Language:
switch to room list switch to menu My folders
Go to page: 1 2 3 4 5 [6] 7 8 9 10 ... Last
[#] Wed Mar 02 2005 15:30:49 EST from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-061 -- Summary of Security Items from February 23 through March 1, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Summary of Security Items from February 23 through March 1, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between February 23 through
March 1, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-061.html>



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQiYhYhhoSezw4YfQAQLw1Qf+KdvIqv3KXgccTt7wrCKCYmaYD7XCyWIO
xuNGuJK87W/AaLk64R3/M481dco9+7jy9vqqjdhp+OqFs9cGWPv+4jsNngzaI0sf
K/CAACPlSRki6yGiezt1FuBZ4MQ3NbqKJuXfJw37D4wwtub3LLtmnZqOe9aJE1i6
W19jC66mCgYDQLoiI4zPGoGM2/2kX9j12iLy0aebnkUwdjuw9D/9tC2IlITxj02s
JdP1bxY5s89n90OqdVA3ko7WAef1O2r70/YAXBORlyu+Rv0Awj+nVVqMWg6LDVD4
SI0kzyrOdIp4bA8R+mnAx+yEiiwFKDFXSdRDmaBAb//zS01VhZBmwQ==
=z3Bg
-----END PGP SIGNATURE-----

[#] Wed Mar 09 2005 15:36:49 EST from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-068 -- Summary of Security Items from March 2 through March 8, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Summary of Security Items from March 2 through March 8, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between March 2 through March
8, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-068.html>



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQi9eDxhoSezw4YfQAQJW8Af8Cvc4LyTWEiR4+b+bZBXKfdl3I77b19dD
Y0vn42QzB0/gEVouXT7c0m4A3Ips3+qZEvybX3kNjanuijVMSqR6DAq5rIUyY1EW
e4rXuM48QdY9TzZ3tB+Opou+y8jxX596PEACra406cEtTAY0tDxM75sXuQViyG0s
tgaIfLVIYsoSFHRo0XwvwVl870jMxpzODIUkc4Bx0RNwcJOswovUCILADuqQKZcE
1ImPGfdauP+9W8zQVQUqxscirrcaJW0RCjV9KotAcBOUJTgkrODM2TEg8Mp/236/
VOtEKoHOEarytAYuDYCslKx5BvhqxJjrubxSXSpwU3jSvB+3IHA7gQ==
=13L/
-----END PGP SIGNATURE-----

[#] Wed Mar 16 2005 15:09:47 EST from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-075 -- Summary of Security Items from March 9 through March 15, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Summary of Security Items from March 9 through March 15, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between March 9 and March 15,
2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-075.html>



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQjiSFRhoSezw4YfQAQJpyAf/YpzQx4OF/iDKGYy7rhrO/2Mkxh5tGrr1
/0S+6myMCtISgmQwyavRGwR5a4PWueYc0h3xe3fc+7JlmQsZo8QkQYZhUsuh969k
pc6grOA4O7lCs/tvWpJWIxbRG0xcSpqjx89eY+Ec7/ZuiNYrirZMl6RPqnI5hAfh
lJOD/gxg5X7TF8fiWX2qp5qkUDT1XVNGpu9Fahn1uZbB0t0QoGXePb9iTZBRKCA2
+H5MtKNOyDGFfW0JyYtrDjVgOfP65Oo2MqY7WUvmFU0x918oq5DSCAooyLAv579y
yXLf1pxKDDJHmH95Rj3fiCsHbZBcbOKUouiRv/MLCsWtP01hJ86cqQ==
=NHOu
-----END PGP SIGNATURE-----

[#] Wed Mar 23 2005 14:12:54 EST from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-082 -- Summary of Security Items from March 16 through March 22, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Summary of Security Items from March 16 through March 22, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between March 16 through March
22, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-082.html>



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQkG+HxhoSezw4YfQAQLVjQf/VbOjeBKNGB91H9xvH22m68l3RfgQ548F
3dSy9KxNPAZ2iKJOB3W3xyA4v+8/hC8UQ8zAtKkNw0IrHRqd1yiaAIvN44UoB81h
3VysgcqnMLHUh/om71qCGmYQp1D0t51FAdUQGeq7T19ZITPhv1mg/CtDXkr4yM98
hl64LkxhBbct2iucPBSj778xwuzvh7o9EzjY5q5yLquygmOPocYVTjeNahYsii/M
2jRSdBOGnKKRHa6t1aFKE8uYkINE1mcbv2xA3LNaNLwytnkviHIEhGd4h4u8gsSa
kjC9+mfHC4xh5WRN7NhBQ8nA40jaTmDZ/qvwk+nTuYgoTzSLIxb+IQ==
=kSaT
-----END PGP SIGNATURE-----

[#] Wed Mar 30 2005 14:55:20 EST from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-089 -- Summary of Security Items from March 23 through March 29, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Summary of Security Items from March 23 through March 29, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between March 23 through March
25, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-089.html>



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQksDuxhoSezw4YfQAQLCQggAiJxTk3BijucVTVFdzHuLhTgXuZNkqAUt
WUdT7J1LSPTlkTkTrgaCuKRBijfBWVaEXY+WzHcP/OGjH/GXhJ5A0zns/n5rNjTV
RXWJY6iUQp7Wv1SoCdN4+Rw0SeDrE+L0nS8xf1cO4pUfRD0j+thnGmB2IM2ikk8v
EVmOT0lVJT8Ju5n6YDTW+GKNp01h96reVuqENaA8UKG7+K95Kcx1Tjg+oHyv3Dno
k9DExPfncLsfVJuI6aJSZ4QBlvfatprusRZ4MBQs7Ua3l4oQSt2u8iJOws4dAr/N
ntrw1uC3PF34tfXTcv2/XUL0aBHylH8spJaxtuAcveBlgSIGBqnU9A==
=9MBk
-----END PGP SIGNATURE-----

[#] Wed Apr 06 2005 14:24:56 EDT from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-096 -- Summary of Security Items from March 30 through April 5, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary of Security Items from March 30 through April 5, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between March 30 through April
5, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-096.html>



For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQlQoxhhoSezw4YfQAQLR0wf7Bde7e1+hUnkdGxsnl9KaF7/gaV9JiRii
2gdB94f7xYGKWrxLcRInnNOHiRyH5BLN8SC5lqCT0UQ6A8uookMHIfc7hj0o6qDm
ZN0QZq0XU1g6cMu49z5O0bMSntDqtLhpq4QKQlrKA+sfFkUPO2oQbriB46vc7zN9
JXy5DVX1IbVZgPEkRHWDTOT9hEeP8X1w71zpNHUdVg2GrPNN9MKtnN1jsmwADhMZ
apiHr4XlM2dCHJIzKSAyChxnqBt3HMKbWW47GT4/XvUjJbfsj2VWXNBCaxCKv7F2
dhHRrgmpx5lgjzPIsi8x5lB4jlr/t10Yw1n2FXNhlHwhq4yMPVzJuA==
=2LFy
-----END PGP SIGNATURE-----

[#] Tue Apr 12 2005 21:23:05 EDT from "CERT Advisory" <cert-advisory@cert.org> to cert-advisory@cert.org

Subject: US-CERT Technical Cyber Security Alert TA05-102A -- Multiple Vulnerabilities in Microsoft Windows Components

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA05-102A

Multiple Vulnerabilities in Microsoft Windows Components

Original release date: April 12, 2005
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows Systems

For a complete list of affected versions of the Windows operating
systems and components, refer to the Microsoft Security Bulletins.


Overview

Microsoft has released a Security Bulletin Summary for April, 2005.
This summary includes several bulletins that address
vulnerabilities in various Windows applications and
components. Exploitation of some vulnerabilities can result in the
remote execution of arbitrary code by a remote attacker. Details of
the vulnerabilities and their impacts are provided below.


I. Description

The list below provides a mapping between Microsoft's Security
Bulletins and the related US-CERT Vulnerability Notes. More
information related to the vulnerabilities is available in these
documents.

Microsoft Security Bulletin MS05-020:
Cumulative Security Update for Internet Explorer (890923)

VU#774338 Microsoft Internet Explorer DHTML objects contain a
race condition

VU#756122 Microsoft Internet Explorer URL validation routine
contains a buffer overflow

VU#222050 Microsoft Internet Explorer Content Advisor contains a
buffer overflow


Microsoft Security Bulletin MS05-02:
Vulnerability in Exchange Server Could Allow Remote Code
Execution (894549)

VU#275193 Microsoft Exchange Server contains unchecked buffer in SMTP
extended verb handling


Microsoft Security Bulletin MS05-022:
Vulnerability in MSN Messenger Could Lead to Remote Code Execution
(896597)

VU#633446 Microsoft MSN Messenger GIF processing
buffer overflow


Microsoft Security Bulletin MS05-019:
Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial
of Service (893066)

VU#233754 Microsoft Windows does not adequately validate IP
packets


II. Impact

Exploitation of these vulnerabilities may permit a remote attacker to
execute arbitrary code on a vulnerable Windows system, or cause a
denial-of-service condition.


III. Solution

Apply a patch

Microsoft has provided the patches for these vulnerabilities in the
Security Bulletins and on Windows Update.


Appendix A. References

* Microsoft's Security Bulletin Summary for April, 2005 - <
http://www.microsoft.com/technet/security/bulletin/ms05-apr.mspx>

* US-CERT Vulnerability Note VU#774338 -
<http://www.kb.cert.org/vuls/id/774338>

* US-CERT Vulnerability Note VU#756122 -
<http://www.kb.cert.org/vuls/id/756122>

* US-CERT Vulnerability Note VU#222050 -
<http://www.kb.cert.org/vuls/id/222050>

* US-CERT Vulnerability Note VU#275193 -
<http://www.kb.cert.org/vuls/id/275193>

* US-CERT Vulnerability Note VU#633446 -
<http://www.kb.cert.org/vuls/id/633446>

* US-CERT Vulnerability Note VU#233754 -
<http://www.kb.cert.org/vuls/id/233754>
_________________________________________________________________

Feedback can be directed to the authors: Will Dormann, Jeff Gennari,
Chad Dougherty, Ken MacInnis, Jason Rafail, Art Manion, and Jeff
Havrilla.
_________________________________________________________________

This document is available from:

<http://www.us-cert.gov/cas/techalerts/TA05-102A.html>

_________________________________________________________________

Copyright 2005 Carnegie Mellon University.

Terms of use: <http://www.us-cert.gov/legal.html>
_________________________________________________________________

Revision History

April 12, 2005: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQlxwexhoSezw4YfQAQJ4RAf/bTgaa6SBDMJveqW/GnQET79F9aVPM1S2
glam1w4YFyOdyIHpDYqQZRBqgXgpJjel/MiH02tZreU5mgIjkPIWA3gleepyWvnN
7VYv8KcbSnyvGxDl/8K2YjFz550gxA3pkRD7IiqdpOums87lJ7xM7sjdUY0ZA8aF
JEvA4gfndpgLSuISV7Gf8y1s4MU329DurNy3t8W4EB9Iuef/E4Z058IvHnz9dTnT
XwBnyW1KfH2Ohpy7QBOtcXt1wXU8X0F+d01g/VZmTL7xVwXmcPi8UpS7bPK8A17+
asqo582KjZVR56iL7fqNQzsrXUGZncEnX/8QOhi3Ym2LfAEkKrg3rw==
=BY/p
-----END PGP SIGNATURE-----

[#] Tue Apr 12 2005 21:21:54 EDT from "US-CERT Technical Alerts" <technical-alerts@us-cert.gov> to technical-alerts@us-cert.gov

Subject: US-CERT Technical Cyber Security Alert TA05-102A -- Multiple Vulnerabilities in Microsoft Windows Components

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA05-102A

Multiple Vulnerabilities in Microsoft Windows Components

Original release date: April 12, 2005
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows Systems

For a complete list of affected versions of the Windows operating
systems and components, refer to the Microsoft Security Bulletins.


Overview

Microsoft has released a Security Bulletin Summary for April, 2005.
This summary includes several bulletins that address
vulnerabilities in various Windows applications and
components. Exploitation of some vulnerabilities can result in the
remote execution of arbitrary code by a remote attacker. Details of
the vulnerabilities and their impacts are provided below.


I. Description

The list below provides a mapping between Microsoft's Security
Bulletins and the related US-CERT Vulnerability Notes. More
information related to the vulnerabilities is available in these
documents.

Microsoft Security Bulletin MS05-020:
Cumulative Security Update for Internet Explorer (890923)

VU#774338 Microsoft Internet Explorer DHTML objects contain a
race condition

VU#756122 Microsoft Internet Explorer URL validation routine
contains a buffer overflow

VU#222050 Microsoft Internet Explorer Content Advisor contains a
buffer overflow


Microsoft Security Bulletin MS05-02:
Vulnerability in Exchange Server Could Allow Remote Code
Execution (894549)

VU#275193 Microsoft Exchange Server contains unchecked buffer in SMTP
extended verb handling


Microsoft Security Bulletin MS05-022:
Vulnerability in MSN Messenger Could Lead to Remote Code Execution
(896597)

VU#633446 Microsoft MSN Messenger GIF processing
buffer overflow


Microsoft Security Bulletin MS05-019:
Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial
of Service (893066)

VU#233754 Microsoft Windows does not adequately validate IP
packets


II. Impact

Exploitation of these vulnerabilities may permit a remote attacker to
execute arbitrary code on a vulnerable Windows system, or cause a
denial-of-service condition.


III. Solution

Apply a patch

Microsoft has provided the patches for these vulnerabilities in the
Security Bulletins and on Windows Update.


Appendix A. References

* Microsoft's Security Bulletin Summary for April, 2005 - <
http://www.microsoft.com/technet/security/bulletin/ms05-apr.mspx>

* US-CERT Vulnerability Note VU#774338 -
<http://www.kb.cert.org/vuls/id/774338>

* US-CERT Vulnerability Note VU#756122 -
<http://www.kb.cert.org/vuls/id/756122>

* US-CERT Vulnerability Note VU#222050 -
<http://www.kb.cert.org/vuls/id/222050>

* US-CERT Vulnerability Note VU#275193 -
<http://www.kb.cert.org/vuls/id/275193>

* US-CERT Vulnerability Note VU#633446 -
<http://www.kb.cert.org/vuls/id/633446>

* US-CERT Vulnerability Note VU#233754 -
<http://www.kb.cert.org/vuls/id/233754>
_________________________________________________________________

Feedback can be directed to the authors: Will Dormann, Jeff Gennari,
Chad Dougherty, Ken MacInnis, Jason Rafail, Art Manion, and Jeff
Havrilla.
_________________________________________________________________

This document is available from:

<http://www.us-cert.gov/cas/techalerts/TA05-102A.html>

_________________________________________________________________

Copyright 2005 Carnegie Mellon University.

Terms of use: <http://www.us-cert.gov/legal.html>
_________________________________________________________________

Revision History

April 12, 2005: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQlxwexhoSezw4YfQAQJ4RAf/bTgaa6SBDMJveqW/GnQET79F9aVPM1S2
glam1w4YFyOdyIHpDYqQZRBqgXgpJjel/MiH02tZreU5mgIjkPIWA3gleepyWvnN
7VYv8KcbSnyvGxDl/8K2YjFz550gxA3pkRD7IiqdpOums87lJ7xM7sjdUY0ZA8aF
JEvA4gfndpgLSuISV7Gf8y1s4MU329DurNy3t8W4EB9Iuef/E4Z058IvHnz9dTnT
XwBnyW1KfH2Ohpy7QBOtcXt1wXU8X0F+d01g/VZmTL7xVwXmcPi8UpS7bPK8A17+
asqo582KjZVR56iL7fqNQzsrXUGZncEnX/8QOhi3Ym2LfAEkKrg3rw==
=BY/p
-----END PGP SIGNATURE-----

[#] Wed Apr 13 2005 15:56:52 EDT from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-103 -- Summary of Security Items April 6 through April 12, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary of Security Items from April 6 through April 12, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between April 6 through April
12, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-103.html>



For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQl1tKhhoSezw4YfQAQLccwgAiP5zy57aaV3ENXQfk1TE5FW3EMuHbVzS
eHPW9O0XDl3QctBWu2mhC9VjhQF6AAXylcj902O6LgvMspM9opiqzKRxZTqg5fwy
zVFKsqPVs4NAk4YPi1DrV1ilMK/b43xC3enyZQKiu39wsFCcEOhbPuUYtwYuLhAI
J3m6tpPdvvgeyIMEpZYel6ZIwJc0L6VzZXiVAgi+mMrFDtBbSFkBuh2e3TYZw7am
IJHG0XzFnABFbbBPfccW7fG25uKFrXThCfaTp1FzbDOGRY3i4DxxYsUQvoPUf4t5
iHlZNv7RH/ccnztX24aIE38CeKt7qB/cM1TlfVgik7B52qdprvE+PA==
=NoxD
-----END PGP SIGNATURE-----

[#] Wed Apr 20 2005 15:25:11 EDT from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-110 -- Summary of Security Items from April 13 through April 19, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary of Security Items from April 13 through April 19, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between April 13 through April
19, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-110.html>



For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQmasGRhoSezw4YfQAQICwAf/dLApJ6+4p/xy2WUCSe5hsXxDVrm2vMtV
Mffu1MhyY0rXDtuO5RtsGryQof9BWqMrHrX6x7RdjMSJkizaR1JRVQ7IjkrNtiaC
izxfrBw0GbO0mSh3AqjzGfiWDSsDNkJqOZenSNmRpS4KSpjN5jDdrAxtHJRWE7Oi
gzPclYMM5pczVvypAgu5XacHegzMcoQLgw6M+9PfawTvM6MBk+7FTN+/MA0YoWYj
d5TdvjV59vLYMLPNc6WNrA04o37EST+RLCcH+DalyJ8esfm79ob77JMHAiB6aSzn
I2VlYiHJ2bKm0PN8kbciSk0PASV40s++jRxesgKNSnIpzCRENMAdDA==
=jE8X
-----END PGP SIGNATURE-----

[#] Wed Apr 27 2005 15:37:32 EDT from "US-CERT Technical Alerts" <technical-alerts@us-cert.gov> to technical-alerts@us-cert.gov

Subject: US-CERT Technical Cyber Security Alert TA05-117A -- Oracle Products Contain Multiple Vulnerabilities

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Technical Cyber Security Alert TA05-117A

Oracle Products Contain Multiple Vulnerabilities

Original release date: April 27, 2005
Last revised: --
Source: US-CERT


Systems Affected

From the Oracle Critical Patch Update - April 2005:

* Oracle Database 10g Release 1, versions 10.1.0.2, 10.1.0.3,
10.1.0.3.1, 10.1.0.4 (10.1.0.3.1 is supported for Oracle
Application Server only)
* Oracle9i Database Server Release 2, versions 9.2.0.5, 9.2.0.6
* Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5,
9.0.4 (9.0.1.5 FIPS) (all of which are supported for Oracle
Application Server only)
* Oracle8i Database Server Release 3, version 8.1.7.4
* Oracle Application Server 10g Release 2 (10.1.2)
* Oracle Application Server 10g (9.0.4), versions 9.0.4.0,
9.0.4.1
* Oracle9i Application Server Release 2, versions 9.0.2.3, 9.0.3.1
* Oracle9i Application Server Release 1, version 1.0.2.2
* Oracle Collaboration Suite Release 2, versions 9.0.4.1, 9.0.4.2
* Oracle E-Business Suite and Applications Release 11i, versions
11.5.0 through 11.5.10
* Oracle E-Business Suite and Applications Release 11.0
* Oracle Enterprise Manager Grid Control 10g, versions 10.1.0.2,
10.1.0.3
* Oracle Enterprise Manager versions 9.0.4.0, 9.0.4.1
* PeopleSoft EnterpriseOne Applications, versions 8.9 SP2 and 8.93
* PeopleSoft OneWorldXe/ERP8 Applications, versions SP22 and higher


Overview

Various Oracle products and components are affected by multiple
vulnerabilities. The impacts of these vulnerabilities include
unauthenticated, remote code execution, information disclosure, and
denial of service.


I. Description

Oracle released a Critical Patch Update in April that addresses
more than seventy vulnerabilities in different Oracle products and
components. The Critical Patch Update provides information about
which components are affected, what access and authorization are
required, and how data confidentiality, integrity, and availability
may be impacted.

US-CERT strongly recommends that sites running Oracle review the
Critical Patch Update, apply patches, and take other mitigating
action as appropriate.

Oracle HTTP Server is based on the Apache HTTP Server. According to
Oracle, the Critical Patch Update addresses a number of previously
disclosed Apache vulnerabilities. Oracle Database Client-only
installations are not affected.

US-CERT is tracking all of these issues under VU#948486. As further
information becomes available, we will publish individual
Vulnerability Notes.


II. Impact

The impacts of these vulnerabilities vary depending on product or
component and configuration. Potential consequences include remote
execution of arbitrary code or commands, information disclosure,
and denial of service. An attacker who compromises an Oracle
database may be able to gain access to sensitive information.


III. Solution

Apply a patch

Apply the appropriate patches or upgrade as specified in the Oracle
Critical Patch Update - April 2005. The update notes that some
Oracle patches are cumulative while others are not:

The Oracle Database Server, Enterprise Manager, and the Oracle
Application Server patches for this Critical Patch Update are
cumulative, and contain all the fixes from the previous Critical
Patch Update.
...

E-Business Suite patches are not cumulative, so E-Business Suite
customers should refer to previous Critical Patch Updates to
identify previous fixes they wish to apply.

Oracle Collaboration Suite patches are not cumulative, so Oracle
Collaboration Suite customers should refer to previous Critical
Patch Updates to identify previous fixes they wish to apply.

Workarounds

It may be possible to mitigate some vulnerabilities by disabling or
removing unnecessary components and restricting network access.
Revoking PUBLIC EXECUTE privileges from vulnerable stored
procedures may reduce the impact of SQL injection vulnerabilities
(VU#982109). For more specific workarounds please see the
individual Vulnerability Notes.

Oracle Critical Patch Update - April 2005 contains a workaround for a
vulnerability in PeopleSoft.


Appendix A. Vendor Information

Oracle

Please see Oracle Critical Patch Update - April 2005 and Critical
Patch Updates and Security Alerts.


