[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-Disclosure] SecurityLab.Ru Report: The Top 10 Most Critical Vulnerabilities in May 2004
From:       "Alexander" <pk95 () yandex ! ru>
Date:       2004-05-30 7:59:17
Message-ID: 200405300759.i4U7xGv00759 () netsys ! com
[Download RAW message or body]

SecurityLab.Ru Report: The Top 10 <http://www.securitylab.ru/45523.html>
Most Critical Vulnerabilities in May 2004

1.	Exim Header Syntax Checking Remote Stack Buffer Overrun
Vulnerability, Bugtraq ID 10291,  <http://www.securitylab.ru/45107.html>
http://www.securitylab.ru/45107.html.
2.	Multiple Vulnerabilities in Apple Mac OS X, Bugtraq ID 10271, 10268,
10270. http://www.securitylab.ru/45032.html.
3.	Check Point VPN-1 ISAKMP Remote Buffer Overflow Vulnerability,
Bugtraq ID 10273,  <http://www.securitylab.ru/45048.html>
http://www.securitylab.ru/45048.html.
4.	Apache Mod_SSL SSL_Util_UUEncode_Binary Stack Buffer Overflow
Vulnerability, Bugtraq ID 10355,  <http://www.securitylab.ru/45504.html>
http://www.securitylab.ru/45504.html.
5.	Microsoft Windows HSC DVD Driver Upgrade Code Execution
Vulnerability, Bugtraq ID 10321,  <http://www.securitylab.ru/45165.html>
http://www.securitylab.ru/45165.html.
6.	CVS Malformed Entry Modified and Unchanged Flag Insertion Heap
Overflow Vulnerability, Bugtraq ID 10384,
<http://www.securitylab.ru/45305.html> http://www.securitylab.ru/45305.html.
7.	DeleGate SSLway Filter Remote Stack Based Buffer Overflow
Vulnerability, Bugtraq ID 10295,  <http://www.securitylab.ru/45108.html>
http://www.securitylab.ru/45108.html.
8.	WildTangent WebDriver Remote Filename Buffer Overflow Vulnerability,
Bugtraq ID 10421,  <http://www.securitylab.ru/45505.html>
http://www.securitylab.ru/45505.html
9.	Subversion Date Parsing Function Buffer Overflow Vulnerability,
Bugtraq ID 10386,  <http://www.securitylab.ru/45306.html>
http://www.securitylab.ru/45306.html
10.	MailEnable Mail Server HTTPMail Remote Heap Overflow Vulnerability,
Bugtraq ID 10312,  <http://www.securitylab.ru/45156.html>
http://www.securitylab.ru/45156.html

 


[Attachment #3 (text/html)]

<html xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:st1="urn:schemas-microsoft-com:office:smarttags" xmlns="http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
 name="PostalCode"/>
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
 name="City"/>
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
 name="place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:595.3pt 841.9pt;
	margin:2.0cm 69.6pt 2.0cm 69.6pt;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:966399836;
	mso-list-template-ids:-671551976;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style>

</head>

<body lang=RU link=blue vlink=purple>

<div class=Section1>

<p class=MsoPlainText><b><font size=2 face=Arial><span lang=EN-US
style='font-size:10.0pt;font-family:Arial;font-weight:bold'><a
href="http://www.securitylab.ru/45523.html">SecurityLab.Ru Report: The Top 10
Most Critical Vulnerabilities in May 2004</a></span></font></b><span
lang=EN-US><o:p></o:p></span></p>

