Return-Path: bugtraq-jp-return-79-kjm=ideon.st.ryukoku.ac.jp@securityfocus.com Mailing-List: contact bugtraq-jp-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: List-Post: List-Help: List-Unsubscribe: List-Subscribe: Delivered-To: mailing list bugtraq-jp@securityfocus.com Delivered-To: moderator for bugtraq-jp@securityfocus.com Received: (qmail 3967 invoked from network); 11 Dec 2001 05:29:37 -0000 To: bugtraq-jp@SECURITYFOCUS.COM Subject: SecurityFocus.com Newsletter #122 2001$BG/(B12$B7n(B03$BF|(B->2001$BG/(B12$B7n(B07$BF|(B From: SAKAI Yoriyuki Message-Id: <200112111430.bcc86508.bbjlt@lac.co.jp> X-Mailer: Winbiff [Version 2.33PL2] X-Accept-Language: ja,en Date: 2001$BG/(B12$B7n(B11$BF|(B 14:30:41 +0900 Mime-Version: 1.0 Content-Type: text/plain; charset=iso-2022-jp -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 $B:d0f(B@$B%i%C%/$G$9!#(B SecurityFocus.com Newsletter $BBh(B 122 $B9f$NOBLu$r$*FO$1$7$^$9!#(B $BLu$N$J$$9`L\$K$D$$$F$O!VF|K\8lLu$J$7!W$H$7$F6hJL$7$F$"$j$^$9!#(B - --------------------------------------------------------------------------- SecurityFocus.com Newsletter $B$K4X$9$k(BFAQ: http://www.securityfocus.com/popups/forums/securityfocusnews/intro.shtml BugTraq-JP $B$K4X$9$k(B FAQ: http://www.securityfocus.com/popups/forums/bugtraq-jp/faq.shtml - --------------------------------------------------------------------------- $B0zMQ$K4X$9$kHw9M(B: $B!&$3$NOBLu$O(B Security-Focus.com $B$N5v2D$r3t<02qe$G9T$o(B $B$l$F$$$^$9!#(B $B!&(BSecurityFocus.com Newsletter $B$NOBLu$r(B Netnews, Mailinglist, World Wide Web, $B=q@R(B, $B$=$NB>$N5-O?G^BN$G0zMQ$5$l$k>l9g$K$O%a!<%k$n(b $BA4J80zMQ$r$*4j$$$7$^$9!#(B $B!&F|K\8lHG%K%e!<%9%l%?!<(b 1 $B9f$+$i(B 3 $B9f$^$G$K$O$3$NHw9M$,IU$$$F$$$^$;(B $B$s$,=`MQ$9$k$b$N$H$7$^$9!#(B $B!&$^$?!"(BSecurity-Focus.com $BDs6!$N(B BugTraq-JP $B%"!<%+%$%v(b [*1] $B$X$N$$$+(B $B$J$k7A<0$n%o%$%q!<%j%s%/$b>e5-$K=`$8$F$/$@$5$$!#(B 1) http://www.securityfocus.com/archive/79 - --------------------------------------------------------------------------- - --------------------------------------------------------------------------- $B$3$NOBLu$K4X$9$kHw9M(B: $B!&$3$NOBLu$NE,MQ@.2L$K$D$$$F3t<02ql9g!"(BBUGTRAQ-JP $B$X(B Errata $B$H$7$F=$@5(B $BHG$r$4Ej9FD:$/$+!"Lul9g$K$O=$@5HG$r$G$-$k$@$1?WB.$KH/9T$7$^$9!#(B - --------------------------------------------------------------------------- - --------------------------------------------------------------------------- $B86HG(B: Date: 2001$BG/(B12$B7n(B10$BF|(B 11:04:17 -0700 (MST) Message-ID: SecurityFocus Newsletter #122 - --------------------------------- This issue is sponsored by VeriSign - The Value of Trust - ------------------------------------------------------------------------------- I. FRONT AND CENTER($BF|K\8lLu$J$7(B) 1. Advertising Information 2. An Introduction to IDS 3. Using IPSec in Windows 2000 and XP 4. The Future of IDS 5. 'Magic Lantern' Rubs the Wrong Way II. BUGTRAQ SUMMARY 1. Persits AspUpload Default Scripts Exploitable Vulnerability 2. PHPNuke Cross-Site Scripting Vulnerability 3. Microsoft Outlook Express for Macintosh Buffer Overflow... 4. OpenSSH UseLogin Environment Variable Passing Vulnerability 5. SpeedXess HA-120 Router Default Administrative Password... 6. ValiCert Enterprise Validation Authority Code Execution... 7. ValiCert Enterprise Validation Authority Path Disclosure... 8. Lotus Domino SunRPC Denial of Service Vulnerability 9. Frox FTP Cache Retrieval Buffer Overflow Vulnerability III. SECURITYFOCUS NEWS ARTICLES 1. Lamo's Adventures in WorldCom 2. Goner Worm Tops the Charts IV.SECURITYFOCUS TOP 6 TOOLS 1. userinfo v1.8 2. Stealth HTTP Security Scanner v2.0b36 3. CHX-I Universal Application Firewall and Intrusion... 4. Mailfilter v0.3.1 5. IP Sorcery v1.4 6. WinARP Watch v1.0 I. FRONT AND CENTER($BF|K\8lLu$J$7(B) - --------------------------------- II. BUGTRAQ SUMMARY - ------------------- 1. Persits AspUpload Default Scripts Exploitable Vulnerability BugTraq ID: 3608 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Nov 30 2001 12:00A $B4XO"$9$k(BURL: http://www.securityfocus.com/bid/3608 $B$^$H$a(B: AspUpload $B$O%j%b!<%h%f!<%6$k(b HTML $B%U%)!<%`$rmxmq$7!"%u%!%$%k$r%"%c%w%m!<(b $B%I$9$k5!G=$rDs6!$9$k(B ASP $B3HD%$G$"$k!#(B $B$3$N%=%U%H%&%'%"$H6&$K%$%s%9%H!<%k$5$l$k!"$"$k%5%s%w%k%9%/%j%w%h$k$h$c(b $B$F!"%f!<%6$o(b Web $B%5!<%p$n(b c:\upload $B%G%#%l%/%H%j$X%U%!%$%k$N%"%C%W%m!<(b $B%I$,2DG=$G$"$k!#$3$N%9%/%j%W%H$O%U%)!<%`fb$n(b hidden $BJQ?t$NCM$H$7$F%"%C(B $B%W%m!<%ibp>]$N%U%!%$%kL>$rH$,2DG=$G$"$j!"%5!<%pfb$kb8:_$9$kg$0u$n%u%!%$%k$n%@%&%s%m!<%i$,(b $B2DG=$G$"$k!#(B $B%5%s%W%k%9%/%j%W%H$O(B C:\Program Files\PersitsSoftware\AspUpload\Samples $BFb$K%$%s%9%H!<%k$5$l!"0j2<$,ldbj$rjz$($k%9%/%j%w%h$g$"$k!#(b UploadScript11.asp DirectoryListing.asp AspUpload $B%P!<%8%g%s(b 3.0 $B$K$*$$$F$b$3$l$i%5%s%W%k%9%/%j%W%H$OF1:-$5$l$F(B $B$$$k$H?d;!$5$l$k!#(B 2. PHPNuke Cross-Site Scripting Vulnerability BugTraq ID: 3609 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Dec 03 2001 12:00A $B4XO"$9$k(BURL: http://www.securityfocus.com/bid/3609 $B$^$H$a(B: PHPNuke $B$O(B Web $B%5%$%H$N9=C[!"4IM}5!G=$rDs6!$9$k%=%U%H%&%'%"$G$"$k!#(B $B$3$N%=%U%H%&%'%"$K$O%/%m%9%5%$%H%9%/%j%W%F%#%s%0$rMxMQ$9$k967b$N1F6A$r(B $BpJs$r;2>H$9$k$?$a$KMxMQ$5$l$k%9%/%j%W%H$G$"$k(B user.php $B$O!"JQ?t(B uname $B$r]$rM=4|$7$F$$$J$$%f!<%6$k$h$c$f%/%j%c%/$5$l$k:]!"(b PHPNuke $B1?MQ$7$F$$$k%5%$%H$+$iF@$i$l$?%3%s%F%s%D$H$7$F!"0-0U$"$k%3!<%i(b $B$,ZMQ>pJs$rEp$_=P$9$?(B $B$a$KMQ$$$i$l$k;v$,A[Dj$5$l$k!#(B $B$J$*!"(BPostNuke $B$bJs9p$5$l$?=j$K$h$k$HLdBj$rJz$($F$$$k$H$N;v$G$"$k!#(B 3. Microsoft Outlook Express for Macintosh Buffer Overflow Vulnerability BugTraq ID: 3611 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Dec 03 2001 12:00A $B4XO"$9$k(BURL: http://www.securityfocus.com/bid/3611 $B$^$H$a(B: $B$$$/$D$+$N%P!