Appendix B. References

* Critical Patch Update - April 2005 -
<http://www.oracle.com/technology/deploy/security/pdf/
cpuapr2005.pdf>

* Critical Patch Updates and Security Alerts -
<http://www.oracle.com/technology/deploy/security/alerts.htm>

* Map of Public Vulnerability to Advisory/Alert -
<http://www.oracle.com/technology/deploy/security/pdf/
public_vuln_to_advisory_mapping.html>

* Comments on Oracle Critical Patch Update April 2005 -
<http://www.red-database-security.com/wp/
comments_oracle_cpu_april_2005_us.pdf>

* NGSSoftware Oracle Database vulnerabilities -
<http://www.ngssoftware.com/advisories/oracle-03.txt>

* US-CERT Vulnerability Note VU#948486 -
<http://www.kb.cert.org/vuls/id/948486>

* US-CERT Vulnerability Note VU#982109 -
<http://www.kb.cert.org/vuls/id/982109>

_________________________________________________________________

Thanks to Alexander Kornbrust of Red-Database-Security GmbH.
Information used in this document came from Red-Database-Security and
Oracle. Oracle credits NGS Software Ltd., Integrigy, and Application
Security, Inc.
_________________________________________________________________

Feedback can be directed to the authors: Art Manion and Jeff Gennari.

Send mail to <cert@cert.org>.

Please include the Subject line "TA04-315A Feedback VU#948486".
_________________________________________________________________

Copyright 2005 Carnegie Mellon University.

Terms of use: <http://www.us-cert.gov/legal.html>
_________________________________________________________________

The most recent version of this document is available at:

<http://www.us-cert.gov/cas/techalerts/TA05-117A.html>
_________________________________________________________________


Revision History

April 27, 2005: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQm/pwhhoSezw4YfQAQIouwgAhowi2o6QI66xpWVcyKDckKfJSlUKMoLt
vSHpL0J6vHJDGyrnllbVqcUhsYi78IPmvkOiZ0RbvgBtm9TR+zxO13CyQ6wWPoTl
dItgw4BDw/f1bzLthb7+2GvCzXqsG+ICWZegEzX31ma7tO0yb1sdGEt9kwgL64ik
njwJ/Bn7pG2b1EFQ1zurIOsOcINdUrThgk0BqNmGfRxRnIF7XXdEQUIC2Q0jAz4a
Qxx6rttfnCJp6LmVMyqLFDItn9QyBMQTIfiOKaGNnmu7oyk8jdZq+HoORaeYqbC8
ectngIs+FPKXEACRaAKi/F932fkD2BX5dS/IF1VkYw7tWX6M2I39Dw==
=5Mno
-----END PGP SIGNATURE-----

[#] Wed Apr 27 2005 15:40:51 EDT from "CERT Advisory" <cert-advisory@cert.org> to cert-advisory@cert.org

Subject: US-CERT Technical Cyber Security Alert TA05-117A -- Oracle Products Contain Multiple Vulnerabilities

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Technical Cyber Security Alert TA05-117A

Oracle Products Contain Multiple Vulnerabilities

Original release date: April 27, 2005
Last revised: --
Source: US-CERT


Systems Affected

From the Oracle Critical Patch Update - April 2005:

* Oracle Database 10g Release 1, versions 10.1.0.2, 10.1.0.3,
10.1.0.3.1, 10.1.0.4 (10.1.0.3.1 is supported for Oracle
Application Server only)
* Oracle9i Database Server Release 2, versions 9.2.0.5, 9.2.0.6
* Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5,
9.0.4 (9.0.1.5 FIPS) (all of which are supported for Oracle
Application Server only)
* Oracle8i Database Server Release 3, version 8.1.7.4
* Oracle Application Server 10g Release 2 (10.1.2)
* Oracle Application Server 10g (9.0.4), versions 9.0.4.0,
9.0.4.1
* Oracle9i Application Server Release 2, versions 9.0.2.3, 9.0.3.1
* Oracle9i Application Server Release 1, version 1.0.2.2
* Oracle Collaboration Suite Release 2, versions 9.0.4.1, 9.0.4.2
* Oracle E-Business Suite and Applications Release 11i, versions
11.5.0 through 11.5.10
* Oracle E-Business Suite and Applications Release 11.0
* Oracle Enterprise Manager Grid Control 10g, versions 10.1.0.2,
10.1.0.3
* Oracle Enterprise Manager versions 9.0.4.0, 9.0.4.1
* PeopleSoft EnterpriseOne Applications, versions 8.9 SP2 and 8.93
* PeopleSoft OneWorldXe/ERP8 Applications, versions SP22 and higher


Overview

Various Oracle products and components are affected by multiple
vulnerabilities. The impacts of these vulnerabilities include
unauthenticated, remote code execution, information disclosure, and
denial of service.


I. Description

Oracle released a Critical Patch Update in April that addresses
more than seventy vulnerabilities in different Oracle products and
components. The Critical Patch Update provides information about
which components are affected, what access and authorization are
required, and how data confidentiality, integrity, and availability
may be impacted.

US-CERT strongly recommends that sites running Oracle review the
Critical Patch Update, apply patches, and take other mitigating
action as appropriate.

Oracle HTTP Server is based on the Apache HTTP Server. According to
Oracle, the Critical Patch Update addresses a number of previously
disclosed Apache vulnerabilities. Oracle Database Client-only
installations are not affected.

US-CERT is tracking all of these issues under VU#948486. As further
information becomes available, we will publish individual
Vulnerability Notes.


II. Impact

The impacts of these vulnerabilities vary depending on product or
component and configuration. Potential consequences include remote
execution of arbitrary code or commands, information disclosure,
and denial of service. An attacker who compromises an Oracle
database may be able to gain access to sensitive information.


III. Solution

Apply a patch

Apply the appropriate patches or upgrade as specified in the Oracle
Critical Patch Update - April 2005. The update notes that some
Oracle patches are cumulative while others are not:

The Oracle Database Server, Enterprise Manager, and the Oracle
Application Server patches for this Critical Patch Update are
cumulative, and contain all the fixes from the previous Critical
Patch Update.
...

E-Business Suite patches are not cumulative, so E-Business Suite
customers should refer to previous Critical Patch Updates to
identify previous fixes they wish to apply.

Oracle Collaboration Suite patches are not cumulative, so Oracle
Collaboration Suite customers should refer to previous Critical
Patch Updates to identify previous fixes they wish to apply.

Workarounds

It may be possible to mitigate some vulnerabilities by disabling or
removing unnecessary components and restricting network access.
Revoking PUBLIC EXECUTE privileges from vulnerable stored
procedures may reduce the impact of SQL injection vulnerabilities
(VU#982109). For more specific workarounds please see the
individual Vulnerability Notes.

Oracle Critical Patch Update - April 2005 contains a workaround for a
vulnerability in PeopleSoft.


Appendix A. Vendor Information

Oracle

Please see Oracle Critical Patch Update - April 2005 and Critical
Patch Updates and Security Alerts.


Appendix B. References

* Critical Patch Update - April 2005 -
<http://www.oracle.com/technology/deploy/security/pdf/
cpuapr2005.pdf>

* Critical Patch Updates and Security Alerts -
<http://www.oracle.com/technology/deploy/security/alerts.htm>

* Map of Public Vulnerability to Advisory/Alert -
<http://www.oracle.com/technology/deploy/security/pdf/
public_vuln_to_advisory_mapping.html>

* Comments on Oracle Critical Patch Update April 2005 -
<http://www.red-database-security.com/wp/
comments_oracle_cpu_april_2005_us.pdf>

* NGSSoftware Oracle Database vulnerabilities -
<http://www.ngssoftware.com/advisories/oracle-03.txt>

* US-CERT Vulnerability Note VU#948486 -
<http://www.kb.cert.org/vuls/id/948486>

* US-CERT Vulnerability Note VU#982109 -
<http://www.kb.cert.org/vuls/id/982109>

_________________________________________________________________

Thanks to Alexander Kornbrust of Red-Database-Security GmbH.
Information used in this document came from Red-Database-Security and
Oracle. Oracle credits NGS Software Ltd., Integrigy, and Application
Security, Inc.
_________________________________________________________________

Feedback can be directed to the authors: Art Manion and Jeff Gennari.

Send mail to <cert@cert.org>.

Please include the Subject line "TA04-315A Feedback VU#948486".
_________________________________________________________________

Copyright 2005 Carnegie Mellon University.

Terms of use: <http://www.us-cert.gov/legal.html>
_________________________________________________________________

The most recent version of this document is available at:

<http://www.us-cert.gov/cas/techalerts/TA05-117A.html>
_________________________________________________________________


Revision History

April 27, 2005: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQm/pwhhoSezw4YfQAQIouwgAhowi2o6QI66xpWVcyKDckKfJSlUKMoLt
vSHpL0J6vHJDGyrnllbVqcUhsYi78IPmvkOiZ0RbvgBtm9TR+zxO13CyQ6wWPoTl
dItgw4BDw/f1bzLthb7+2GvCzXqsG+ICWZegEzX31ma7tO0yb1sdGEt9kwgL64ik
njwJ/Bn7pG2b1EFQ1zurIOsOcINdUrThgk0BqNmGfRxRnIF7XXdEQUIC2Q0jAz4a
Qxx6rttfnCJp6LmVMyqLFDItn9QyBMQTIfiOKaGNnmu7oyk8jdZq+HoORaeYqbC8
ectngIs+FPKXEACRaAKi/F932fkD2BX5dS/IF1VkYw7tWX6M2I39Dw==

[#] Wed Apr 27 2005 15:48:29 EDT from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-117 -- Summary of Security Items from April 20 through April 26, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary of Security Items from April 20 through April 26, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between April 20 through April
26, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-117.html>



For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQm/r/RhoSezw4YfQAQKx7gf/YA8g+f9uEVP4gMmMs6eH2Ryw7R+nioJJ
R6KLbVgVorH6WOHhwnq09/tnA8lCzZAwNHBy1dRi0lvWeMLAhHor0EQyiPcQvuPk
UTpMzytC5fi8/PFbLtT4YTcwEM50wSiXnjahHdibf+seTvyD5edpSMmWaYaTgs1/
3JYj/N739xhvmlEuSeDVUlUtMUdp6xu87DFZAbmsxFRoUzXzVXP8gSrzGDKGjymj
fIcUS3rsLxMQpBMgYQ5wZYIhX+nS5Cp3Kybfw4RuatR4Z0X23/bMA6Y8X7x1ntk2
kdJNReaHYJ0GsQH+MAX2/XxJq9xdzpg6+471+FR7pfgBLSxPcEfy1g==
=T1ND
-----END PGP SIGNATURE-----

[#] Wed May 04 2005 15:22:12 EDT from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-124 -- Summary of Security Items from April 27 through May 3, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary of Security Items from April 27 through May 3, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between April 27 through
May 3, 2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-124.html>



For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQnkgAhhoSezw4YfQAQJcZwf9HfyE3UPK95VXmnbU696fWZX52h2r4fhN
WvhjGZOIlkjQv+JxhxAfCpTIvy31GMKUppRegcW5rsPJM1Ycjk2UT8Mdp1Qy51DF
b4yLnDs33O3mAxQ4LuF2Sa6ekKs/ff462/gblDttKfznJoijAQUQvkTYaSpX69R4
mOnJC/v7CSsC2MS8D0RGl1r8uOolrzFfeP/4fCSpLWRWIGFljLeoUEuS8bLn4gcn
M3m5ZljnPRaY0p9Q/2ogcYT66mjz2+nDGsiTF7FwPIoQKtuaHERCpThPH3TxQkyA
Omjxg2h7eIwATCpV3xgZwZgjGqb1QJ6sTsCmQN9eHV2omOSPzM4Grw==
=inrN
-----END PGP SIGNATURE-----

[#] Wed May 11 2005 15:30:53 EDT from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-131 -- Summary of Security Items from May 4 through May 10, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary of Security Items from May 4 through May 10, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between May 4 through May 10,
2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-131.html>



For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQoJXXxhoSezw4YfQAQKmEQf/SI6W0KmYvkaJCl/zxH64ZlLzqWMIGsw7
N4tVwZqRmeYcAXzCtt4fRoiXVJ1uzT1kU8LWW4VzMzVfLXVNvmjSHBteYZHrrhVy
x1kn7cAZZT5rXSxuqZF/rxj+ySbmUgx9jChsqyj9IZ5F6bSXWdwuJVKBzcpvd+mx
uRsCg2JlUGU8yt6GNh3A7O+LbKE+DeR0FssRXyssPCUhEuJ4P51/tlZvrvLTj0TI
hvpRlc8bwN3Zid5lwqMywrUZJJM1HWqP7qp7kjxnLpMqImvOG+CHiBKttakPGiv3
vkIuCeoTd8HSm+V/tfWQ1H2YVw8T83P/8mi8APohK1txHCol8AlMBQ==
=7eAV
-----END PGP SIGNATURE-----

[#] Mon May 16 2005 15:33:35 EDT from "US-CERT Technical Alerts" <technical-alerts@us-cert.gov> to technical-alerts@us-cert.gov

Subject: US-CERT Technical Cyber Security Alert TA05-136A -- Apple Mac OS X is affected by multiple vulnerabilities

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Technical Cyber Security Alert TA05-136A
Apple Mac OS X is affected by multiple vulnerabilities

Original release date: May 16, 2005
Last revised: --
Source: US-CERT

Systems Affected

Mac OS X version 10.3.9 (Panther) and Mac OS X Server version 10.3.9

Overview

Apple has released Security Update 2005-005 to address multiple
vulnerabilities affecting Mac OS X and Mac OS X Server. The most
serious of these vulnerabilities may allow a remote attacker to
execute arbitrary code. Impacts of other vulnerabilities addressed by
the update include disclosure of information and denial of service.

I. Description

Apple Security Update 2005-005 resolves a number of vulnerabilities
affecting Mac OS X and OS X Server. Further details are available in
the following Vulnerability Notes:

VU#356070 - Apple Terminal fails to properly sanitize input for
x-man-page URI

Apple Terminal on Mac OS X fails to sanitize x-man-page URIs, allowing
a remote attacker to execute arbitrary commands.
(CAN-2005-1342)

VU#882750 - libXpm image library vulnerable to buffer overflow

libXpm image parsing code contains a buffer-overflow vulnerability
that may allow a remote attacker execute arbitrary code or cause a
denial-of-service condition.
(CAN-2004-0687)

VU#125598 - LibTIFF vulnerable to integer overflow via corrupted
directory entry count

An integer overflow in LibTIFF may allow a remote attacker to execute
arbitrary code.
(CAN-2004-1308)

VU#539110 - LibTIFF vulnerable to integer overflow in the
TIFFFetchStrip() routine

An integer overflow in LibTIFF may allow a remote attacker to execute
arbitrary code.
(CAN-2004-1307)

VU#537878 - libXpm library contains multiple integer overflow
vulnerabilities

libXpm contains multiple integer-overflow vulnerabilities that may
allow a remote attacker execute arbitrary code or cause a
denial-of-service condition.
(CAN-2004-0688)

VU#331694 - Apple Mac OS X chpass/chfn/chsh utilities do not properly
validate external programs

Mac OS X Directory Service utilities do not properly validate code
paths to external programs, potentially allowing a local attacker to
execute arbitrary code.
(CAN-2004-1335)

VU#582934 - Apple Mac OS X Foundation framework vulnerable to buffer
overflow via incorrect handling of an environmental variable

A buffer overflow in Mac OS X's Foundation Framework's processing of
environment variables may lead to elevated privileges.
(CAN-2004-1336)

VU#706838 - Apple Mac OS X vulnerable to buffer overflow via vpnd
daemon

Apple Mac OS X contains a buffer overflow in vpnd that could allow a
local, authenticated attacker to execute arbitrary code with root
privileges.
(CAN-2004-1343)

VU#258390 - Apple Mac OS X with Bluetooth enabled may allow file
exchange without prompting users

Apple Mac OS X with Bluetooth support may unintentionally allow files
to be exchanged with other systems by default.
(CAN-2004-1332)

VU#354486 - Apple Mac OS X Server Netinfo Setup Tool fails to validate
command line parameters

Apple Mac OS X Server NeST tool contains a vulnerability in the
processing of command line arguments that could allow a local attacker
to execute arbitrary code.
(CAN-2004-0594)

Please note that Apple Security Update 2005-005 addresses additional
vulnerabilities not described above. As further information becomes
available, we will publish individual Vulnerability Notes.

II. Impact

The impacts of these vulnerabilities vary, for information about
specific impacts please see the Vulnerability Notes. Potential
consequences include remote execution of arbitrary code or commands,
disclosure of sensitive information, and denial of service.

III. Solution

Install an Update

Install the update as described in Apple Security Update 2005-005.

Appendix A. References

* US-CERT Vulnerability Note VU#582934 -
<http://www.kb.cert.org/vuls/id/582934>

* US-CERT Vulnerability Note VU#258390 -
<http://www.kb.cert.org/vuls/id/258390>

* US-CERT Vulnerability Note VU#331694 -
<http://www.kb.cert.org/vuls/id/331694>

* US-CERT Vulnerability Note VU#706838 -
<http://www.kb.cert.org/vuls/id/706838>

* US-CERT Vulnerability Note VU#539110 -
<http://www.kb.cert.org/vuls/id/539110>

* US-CERT Vulnerability Note VU#354486 -
<http://www.kb.cert.org/vuls/id/354486>

* US-CERT Vulnerability Note VU#882750 -
<http://www.kb.cert.org/vuls/id/882750>

* US-CERT Vulnerability Note VU#537878 -
<http://www.kb.cert.org/vuls/id/537878>

* US-CERT Vulnerability Note VU#125598 -
<http://www.kb.cert.org/vuls/id/125598>

* US-CERT Vulnerability Note VU#356070 -
<http://www.kb.cert.org/vuls/id/356070>

* Apple Security Update 2005-005 -
<http://docs.info.apple.com/article.html?artnum=301528>
_________________________________________________________________

These vulnerabilities were discovered by several people and reported
in Apple Security Update 2005-005. Please see the Vulnerability Notes
for individual reporter acknowledgements.
_________________________________________________________________

Feedback can be directed to the authors: Jeffrey Gennari and Jason
Rafail.
_________________________________________________________________

Copyright 2005 Carnegie Mellon University. Terms of use

Revision History

May 16, 2005: Initial release
Last updated May 16, 2005
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQojwRBhoSezw4YfQAQKb1gf/a7XQAZQR+t5+FpzRoUrJyVIg3Mf1IISP
yS5GLgfwC+4GuDEd/BA51+591OhNAWa1hO2JAUQwJ799VL7vAY6vbDW84c+S0eQ+
J+FHgddUsuvRtmsXCg2Fin1JRG4hCqBQ9q2S0h4+fM7yWSdLOY7xeAAwPOwG+bsU
AVjDMNiPACHxw7CNQ8qpPXFfo3qrV+oj55F62TbR0fujtil6yQR3lE9wSeiuLs/i
KgQFZlHMEoAwQnghwLk7eQLkzGD9eAZ+pZ7Ny0AvF7avhGflh2nFNe2acFoJ2Iw7
/gMXj/uN/ZpDssS37y38LIvyA3kIQrSlEW7iKf1wi2eQ3ntjyv/9NA==
=uqBU
-----END PGP SIGNATURE-----

[#] Mon May 16 2005 15:35:06 EDT from "CERT Advisory" <cert-advisory@cert.org> to cert-advisory@cert.org

Subject: US-CERT Technical Cyber Security Alert TA05-136A -- Apple Mac OS X is affected by multiple vulnerabilities

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Technical Cyber Security Alert TA05-136A
Apple Mac OS X is affected by multiple vulnerabilities

Original release date: May 16, 2005
Last revised: --
Source: US-CERT

Systems Affected

Mac OS X version 10.3.9 (Panther) and Mac OS X Server version 10.3.9

Overview

Apple has released Security Update 2005-005 to address multiple
vulnerabilities affecting Mac OS X and Mac OS X Server. The most
serious of these vulnerabilities may allow a remote attacker to
execute arbitrary code. Impacts of other vulnerabilities addressed by
the update include disclosure of information and denial of service.

I. Description

Apple Security Update 2005-005 resolves a number of vulnerabilities
affecting Mac OS X and OS X Server. Further details are available in
the following Vulnerability Notes:

VU#356070 - Apple Terminal fails to properly sanitize input for
x-man-page URI

Apple Terminal on Mac OS X fails to sanitize x-man-page URIs, allowing
a remote attacker to execute arbitrary commands.
(CAN-2005-1342)

VU#882750 - libXpm image library vulnerable to buffer overflow

libXpm image parsing code contains a buffer-overflow vulnerability
that may allow a remote attacker execute arbitrary code or cause a
denial-of-service condition.
(CAN-2004-0687)

VU#125598 - LibTIFF vulnerable to integer overflow via corrupted
directory entry count

An integer overflow in LibTIFF may allow a remote attacker to execute
arbitrary code.
(CAN-2004-1308)

VU#539110 - LibTIFF vulnerable to integer overflow in the
TIFFFetchStrip() routine

An integer overflow in LibTIFF may allow a remote attacker to execute
arbitrary code.
(CAN-2004-1307)

VU#537878 - libXpm library contains multiple integer overflow
vulnerabilities

libXpm contains multiple integer-overflow vulnerabilities that may
allow a remote attacker execute arbitrary code or cause a
denial-of-service condition.
(CAN-2004-0688)

VU#331694 - Apple Mac OS X chpass/chfn/chsh utilities do not properly
validate external programs

Mac OS X Directory Service utilities do not properly validate code
paths to external programs, potentially allowing a local attacker to
execute arbitrary code.
(CAN-2004-1335)

VU#582934 - Apple Mac OS X Foundation framework vulnerable to buffer
overflow via incorrect handling of an environmental variable

A buffer overflow in Mac OS X's Foundation Framework's processing of
environment variables may lead to elevated privileges.
(CAN-2004-1336)

VU#706838 - Apple Mac OS X vulnerable to buffer overflow via vpnd
daemon

Apple Mac OS X contains a buffer overflow in vpnd that could allow a
local, authenticated attacker to execute arbitrary code with root
privileges.
(CAN-2004-1343)

VU#258390 - Apple Mac OS X with Bluetooth enabled may allow file
exchange without prompting users

Apple Mac OS X with Bluetooth support may unintentionally allow files
to be exchanged with other systems by default.
(CAN-2004-1332)

VU#354486 - Apple Mac OS X Server Netinfo Setup Tool fails to validate
command line parameters

Apple Mac OS X Server NeST tool contains a vulnerability in the
processing of command line arguments that could allow a local attacker
to execute arbitrary code.
(CAN-2004-0594)

Please note that Apple Security Update 2005-005 addresses additional
vulnerabilities not described above. As further information becomes
available, we will publish individual Vulnerability Notes.

II. Impact

The impacts of these vulnerabilities vary, for information about
specific impacts please see the Vulnerability Notes. Potential
consequences include remote execution of arbitrary code or commands,
disclosure of sensitive information, and denial of service.

III. Solution

Install an Update

Install the update as described in Apple Security Update 2005-005.

Appendix A. References

* US-CERT Vulnerability Note VU#582934 -
<http://www.kb.cert.org/vuls/id/582934>

* US-CERT Vulnerability Note VU#258390 -
<http://www.kb.cert.org/vuls/id/258390>

* US-CERT Vulnerability Note VU#331694 -
<http://www.kb.cert.org/vuls/id/331694>

* US-CERT Vulnerability Note VU#706838 -
<http://www.kb.cert.org/vuls/id/706838>

* US-CERT Vulnerability Note VU#539110 -
<http://www.kb.cert.org/vuls/id/539110>

* US-CERT Vulnerability Note VU#354486 -
<http://www.kb.cert.org/vuls/id/354486>

* US-CERT Vulnerability Note VU#882750 -
<http://www.kb.cert.org/vuls/id/882750>

* US-CERT Vulnerability Note VU#537878 -
<http://www.kb.cert.org/vuls/id/537878>

* US-CERT Vulnerability Note VU#125598 -
<http://www.kb.cert.org/vuls/id/125598>

* US-CERT Vulnerability Note VU#356070 -
<http://www.kb.cert.org/vuls/id/356070>

* Apple Security Update 2005-005 -
<http://docs.info.apple.com/article.html?artnum=301528>
_________________________________________________________________

These vulnerabilities were discovered by several people and reported
in Apple Security Update 2005-005. Please see the Vulnerability Notes
for individual reporter acknowledgements.
_________________________________________________________________

Feedback can be directed to the authors: Jeffrey Gennari and Jason
Rafail.
_________________________________________________________________

Copyright 2005 Carnegie Mellon University. Terms of use

Revision History

May 16, 2005: Initial release
Last updated May 16, 2005
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQojwRBhoSezw4YfQAQKb1gf/a7XQAZQR+t5+FpzRoUrJyVIg3Mf1IISP
yS5GLgfwC+4GuDEd/BA51+591OhNAWa1hO2JAUQwJ799VL7vAY6vbDW84c+S0eQ+
J+FHgddUsuvRtmsXCg2Fin1JRG4hCqBQ9q2S0h4+fM7yWSdLOY7xeAAwPOwG+bsU
AVjDMNiPACHxw7CNQ8qpPXFfo3qrV+oj55F62TbR0fujtil6yQR3lE9wSeiuLs/i
KgQFZlHMEoAwQnghwLk7eQLkzGD9eAZ+pZ7Ny0AvF7avhGflh2nFNe2acFoJ2Iw7
/gMXj/uN/ZpDssS37y38LIvyA3kIQrSlEW7iKf1wi2eQ3ntjyv/9NA==
=uqBU
-----END PGP SIGNATURE-----

[#] Wed May 18 2005 15:39:47 EDT from "US-CERT Security Bulletins" <security-bulletins@us-cert.gov> to security-bulletins@us-cert.gov

Subject: US-CERT Cyber Security Bulletin SB05-138 -- Summary of Security Items from May 11 through May 17, 2005

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Summary of Security Items from May 11 through May 17, 2005

This bulletin provides a summary of new or updated vulnerabilities,
exploits, trends, viruses, and trojans between May 11 and May 17,
2005, and is available here:

<http://www.us-cert.gov/cas/bulletins/SB05-138.html>



For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEUAwUBQouZORhoSezw4YfQAQLbGwf3VH9zZ5jmo6mQGUmYCu6p7nxRv5KyYqTA
16xsvh4dLMNEL+WKFVEiCrTm+5/yt+OGRPo3iyMf7FJgNLgqT97A/xhi3R/Hq6+L
y6aMxGzovvqnW7feU1/C9l1TN8jPUUaz7+XIPjD5S8nZgzQu3bemMCZHnLbqVPjh
ssFoy+93nFS1DL7reWWkQWSI+MtRmyae9o1WYIL4tEhfY8EoHee+b2lE7bX9JGKT
iJq6UAZ7/B5Jy5ELDxMxbWlrSDhlHmCF2+Sl/TuRzKY+O8ySZkOpK1q0OPv5cw5g
VwNE1+xObT0Qswmlg0zktIm/lYlmkn1nVbN3r4Akx4rMh0TTy27p
=/NiV
-----END PGP SIGNATURE-----

[#] Tue Jun 14 2005 20:21:08 EDT from "US-CERT Technical Alerts" <technical-alerts@us-cert.gov> to technical-alerts@us-cert.gov

Subject: US-CERT Technical Cyber Security Alert TA05-165A -- Microsoft Windows and Internet Explorer Vulnerabilities

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Technical Cyber Security Alert TA05-165A
Microsoft Windows and Internet Explorer Vulnerabilities

Original release date: June 14, 2005
Last revised: --
Source: US-CERT

Systems Affected

* Microsoft Windows
* Microsoft Internet Explorer

For more complete information, refer to the Microsoft Security
Bulletin Summary for June, 2005.

Overview

Microsoft has released updates that address critical vulnerabilities
in Windows and Internet Explorer. Exploitation of these
vulnerabilities could allow a remote, unauthenticated attacker to
execute arbitrary code or cause a denial of service.

I. Description

Microsoft Security Bulletins for June, 2005 address a number of
vulnerabilities in Windows, Internet Explorer, Outlook Express,
Outlook Web Access, ISA Server, the Step-by-Step Interactive Training
engine, and telnet. Further information about the more serious
vulnerabilities is available in the following Vulnerability Notes:

VU#189754 - Microsoft Internet Explorer buffer overflow in PNG image
rendering component

A buffer overflow in the PNG image rendering component of Microsoft
Internet Explorer may allow a remote attacker to execute code on a
vulnerable system.
(CAN-2005-1211)

VU#489397 - Microsoft Server Message Block vulnerable to buffer
overflow

Microsoft Server Message Block (SMB) is vulnerable to a buffer
handling flaw when processing incoming SMB packets that may lead to
remote code execution.
(CAN-2005-1206)

VU#851869 - Microsoft HTML Help input validation error

Microsoft HTML Help fails to properly validate input data, allowing a
remote attacker to execute arbitrary code.
(CAN-2005-1208)

II. Impact

Exploitation of the most serious of these vulnerabilities could allow
a remote, unauthenticated attacker to execute arbitrary code with
SYSTEM privileges. This would allow an attacker to take complete
control of a vulnerable system. An attacker could also execute
arbitrary code with user privileges, or cause a denial of service.

III. Solution

Apply updates

Microsoft has provided the patches for these vulnerabilities in the
Security Bulletins and on Windows Update.

Workarounds

Please see the individual vulnerability notes for workarounds.

Appendix A. References

* Microsoft Security Bulletin Summary for June, 2005 -
<http://www.microsoft.com/technet/security/bulletin/ms05-jun.mspx>

* US-CERT Vulnerability Note VU#189754 -
<http://www.kb.cert.org/vuls/id/189754>

* US-CERT Vulnerability Note VU#489397 -
<http://www.kb.cert.org/vuls/id/489397>

* US-CERT Vulnerability Note VU#851869 -
<http://www.kb.cert.org/vuls/id/851869>

* CAN-2005-1211 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1222>

* CAN-2005-1206 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1206>

* CAN-2005-1208 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1208>

* Microsoft Windows Update - <http://windowsupdate.microsoft.com/>
_________________________________________________________________

Feedback can be directed to the US-CERT Technical Staff
_________________________________________________________________

Revision History

June 14, 2005: Initial release
_________________________________________________________________

This document is available from:

<http://www.us-cert.gov/cas/techalerts/TA05-165A.html>

Produced 2005 by US-CERT, a government organization.

Terms of use

<http://www.us-cert.gov/legal.html>


For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQq9ymBhoSezw4YfQAQKK/AgAgA+TNjR3BwQXMLkf56jTFQdMprSELPAP
DaVkL2LeFT13v/z2QHiQMMA5SJT8nOxHlIm1mxhOo1jmTLU3Rjj4tRDaIMI2Q/2I
y/m02Xt0DeR13TcVISxWo2dKEvZ6rh0HOEpL/OS3SAUH2lWRUgUhaAG4Tag5afWd
Ts6bcTplXhPqVYY9u/QFxGs1hrr5ntsFqxaZz02HQVgaVYqimH8WgkXURO/VPqA9
f7LUa3elNkIK15vmE3yTHPnWV4Dq5rfUq2G6aFXSD9KxZPqACCAcH7K+6KEgU5z9
dYzKcGrEDHn2/2es2UhzGvJcDx1JiNG5pH7mGMm0b2lp+jZ47j6z7g==
=BD3k
-----END PGP SIGNATURE-----

[#] Wed Jun 29 2005 15:01:45 EDT from "US-CERT Technical Alerts" <technical-alerts@us-cert.gov> to technical-alerts@us-cert.gov

Subject: US-CERT Technical Cyber Security Alert TA05-180A -- VERITAS Backup Exec Software is actively being exploited

[Reply] [ReplyQuoted] [Headers] [Print]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA05-180A archive



VERITAS Backup Exec Software is actively being exploited

Original release date: June 29, 2005
Last revised: --
Source: US-CERT

Systems Affected

VERITAS Backup Exec Remote Agent

Overview

The VERITAS Backup Exec Remote Agent for Windows contains a buffer
overflow that may allow an unauthenticated, remote attacker to
compromise a system and execute arbitrary code with administrative
privileges.

I. Description

VERITAS Backup Exec is a data backup and recovery solution with
support for network-based backups. The VERITAS Backup Exec Remote
Agent is installed on systems that are to be backed up. It listens on
TCP port 10000 for messages indicating that a backup should occur.

The remote agent software fails to properly validate incoming packets,
which allows a buffer overflow to occur. Specially crafted
authentication messages can be used to trigger the buffer overflow,
making it possible for an unauthenticated attacker to exploit this
vulnerability.

Exploit code for this vulnerability is publicly available. In
addition, we have received credible reports that this vulnerability is
being actively exploited to execute arbitrary code with Local System
privileges. We have also seen increased scanning activity on port
10000/tcp. This increase is believed to be attempts to locate
vulnerable systems running the VERITAS Backup Exec Remote Agent.

US-CERT is tracking this issue in the following vulnerability note:

* VU#492105 - VERITAS Backup Exec Remote Agent fails to properly
validate authentication requests. This issue is also identified
as VERITAS Security Advisory VX05-002 and CAN-2005-0773.

In addition, US-CERT is investigating other, potentially serious
vulnerabilities in VERITAS backup software:

* VU#352625 - VERITAS Backup Exec Server Service contains a buffer
overflow vulnerability. This issue is also identified as VERITAS
Security Advisory VX05-006.

* VU#584505 - VERITAS Backup Exec remote access validation
vulnerability. This issue is also identified as VERITAS
Security Advisory VX05-003.

II. Impact

A remote, unauthenticated attacker may be able to execute arbitrary
code with administrative privileges on a vulnerable system.

III. Solution

Apply a patch

VERITAS has issued patches for each vulnerable version of Backup Exec
Remote Agent. Information about these patches can be found in the
VERITAS Patch summary for Security Advisories VX05-001, VX05-002,
VX05-003, VX05-005, VX05-006, VX05-007.

Restrict access

US-CERT recommends taking the following actions to reduce the chances
of exploitation:

* Use firewalls to limit connectivity so that only the backup
server(s) can connect to the systems being backed up. The standard
port for this service is port 10000/tcp.

* At a minimum, implement some basic protection at the network
perimeter. When developing rules for network traffic filters,
realize that individual installations may operate on non-standard
ports.

Appendix A. References

* US-CERT Vulnerability Note VU#492105 -
<http://www.kb.cert.org/vuls/id/492105>

* US-CERT Vulnerability Note VU#352625 -
<http://www.kb.cert.org/vuls/id/352625>

* US-CERT Vulnerability Note VU#584505 -
<http://www.kb.cert.org/vuls/id/584505>

* VERITAS Software Security Advisory VX05-002 -
<http://seer.support.veritas.com/docs/276604.htm>

* VERITAS Software Security Advisory VX05-006 -
<http://seer.support.veritas.com/docs/276607.htm>

* VERITAS Software Security Advisory VX05-003 -
<http://seer.support.veritas.com/docs/276605.htm>

* VERITAS Software Security Announcement -
<http://seer.support.veritas.com/docs/277428.htm>

* iDefense security advisory -
<http://www.idefense.com/application/poi/display?id=272&type=vulne
rabilities>
_________________________________________________________________

These vulnerabilities were reported by VERITAS Software. VERITAS
credits iDefense with supplying information regarding VU#492105 and
VU#584505. VERITAS credits NGSSoftware Research Team with supplying
information regarding VU#352625.
_________________________________________________________________

Feedback can be directed to the authors: US-CERT Technical Staff
_________________________________________________________________

Revision History

Jun 29, 2005: Initial release
_________________________________________________________________

This document is available from:

<http://www.us-cert.gov/cas/techalerts/TA05-180A.html>

Produced 2005 by US-CERT, a government organization.

Terms of use

<http://www.us-cert.gov/legal.html>


For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQsLs9BhoSezw4YfQAQLQaAf/X7XHXphDIe1ImdN1f/ap5y4YXTvMVnPk
VDed43Bk3HLGEKWP2gPReWGGTEzs3u8CiO4yJO879ksV2lQgJUNgLy5U21ltw4Nh
A2uZM90OpeCgirS8jSmhReqrHM89LqhDgbiNMpStJmQO3c2ClBpJ3skbO53/VT7L
Uowoz1XHwqMOSsaPVS4gsz+5NTJS2HNkXZuuLRbE3qexigWa6/CPJ9JINtgcQH65
O41V/fcs5gjvaHSB7H8a9gaSPewIwPnEqpFpA6w8hLiZ0erH0Ti1Ggj6mykDAESp
+OAyJk/MvAtQq1oXHpca9xaHqCMZd+Yus+/KQOkO5qCRGC+YtT3Kyw==
=VMlW
-----END PGP SIGNATURE-----

Go to page: 1 2 3 4 5 [6] 7 8 9 10 ... Last