<ol start=1 type=1>
 <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
     mso-list:l0 level1 lfo1'><font size=3 face="Times New Roman"><span
     lang=EN-US style='font-size:12.0pt'>Exim Header Syntax Checking Remote
     Stack Buffer Overrun Vulnerability, Bugtraq ID 10291, </span><a
     href="http://www.securitylab.ru/45107.html"><span \
lang=EN-US>http://www.securitylab.ru/45107.html</span></a></font><span  \
lang=EN-US>.<o:p></o:p></span></li>  <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;  mso-list:l0 level1 lfo1'><font \
                size=3 face="Times New Roman"><span
     lang=EN-US style='font-size:12.0pt'>Multiple Vulnerabilities in Apple Mac
     OS X, Bugtraq <st1:place w:st="on"><st1:City w:st="on">ID</st1:City> <st1:PostalCode
      w:st="on">10271</st1:PostalCode>, <st1:PostalCode w:st="on">10268</st1:PostalCode>,
      <st1:PostalCode w:st="on">10270</st1:PostalCode></st1:place>. </span><a
     href="http://www.securitylab.ru/45032.html">http://www.securitylab.ru/45032.html</a>.<o:p></o:p></font></li>
  <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
     mso-list:l0 level1 lfo1'><font size=3 face="Times New Roman"><span
     lang=EN-US style='font-size:12.0pt'>Check Point VPN-1 ISAKMP Remote Buffer
     Overflow Vulnerability, Bugtraq ID 10273, </span><a
     href="http://www.securitylab.ru/45048.html"><span \
lang=EN-US>http://www.securitylab.ru/45048.html</span></a></font><span  \
lang=EN-US>.<o:p></o:p></span></li>  <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;  mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span  lang=EN-US style='font-size:12.0pt'>Apache Mod_SSL
     SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability, Bugtraq ID
     10355, </span><a href="http://www.securitylab.ru/45504.html"><span
     lang=EN-US>http://www.securitylab.ru/45504.html</span></a></font><span
     lang=EN-US>.<o:p></o:p></span></li>
 <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
     mso-list:l0 level1 lfo1'><font size=3 face="Times New Roman"><span
     lang=EN-US style='font-size:12.0pt'>Microsoft Windows HSC DVD Driver Upgrade
     Code Execution Vulnerability, Bugtraq ID 10321, </span><a
     href="http://www.securitylab.ru/45165.html"><span \
lang=EN-US>http://www.securitylab.ru/45165.html</span></a></font><span  \
lang=EN-US>.<o:p></o:p></span></li>  <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;  mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span  lang=EN-US style='font-size:12.0pt'>CVS Malformed Entry \
                Modified and
     Unchanged Flag Insertion Heap Overflow Vulnerability, Bugtraq ID 10384, </span><a
     href="http://www.securitylab.ru/45305.html"><span \
lang=EN-US>http://www.securitylab.ru/45305.html</span></a></font><span  \
lang=EN-US>.<o:p></o:p></span></li>  <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;  mso-list:l0 level1 lfo1'><font \
                size=3 face="Times New Roman"><span
     lang=EN-US style='font-size:12.0pt'>DeleGate SSLway Filter Remote Stack
     Based Buffer Overflow Vulnerability, Bugtraq ID 10295, </span><a
     href="http://www.securitylab.ru/45108.html"><span \
lang=EN-US>http://www.securitylab.ru/45108.html</span></a></font><span  \
lang=EN-US>.<o:p></o:p></span></li>  <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;  mso-list:l0 level1 lfo1'><font \
                size=3 face="Times New Roman"><span
     lang=EN-US style='font-size:12.0pt'>WildTangent WebDriver Remote Filename
     Buffer Overflow Vulnerability, Bugtraq ID 10421, </span><a
     href="http://www.securitylab.ru/45505.html"><span \
lang=EN-US>http://www.securitylab.ru/45505.html</span></a></font><span  \
lang=EN-US><o:p></o:p></span></li>  <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;  mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span  lang=EN-US style='font-size:12.0pt'>Subversion Date \
Parsing Function  Buffer Overflow Vulnerability, Bugtraq ID 10386, </span><a
     href="http://www.securitylab.ru/45306.html"><span \
lang=EN-US>http://www.securitylab.ru/45306.html</span></a></font><span  \
lang=EN-US><o:p></o:p></span></li>  <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;  mso-list:l0 level1 lfo1'><font \
                size=3 face="Times New Roman"><span
     lang=EN-US style='font-size:12.0pt'>MailEnable Mail Server HTTPMail Remote
     Heap Overflow Vulnerability, Bugtraq ID 10312, </span><a
     href="http://www.securitylab.ru/45156.html"><span \
lang=EN-US>http://www.securitylab.ru/45156.html</span></a></font><span  \
lang=EN-US><o:p></o:p></span></li> </ol>

<p class=MsoPlainText><font size=2 face="Courier New"><span lang=EN-US
style='font-size:10.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

</body>

</html>


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic