[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-Disclosure] SecurityLab.Ru Report: The Top 10 Most Critical Vulnerabilities in May 2004
From: "Alexander" <pk95 () yandex ! ru>
Date: 2004-05-30 7:59:17
Message-ID: 200405300759.i4U7xGv00759 () netsys ! com
[Download RAW message or body]
SecurityLab.Ru Report: The Top 10 <http://www.securitylab.ru/45523.html>
Most Critical Vulnerabilities in May 2004
1. Exim Header Syntax Checking Remote Stack Buffer Overrun
Vulnerability, Bugtraq ID 10291, <http://www.securitylab.ru/45107.html>
http://www.securitylab.ru/45107.html.
2. Multiple Vulnerabilities in Apple Mac OS X, Bugtraq ID 10271, 10268,
10270. http://www.securitylab.ru/45032.html.
3. Check Point VPN-1 ISAKMP Remote Buffer Overflow Vulnerability,
Bugtraq ID 10273, <http://www.securitylab.ru/45048.html>
http://www.securitylab.ru/45048.html.
4. Apache Mod_SSL SSL_Util_UUEncode_Binary Stack Buffer Overflow
Vulnerability, Bugtraq ID 10355, <http://www.securitylab.ru/45504.html>
http://www.securitylab.ru/45504.html.
5. Microsoft Windows HSC DVD Driver Upgrade Code Execution
Vulnerability, Bugtraq ID 10321, <http://www.securitylab.ru/45165.html>
http://www.securitylab.ru/45165.html.
6. CVS Malformed Entry Modified and Unchanged Flag Insertion Heap
Overflow Vulnerability, Bugtraq ID 10384,
<http://www.securitylab.ru/45305.html> http://www.securitylab.ru/45305.html.
7. DeleGate SSLway Filter Remote Stack Based Buffer Overflow
Vulnerability, Bugtraq ID 10295, <http://www.securitylab.ru/45108.html>
http://www.securitylab.ru/45108.html.
8. WildTangent WebDriver Remote Filename Buffer Overflow Vulnerability,
Bugtraq ID 10421, <http://www.securitylab.ru/45505.html>
http://www.securitylab.ru/45505.html
9. Subversion Date Parsing Function Buffer Overflow Vulnerability,
Bugtraq ID 10386, <http://www.securitylab.ru/45306.html>
http://www.securitylab.ru/45306.html
10. MailEnable Mail Server HTTPMail Remote Heap Overflow Vulnerability,
Bugtraq ID 10312, <http://www.securitylab.ru/45156.html>
http://www.securitylab.ru/45156.html
[Attachment #3 (text/html)]
<html xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:st1="urn:schemas-microsoft-com:office:smarttags" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
name="PostalCode"/>
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
name="City"/>
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
name="place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman";}
a:link, span.MsoHyperlink
{color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{color:purple;
text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
{margin:0cm;
margin-bottom:.0001pt;
font-size:10.0pt;
font-family:"Courier New";}
span.EmailStyle17
{mso-style-type:personal;
font-family:Arial;
color:windowtext;}
@page Section1
{size:595.3pt 841.9pt;
margin:2.0cm 69.6pt 2.0cm 69.6pt;}
div.Section1
{page:Section1;}
/* List Definitions */
@list l0
{mso-list-id:966399836;
mso-list-template-ids:-671551976;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
-->
</style>
</head>
<body lang=RU link=blue vlink=purple>
<div class=Section1>
<p class=MsoPlainText><b><font size=2 face=Arial><span lang=EN-US
style='font-size:10.0pt;font-family:Arial;font-weight:bold'><a
href="http://www.securitylab.ru/45523.html">SecurityLab.Ru Report: The Top 10
Most Critical Vulnerabilities in May 2004</a></span></font></b><span
lang=EN-US><o:p></o:p></span></p>
<ol start=1 type=1>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><font size=3 face="Times New Roman"><span
lang=EN-US style='font-size:12.0pt'>Exim Header Syntax Checking Remote
Stack Buffer Overrun Vulnerability, Bugtraq ID 10291, </span><a
href="http://www.securitylab.ru/45107.html"><span \
lang=EN-US>http://www.securitylab.ru/45107.html</span></a></font><span \
lang=EN-US>.<o:p></o:p></span></li> <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span
lang=EN-US style='font-size:12.0pt'>Multiple Vulnerabilities in Apple Mac
OS X, Bugtraq <st1:place w:st="on"><st1:City w:st="on">ID</st1:City> <st1:PostalCode
w:st="on">10271</st1:PostalCode>, <st1:PostalCode w:st="on">10268</st1:PostalCode>,
<st1:PostalCode w:st="on">10270</st1:PostalCode></st1:place>. </span><a
href="http://www.securitylab.ru/45032.html">http://www.securitylab.ru/45032.html</a>.<o:p></o:p></font></li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><font size=3 face="Times New Roman"><span
lang=EN-US style='font-size:12.0pt'>Check Point VPN-1 ISAKMP Remote Buffer
Overflow Vulnerability, Bugtraq ID 10273, </span><a
href="http://www.securitylab.ru/45048.html"><span \
lang=EN-US>http://www.securitylab.ru/45048.html</span></a></font><span \
lang=EN-US>.<o:p></o:p></span></li> <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span lang=EN-US style='font-size:12.0pt'>Apache Mod_SSL
SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability, Bugtraq ID
10355, </span><a href="http://www.securitylab.ru/45504.html"><span
lang=EN-US>http://www.securitylab.ru/45504.html</span></a></font><span
lang=EN-US>.<o:p></o:p></span></li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><font size=3 face="Times New Roman"><span
lang=EN-US style='font-size:12.0pt'>Microsoft Windows HSC DVD Driver Upgrade
Code Execution Vulnerability, Bugtraq ID 10321, </span><a
href="http://www.securitylab.ru/45165.html"><span \
lang=EN-US>http://www.securitylab.ru/45165.html</span></a></font><span \
lang=EN-US>.<o:p></o:p></span></li> <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span lang=EN-US style='font-size:12.0pt'>CVS Malformed Entry \
Modified and
Unchanged Flag Insertion Heap Overflow Vulnerability, Bugtraq ID 10384, </span><a
href="http://www.securitylab.ru/45305.html"><span \
lang=EN-US>http://www.securitylab.ru/45305.html</span></a></font><span \
lang=EN-US>.<o:p></o:p></span></li> <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span
lang=EN-US style='font-size:12.0pt'>DeleGate SSLway Filter Remote Stack
Based Buffer Overflow Vulnerability, Bugtraq ID 10295, </span><a
href="http://www.securitylab.ru/45108.html"><span \
lang=EN-US>http://www.securitylab.ru/45108.html</span></a></font><span \
lang=EN-US>.<o:p></o:p></span></li> <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span
lang=EN-US style='font-size:12.0pt'>WildTangent WebDriver Remote Filename
Buffer Overflow Vulnerability, Bugtraq ID 10421, </span><a
href="http://www.securitylab.ru/45505.html"><span \
lang=EN-US>http://www.securitylab.ru/45505.html</span></a></font><span \
lang=EN-US><o:p></o:p></span></li> <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span lang=EN-US style='font-size:12.0pt'>Subversion Date \
Parsing Function Buffer Overflow Vulnerability, Bugtraq ID 10386, </span><a
href="http://www.securitylab.ru/45306.html"><span \
lang=EN-US>http://www.securitylab.ru/45306.html</span></a></font><span \
lang=EN-US><o:p></o:p></span></li> <li class=MsoNormal \
style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; mso-list:l0 level1 lfo1'><font \
size=3 face="Times New Roman"><span
lang=EN-US style='font-size:12.0pt'>MailEnable Mail Server HTTPMail Remote
Heap Overflow Vulnerability, Bugtraq ID 10312, </span><a
href="http://www.securitylab.ru/45156.html"><span \
lang=EN-US>http://www.securitylab.ru/45156.html</span></a></font><span \
lang=EN-US><o:p></o:p></span></li> </ol>
<p class=MsoPlainText><font size=2 face="Courier New"><span lang=EN-US
style='font-size:10.0pt'><o:p> </o:p></span></font></p>
</div>
</body>
</html>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic