Security Advisories Week: 30 May - 6 June 2002
by Berislav Kucan
Title: Imap server buffer overflow
Date: May 30 2002
Vendor: Mandrake
Vulnerable systems: Mandrake Linux 7.1, 7.2, 8.1, 8.2, Corporate Server 1.0.1
Full advisory: http://www.net-security.org/advisory.php?id=731
Problem description: A buffer overflow was discovered in the imap server that could allow a malicious user to run code on the server with the uid and gid of the email owner by constructing a malformed request that would trigger the buffer overflow.



Title: Ftpd allows data connection hijacking via PASV mode
Date: May 30 2002
Vendor: Caldera
Vulnerable systems: Open UNIX 8.0.0 UnixWare 7.1.1
Full advisory: http://www.net-security.org/advisory.php?id=732
Problem description: If an attacker can make a connection to the listening port before the client connects, the server will transmit the data to the attacker instead of the client.



Title: Updated tcpdump packages fix buffer overflow
Date: May 30 2002
Vendor: Red Hat
Vulnerable systems: Red Hat Linux 6.2 and 7.x
Full advisory: http://www.net-security.org/advisory.php?id=734
Problem description: tcpdump is a command-line tool for monitoring network traffic. Versions of tcpdump up to and including 3.6.2 have a buffer overflow that can be triggered when tracing the network by a bad NFS packet.



Title: in.uucpd string truncation problem
Date: May 30 2002
Vendor: Debian
Vulnerable systems: Debian GNU/Linux 2.2
Full advisory: http://www.net-security.org/advisory.php?id=735
Problem description: in.uucpd, an authentication agent in the uucp package, does not properly terminate certain long input strings.



Title: Memory allocation error in ethereal
Date: May 30 2002
Vendor: Debian
Vulnerable systems: Debian GNU/Linux 2.2
Full advisory: http://www.net-security.org/advisory.php?id=736
Problem description: Ethereal versions prior to 0.9.3 were vulnerable to an allocation error in the ASN.1 parser. This can be triggered when analyzing traffic using the SNMP, LDAP, COPS, or Kerberos protocols in ethereal.



Title: Directory Administrator password in cleartext
Date: June 3 2002
Vendor: Caldera
Vulnerable systems: Volution Manager 1.1 Standard
Full advisory: http://www.net-security.org/advisory.php?id=737
Problem description: Volution Manager stores the unencrypted Directory Administrator's password in the /etc/ldap/slapd.conf file.



Title: Malformed Mail Attribute can Cause Exchange 2000 to Exhaust CPU Resources
Date: June 4 2002
Vendor: Microsoft
Vulnerable systems: Microsoft Exchange
Full advisory: http://www.net-security.org/advisory.php?id=738
Problem description: There is a flaw in the way Exchange 2000 handles certain malformed RFC message attributes on received mail. Upon receiving a message containing such a malformation, the flaw causes the Store service to consume 100% of the available CPU in processing the message.

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //