Description: LICQ received URL execute commands Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux Mandrake Corporate Server 1.0.1, LICQ All, Linux Mandrake 7.1, Linux Red Hat 7.0, Linux Mandrake 7.2 Vulnerability: licq-url-execute-commands X-Force URL: http://xforce.iss.net/static/6261.php Date Reported: 03/20/2001 Brief Description: SurfControl SuperScout allows user to bypass filtering rules Risk Factor: Medium Attack Type: Network Based Platforms Affected: SurfControl SuperScout 3.0.2 and prior, Windows NT 4.0, Windows 2000 All versions Vulnerability: superscout-bypass-filtering X-Force URL: http://xforce.iss.net/static/6300.php Date Reported: 03/20/2001 Brief Description: DGUX lpsched buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: DG/UX All versions Vulnerability: dgux-lpsched-bo X-Force URL: http://xforce.iss.net/static/6258.php Date Reported: 03/20/2001 Brief Description: REDIPlus stock trading software stores passwords in plaintext Risk Factor: Medium Attack Type: Host Based Platforms Affected: REDIPlus 1.0, Windows All versions Vulnerability: rediplus-weak-security X-Force URL: http://xforce.iss.net/static/6276.php Date Reported: 03/20/2001 Brief Description: FCheck open() function allows the execution of commands Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO All versions, FCheck prior to 2.07.59, SunOS All versions, Windows All versions, Unix All versions, HP-UX All versions, Linux All versions, Solaris All versions, AIX All versions, BSD All versions Vulnerability: fcheck-open-execute-commands X-Force URL: http://xforce.iss.net/static/6256.php Date Reported: 03/20/2001 Brief Description: NTMail long URL denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows 2000 All versions, NTMail 6, Windows NT 4.0 Vulnerability: ntmail-long-url-dos X-Force URL: http://xforce.iss.net/static/6249.php Date Reported: 03/21/2001 Brief Description: VIM text editor allows attackers to gain elevated privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: VIM All versions, Linux Red Hat 5.2, Linux Red Hat 6.2, Linux Red Hat 7.0 Vulnerability: vim-elevate-privileges X-Force URL: http://xforce.iss.net/static/6259.php Date Reported: 03/22/2001 Brief Description: FreeBSD UFS/EXT2FS could allow disclosure of deleted data Risk Factor: Medium Attack Type: Host Based Platforms Affected: UFS All versions, EXT2FS All versions, FreeBSD All versions Vulnerability: ufs-ext2fs-data-disclosure X-Force URL: http://xforce.iss.net/static/6268.php Date Reported: 03/22/2001 Brief Description: Microsoft invalid digital certificates could be used for spoofing Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows ME All versions, Windows 95 All versions, Windows 98 All versions, Windows 2000 All versions, Windows NT All versions Vulnerability: microsoft-invalid-digital-certificates X-Force URL: http://xforce.iss.net/static/6265.php Date Reported: 03/23/2001 Brief Description: Akopia Interchange could allow attacker to gain administrative access Risk Factor: Low Attack Type: Network Based Platforms Affected: Akopia Interchange 4.5.3 and 4.6.3 Vulnerability: akopia-interchange-gain-access X-Force URL: http://xforce.iss.net/static/6273.php Date Reported: 03/23/2001 Brief Description: Solaris /opt/JSParm/bin/perfmon allows user to create files with root privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 2.x Vulnerability: solaris-perfmon-create-files X-Force URL: http://xforce.iss.net/static/6267.php Date Reported: 03/23/2001 Brief Description: Windows user.dmp file insecure permissions Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows NT All versions, Windows 2000 All versions Vulnerability: win-userdmp-insecure-permission X-Force URL: http://xforce.iss.net/static/6275.php Date Reported: 03/23/2001 Brief Description: Compaq Web-enabled management software could allow users to bypass proxy settings Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Compaq Web-Enabled Management All versions Vulnerability: compaq-wbm-bypass-proxy X-Force URL: http://xforce.iss.net/static/6264.php Date Reported: 03/25/2001 Brief Description: MDaemon IMAP SELECT and EXAMINE command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Mdaemon 3.5.6 Vulnerability: mdaemon-imap-command-dos X-Force URL: http://xforce.iss.net/static/6279.php Date Reported: 03/25/2001 Brief Description: HP-UX 11.11 newgrp(1) command allows users to gain additional privileges Risk Factor: High Attack Type: Host Based Platforms Affected: HP-UX 11.11 Vulnerability: hp-newgrp-additional-privileges X-Force URL: http://xforce.iss.net/static/6282.php Date Reported: 03/26/2001 Brief Description: 602Pro LAN SUITE webprox.dll denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, 602Pro LAN SUITE 2000a All versions Vulnerability: lan-suite-webprox-dos X-Force URL: http://xforce.iss.net/static/6281.php Date Reported: 03/26/2001 Brief Description: BEA WebLogic Server could allow attackers to browse Web directories Risk Factor: High Attack Type: Network Based Platforms Affected: WebLogic Server 6.0, Windows All versions Vulnerability: weblogic-browse-directories X-Force URL: http://xforce.iss.net/static/6283.php Date Reported: 03/27/2001 Brief Description: Solaris tip buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 8, Solaris 2.5.1, Solaris 2.6, Solaris 7 Vulnerability: solaris-tip-bo X-Force URL: http://xforce.iss.net/static/6284.php Date Reported: 03/27/2001 Brief Description: SonicWALL IKE pre-shared key is 48 bytes instead of 128 bytes Risk Factor: Medium Attack Type: Network Based Platforms Affected: SonicWALL TELE2 6.0.0, SonicWALL SOHO2 6.0.0 Vulnerability: sonicwall-ike-shared-keys X-Force URL: http://xforce.iss.net/static/6304.php Date Reported: 03/27/2001 Brief Description: Anaconda Foundation Clipper directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Anaconda Foundation Clipper 3.3 Vulnerability: anaconda-clipper-directory-traversal X-Force URL: http://xforce.iss.net/static/6286.php Date Reported: 03/27/2001 Brief Description: Microsoft Visual Studio VB-TSQL buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Windows 2000 All versions, Microsoft Visual Studio 6.0 Enterprise Ed., Windows NT All versions Vulnerability: visual-studio-vbtsql-bo X-Force URL: http://xforce.iss.net/static/6288.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer deliver buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-deliver-bo X-Force URL: http://xforce.iss.net/static/6302.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpadmin buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpadmin-bo X-Force URL: http://xforce.iss.net/static/6291.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpforms buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpforms-bo X-Force URL: http://xforce.iss.net/static/6293.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpshut buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpshut-bo X-Force URL: http://xforce.iss.net/static/6290.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer lpusers buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-lpusers-bo X-Force URL: http://xforce.iss.net/static/6292.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer recon buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-recon-bo X-Force URL: http://xforce.iss.net/static/6289.php Date Reported: 03/27/2001 Brief Description: SCO OpenServer sendmail buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO OpenServer 5.0.6 Vulnerability: sco-openserver-sendmail-bo X-Force URL: http://xforce.iss.net/static/6303.php Date Reported: 03/28/2001 Brief Description: Inframail POST command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows All versions, Inframail 3.97a and earlier, Linux All versions Vulnerability: inframail-post-dos X-Force URL: http://xforce.iss.net/static/6297.php Date Reported: 03/28/2001 Brief Description: Cisco VPN 3000 Concentrators Telnet denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco VPN 3000 Concentrators prior to 3.0.00 Vulnerability: cisco-vpn-telnet-dos X-Force URL: http://xforce.iss.net/static/6298.php Date Reported: 03/28/2001 Brief Description: WebSite Professional remote manager service denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: O'Reilly WebSite Pro 3.0.37 Vulnerability: website-pro-remote-dos X-Force URL: http://xforce.iss.net/static/6295.php Date Reported: 03/28/2001 Brief Description: Windows Me and Plus! 98 could allow the recovery of Compressed Folder passwords Risk Factor: Medium Attack Type: Host Based Platforms Affected: Windows 98 All versions, Windows 98 Second Edition, Windows ME All versions Vulnerability: win-compressed-password-recovery X-Force URL: http://xforce.iss.net/static/6294.php _____ Risk Factor Key: High Any vulnerability that provides an attacker with immediate access into a machine, gains superuser access, or bypasses a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. Medium Any vulnerability that provides information that has a high potential of giving system access to an intruder. Example: A misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password. Low Any vulnerability that provides information that potentially could lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods. ________ Internet Security Systems is the leading global provider of security management solutions for the Internet, protecting digital assets and ensuring safe and uninterrupted e-business. With its industry-leading intrusion detection and vulnerability assessment, remote managed security services, and strategic consulting and education offerings, ISS is a trusted security provider to more than 8,000 customers worldwide including 21 of the 25 largest U.S. commercial banks and the top 10 U.S. telecommunications companies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe, Latin America and the Middle East. For more information, visit the Internet Security Systems web site at www.iss.net or call 888-901-7477. Copyright (c) 2001 by Internet Security Systems, Inc. Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server. Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBOszkuDRfJiV99eG9AQFlewP8C6v84pW6UR171S6OThwkg/P7ylXIMY3P jO+w8ohAvbsa90iLFMlGo6YY0pIKSwlacQErryVFfVcRLQ1gIQhBxoIQlwrNkB6m XWnhroR/R7rzatML9cnHzpQKUK7Hax3LSxdxZQQwIDISxBZ4aeOTQwD+seuIos8t 8PVD8c9UO3g= =1xgg -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2001-0427 // CERT/CC: VU#154976 // BID: 2485 // BID: 88960 // VULHUB: VHN-3246 // PACKETSTORM: 24597

AFFECTED PRODUCTS

vendor:ciscomodel:vpn 3015 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3005 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3060 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3030 concentatorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3080 concentratorscope:eqversion:*

Trust: 1.0

vendor:sunmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:vpn 3060 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3015 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3005 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3000 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3080 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3030 concentatorscope: - version: -

Trust: 0.6

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3080

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3060

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3015

Trust: 0.3

sources: CERT/CC: VU#154976 // BID: 2485 // BID: 88960 // CNNVD: CNNVD-200106-090 // NVD: CVE-2001-0427

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0427
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#154976
value: 0.28

Trust: 0.8

CNNVD: CNNVD-200106-090
value: HIGH

Trust: 0.6

VULHUB: VHN-3246
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2001-0427
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3246
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#154976 // VULHUB: VHN-3246 // CNNVD: CNNVD-200106-090 // NVD: CVE-2001-0427

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-3246 // NVD: CVE-2001-0427

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 24597 // CNNVD: CNNVD-200106-090

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200106-090

EXTERNAL IDS

db:NVDid:CVE-2001-0427

Trust: 2.0

db:OSVDBid:5643

Trust: 1.7

db:BIDid:2485

Trust: 1.1

db:XFid:6298

Trust: 1.0

db:XFid:6239

Trust: 0.9

db:CERT/CCid:VU#154976

Trust: 0.8

db:CNNVDid:CNNVD-200106-090

Trust: 0.7

db:CISCOid:20010328 VPN3000 CONCENTRATOR TELNET VULNERABILITY

Trust: 0.6

db:BIDid:88960

Trust: 0.4

db:VULHUBid:VHN-3246

Trust: 0.1

db:XFid:6186

Trust: 0.1

db:XFid:6282

Trust: 0.1

db:XFid:6218

Trust: 0.1

db:XFid:6250

Trust: 0.1

db:XFid:6286

Trust: 0.1

db:XFid:6289

Trust: 0.1

db:XFid:6190

Trust: 0.1

db:XFid:6234

Trust: 0.1

db:XFid:6258

Trust: 0.1

db:XFid:6195

Trust: 0.1

db:XFid:6196

Trust: 0.1

db:XFid:6284

Trust: 0.1

db:XFid:6262

Trust: 0.1

db:XFid:6172

Trust: 0.1

db:XFid:6269

Trust: 0.1

db:XFid:6200

Trust: 0.1

db:XFid:6230

Trust: 0.1

db:XFid:6293

Trust: 0.1

db:XFid:6229

Trust: 0.1

db:XFid:6215

Trust: 0.1

db:XFid:6248

Trust: 0.1

db:XFid:6240

Trust: 0.1

db:XFid:6209

Trust: 0.1

db:XFid:6288

Trust: 0.1

db:XFid:6208

Trust: 0.1

db:XFid:6245

Trust: 0.1

db:XFid:6261

Trust: 0.1

db:XFid:6279

Trust: 0.1

db:XFid:6217

Trust: 0.1

db:XFid:6219

Trust: 0.1

db:XFid:6268

Trust: 0.1

db:XFid:6191

Trust: 0.1

db:XFid:6303

Trust: 0.1

db:XFid:6221

Trust: 0.1

db:XFid:6213

Trust: 0.1

db:XFid:6201

Trust: 0.1

db:XFid:6184

Trust: 0.1

db:XFid:6297

Trust: 0.1

db:XFid:6295

Trust: 0.1

db:XFid:6235

Trust: 0.1

db:XFid:6281

Trust: 0.1

db:XFid:6212

Trust: 0.1

db:XFid:6291

Trust: 0.1

db:XFid:6189

Trust: 0.1

db:XFid:6220

Trust: 0.1

db:XFid:6283

Trust: 0.1

db:XFid:6205

Trust: 0.1

db:XFid:6197

Trust: 0.1

db:XFid:6198

Trust: 0.1

db:XFid:6181

Trust: 0.1

db:XFid:6228

Trust: 0.1

db:XFid:6241

Trust: 0.1

db:XFid:6294

Trust: 0.1

db:XFid:6304

Trust: 0.1

db:XFid:6233

Trust: 0.1

db:XFid:6214

Trust: 0.1

db:XFid:6300

Trust: 0.1

db:XFid:6273

Trust: 0.1

db:XFid:6267

Trust: 0.1

db:XFid:6264

Trust: 0.1

db:XFid:6256

Trust: 0.1

db:XFid:6275

Trust: 0.1

db:XFid:6292

Trust: 0.1

db:XFid:6302

Trust: 0.1

db:XFid:6276

Trust: 0.1

db:XFid:6204

Trust: 0.1

db:XFid:6216

Trust: 0.1

db:XFid:6187

Trust: 0.1

db:XFid:6231

Trust: 0.1

db:XFid:6290

Trust: 0.1

db:XFid:6259

Trust: 0.1

db:XFid:6265

Trust: 0.1

db:XFid:6242

Trust: 0.1

db:XFid:6193

Trust: 0.1

db:XFid:6237

Trust: 0.1

db:XFid:6202

Trust: 0.1

db:XFid:6249

Trust: 0.1

db:XFid:6211

Trust: 0.1

db:PACKETSTORMid:24597

Trust: 0.1

sources: CERT/CC: VU#154976 // VULHUB: VHN-3246 // BID: 2485 // BID: 88960 // PACKETSTORM: 24597 // CNNVD: CNNVD-200106-090 // NVD: CVE-2001-0427

REFERENCES

url:http://www.cisco.com/warp/public/707/vpn3k-telnet-vuln-pub.shtml

Trust: 2.0

url:http://www.osvdb.org/5643

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/6298

Trust: 1.1

url:http://xforce.iss.net/static/6298.php

Trust: 1.0

url:http://xforce.iss.net/static/6239.php

Trust: 0.9

url:http://www.securityfocus.com/bid/2485

Trust: 0.8

url:http://xforce.iss.net/static/6293.php

Trust: 0.1

url:http://xforce.iss.net/static/6196.php

Trust: 0.1

url:http://xforce.iss.net/static/6237.php

Trust: 0.1

url:http://xforce.iss.net/static/6234.php

Trust: 0.1

url:http://xforce.iss.net/static/6204.php

Trust: 0.1

url:http://xforce.iss.net/static/6269.php

Trust: 0.1

url:http://xforce.iss.net/static/6264.php

Trust: 0.1

url:http://xforce.iss.net/static/6221.php

Trust: 0.1

url:http://xforce.iss.net/static/6216.php

Trust: 0.1

url:https://www.iss.net

Trust: 0.1

url:http://xforce.iss.net/static/6191.php

Trust: 0.1

url:http://xforce.iss.net/static/6289.php

Trust: 0.1

url:http://xforce.iss.net/static/6275.php

Trust: 0.1

url:http://xforce.iss.net/static/6215.php

Trust: 0.1

url:http://xforce.iss.net/static/6228.php

Trust: 0.1

url:http://xforce.iss.net/static/6261.php

Trust: 0.1

url:http://xforce.iss.net/static/6214.php

Trust: 0.1

url:http://xforce.iss.net/static/6295.php

Trust: 0.1

url:http://xforce.iss.net/static/6193.php

Trust: 0.1

url:http://xforce.iss.net/alerts/vol-6_num-5.php

Trust: 0.1

url:http://xforce.iss.net/static/6219.php

Trust: 0.1

url:http://xforce.iss.net/static/6284.php

Trust: 0.1

url:http://xforce.iss.net/static/6242.php

Trust: 0.1

url:http://xforce.iss.net/static/6259.php

Trust: 0.1

url:http://xforce.iss.net/static/6198.php

Trust: 0.1

url:http://xforce.iss.net/static/6218.php

Trust: 0.1

url:http://xforce.iss.net/static/6195.php

Trust: 0.1

url:http://xforce.iss.net/static/6258.php

Trust: 0.1

url:http://xforce.iss.net/static/6267.php

Trust: 0.1

url:http://xforce.iss.net/static/6229.php

Trust: 0.1

url:http://xforce.iss.net/static/6281.php

Trust: 0.1

url:http://xforce.iss.net/static/6249.php

Trust: 0.1

url:http://xforce.iss.net/static/6184.php

Trust: 0.1

url:http://xforce.iss.net/static/6181.php

Trust: 0.1

url:http://xforce.iss.net/static/6288.php

Trust: 0.1

url:http://xforce.iss.net/static/6233.php

Trust: 0.1

url:http://xforce.iss.net/static/6279.php

Trust: 0.1

url:http://xforce.iss.net/static/6291.php

Trust: 0.1

url:http://xforce.iss.net/static/6262.php

Trust: 0.1

url:http://xforce.iss.net/static/6294.php

Trust: 0.1

url:http://xforce.iss.net/static/6213.php

Trust: 0.1

url:http://xforce.iss.net/static/6276.php

Trust: 0.1

url:http://xforce.iss.net/

Trust: 0.1

url:http://xforce.iss.net/static/6186.php

Trust: 0.1

url:http://xforce.iss.net/static/6250.php

Trust: 0.1

url:http://xforce.iss.net/static/6268.php

Trust: 0.1

url:http://xforce.iss.net/static/6248.php

Trust: 0.1

url:http://xforce.iss.net/static/6190.php

Trust: 0.1

url:http://xforce.iss.net/static/6201.php

Trust: 0.1

url:http://xforce.iss.net/static/6220.php

Trust: 0.1

url:http://xforce.iss.net/static/6197.php

Trust: 0.1

url:http://xforce.iss.net/static/6256.php

Trust: 0.1

url:http://xforce.iss.net/static/6230.php

Trust: 0.1

url:http://xforce.iss.net/static/6208.php

Trust: 0.1

url:http://xforce.iss.net/static/6212.php

Trust: 0.1

url:http://xforce.iss.net/static/6200.php

Trust: 0.1

url:http://xforce.iss.net/static/6205.php

Trust: 0.1

url:http://xforce.iss.net/static/6265.php

Trust: 0.1

url:http://xforce.iss.net/static/6202.php

Trust: 0.1

url:http://xforce.iss.net/static/6240.php

Trust: 0.1

url:http://xforce.iss.net/static/6304.php

Trust: 0.1

url:http://xforce.iss.net/static/6297.php

Trust: 0.1

url:http://xforce.iss.net/static/6300.php

Trust: 0.1

url:http://xforce.iss.net/static/6292.php

Trust: 0.1

url:http://xforce.iss.net/static/6231.php

Trust: 0.1

url:http://xforce.iss.net/static/6283.php

Trust: 0.1

url:http://xforce.iss.net/static/6172.php

Trust: 0.1

url:http://xforce.iss.net/static/6211.php

Trust: 0.1

url:http://xforce.iss.net/static/6217.php

Trust: 0.1

url:http://xforce.iss.net/static/6235.php

Trust: 0.1

url:http://xforce.iss.net/static/6209.php

Trust: 0.1

url:http://xforce.iss.net/static/6241.php

Trust: 0.1

url:http://xforce.iss.net/maillists/index.php

Trust: 0.1

url:http://xforce.iss.net/static/6302.php

Trust: 0.1

url:http://xforce.iss.net/static/6303.php

Trust: 0.1

url:http://xforce.iss.net/static/6282.php

Trust: 0.1

url:http://xforce.iss.net/static/6286.php

Trust: 0.1

url:http://xforce.iss.net/sensitive.php

Trust: 0.1

url:http://xforce.iss.net/static/6273.php

Trust: 0.1

url:http://xforce.iss.net/static/6187.php

Trust: 0.1

url:http://xforce.iss.net/static/6245.php

Trust: 0.1

url:http://xforce.iss.net/static/6189.php

Trust: 0.1

url:http://xforce.iss.net/static/6290.php

Trust: 0.1

sources: CERT/CC: VU#154976 // VULHUB: VHN-3246 // BID: 88960 // PACKETSTORM: 24597 // CNNVD: CNNVD-200106-090 // NVD: CVE-2001-0427

CREDITS

This vulnerabililty was announced to Bugtraq by Pablo Sor <psor@afip.gov.ar> on March 13, 2001.

Trust: 0.3

sources: BID: 2485

SOURCES

db:CERT/CCid:VU#154976
db:VULHUBid:VHN-3246
db:BIDid:2485
db:BIDid:88960
db:PACKETSTORMid:24597
db:CNNVDid:CNNVD-200106-090
db:NVDid:CVE-2001-0427

LAST UPDATE DATE

2024-08-14T12:28:24.818000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#154976date:2002-04-02T00:00:00
db:VULHUBid:VHN-3246date:2017-10-10T00:00:00
db:BIDid:2485date:2001-03-13T00:00:00
db:BIDid:88960date:2001-06-18T00:00:00
db:CNNVDid:CNNVD-200106-090date:2006-09-22T00:00:00
db:NVDid:CVE-2001-0427date:2017-10-10T01:29:43.407

SOURCES RELEASE DATE

db:CERT/CCid:VU#154976date:2001-05-06T00:00:00
db:VULHUBid:VHN-3246date:2001-06-18T00:00:00
db:BIDid:2485date:2001-03-13T00:00:00
db:BIDid:88960date:2001-06-18T00:00:00
db:PACKETSTORMid:24597date:2001-04-09T05:30:06
db:CNNVDid:CNNVD-200106-090date:2001-06-18T00:00:00
db:NVDid:CVE-2001-0427date:2001-06-18T04:00:00