<%8%g%s$n(b Microsoft Outlook Express for Macintosh $B$O!"%P%C(B $B%U%!%*!<%p!<%u%m!<$r@8$8$kldbj$rjz$($f$$$k!#(b $B0-0U$"$k%f!<%6$,%a%c%;!<%8$nk\j8cf$kdl>o$"$jF@$J$$D9$5$N9T$r4^$`!"FCJL(B $B$KAH$_N)$F$i$l$?EE;R%a!<%k$r3:ev$9$k%=%u%h%&%'%"$n%f!<%6$kaw?.$7$?:]!"(b $BJs9p$5$l$?=j$K$h$k$H!"G$0U$N%3!<%i$ne$N%j%?!<%s%"%i%l%9$rcv492dg=$g$"$j!"$^$?!"%a%b%jfb$k(b $B0-0U$"$k]$H$J$C$?%[%9%H$X$N%"%/%;%9$,2DG=$K$J$k;v$,A[Dj$5$l$k!#(B $B$3$N967b$N1F6A$ru67$K4Y$k>r7o$O!"32$r$b$?$i$9EE;R%a!<%k$r!"$?$@(b $B%f!<%6$,%@%&%s%m!<%i$r9t$&$n$_$g$"$k$h9m$($i$l$k!#(b $B%a!<%k%5!<%p>e$G0-0U$"$k%a%C%;!<%8$,=|5n2dg=$k$j$k$^$g$n4v!"%/%i%$%"%s(b $B%H$O%/%i%C%7%e$7B3$1$F$7$^$&$?$a$K!"967b$N1F6A$r:3J2DG=$JLdBj$,H/8+$5$l$F$$(B $B$k!#(BOpenSSH $B$O%f!<%6$,fcdj$n%-!<$rmxmq$7$f%m%0%$%s$9$k:]!"fcdj$n4d6-jq(b $B?t$rMxMQ$9$k;v$r2DG=$K$7$F$$$k!#%5!<%p$,(b UseLogin $B%U%i%0$rMxMQ$7!"L@<((b $B$5$l$?(B login $B%3%^%s%I$rMxMQ$9$kMM$K@_Dj$5$l$F$$$k:]!"4XO"$9$k4D6-JQ?t$N(B $BCM$,(B login $B%3%^%s%IMQ$K@_Dj$5$l$k!#(B $B$3$N=hM}$O%m!<%+%k$n967b:3J$5$l$?8"8B$G$NG$0U$N%3!<%i$n7$/;v$r2DG=$K$9$k$N$G$"$k!#(B UseLogin $B%U%i%0$,@_Dj$5$l$k:]!"%m!<%+%k%f!<%6$o(b root $B8"8B$rC%Z$r9T$C$F$$$J$$%f!<%6$,5!4o$=$n$b$n$x%"%/%;%92dg=$h$j(b $B$kLdBj$,B8:_$9$k!#%k!<%?$,f3f~$5$l$k:]$n%q%9%o!<%i$njq99$rb%$9=hm}$k!"(b $BLdBj$,B8:_$9$k$N$G$"$k!#(B $B5!4o$,F3F~$5$l$?8e!"%k!<%?$o%f!<%6$k%q%9%o!<%i$rjq99$9$k:eb%$o9t$o$j$$(b $B$N$G$"$k!#$3$NLdBj$K2C$(!"B>$NF1l=P2Y;~$K@_Dj$5$l(B $B$?%Q%9%o!<%i$o!"%g%u%)%k%h>uBV$G4{CN$G$"$k$H8@$&;vZL@=q$NBEEv@-$r3NG'$9$k$?$a$N?.Mj$G$-$k%U%l!<%`%o!<%/$rds6!$7!"$$$:$l(b $B$N>ZL@5!4X$K$*$$$F$bZL@=q$r:n@.$9$k:]!"%G%#%9%/%j%W%7%g%s%U%#!<%k%i(b $BFb$K%f!<%6$o(b HTML $B%3!<%i$r4^$a$k;v$,2dg=$j$n$g$"$k!#(bvalicert $B4IM}%5!<%p(b $B$+$i$=$N>ZL@=q$r;2>H$9$k:]!"4^$^$l$F$$$k(B HTML $B$O%$%s%?%U%'!<%9$n0lit$r(b $B@.$9$b$N$H$7$F2rZL@=q$N:n@.$O8"8B$rJ];}$9$k%m!<%+%k%f!<%6$n$_$,9t$($k$h(b $B8@$&E@$OCm5-$5$l$M$P$J$i$J$$!#(B $B967bpJs$NI=<($,2dg=$k$j$k;v$,?ddj$5$l$k!#(b 7. ValiCert Enterprise Validation Authority Path Disclosure Vulnerability BugTraq ID: 3615 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Dec 04 2001 12:00A $B4XO"$9$k(BURL: http://www.securityfocus.com/bid/3615 $B$^$H$a(B: ValiCert Validation Authority $B$OJq3gE*$G!"%9%1!<%i%v%k$g$"$j!"%g%8%?%k(b $B>ZL@=q$NBEEv@-$r3NG'$9$k$?$a$N?.Mj$G$-$k%U%l!<%`%o!<%/$rds6!$7!"$$$:$l(b $B$N>ZL@5!4X$K$*$$$F$bH2DG=$K$J(B $B$kLdBj$,B8:_$7$F$$$k!#(B $B0-0U$"$k%f!<%6$,!"b8:_$7$j$$e$N%"%W%j%1!<%7%g%s$n%$%s%9%h!<%k@h>pJs$O!"=EMW$J>pJs(B $B$N3JG<@h>pJs$r?dB,$9$k$?$a$N>pJs$H$J$j!"967bBP>]$N%[%9%H$X9T$o$l$k!"0J(B $B8e$N967b$KMxMQ$5$l$k2DG=@-$,$"$k!#(B $B0-0U$"$k%j%/%(%9%H$O%]!<%hhv9f(b 13333 $B$X(B forms.exe $B$r2p$7$F9T$o$l$kI,MW(B $B$,$"$k!#(B 8. Lotus Domino SunRPC Denial of Service Vulnerability BugTraq ID: 3607 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Nov 30 2001 12:00A $B4XO"$9$k(BURL: http://www.securityfocus.com/bid/3607 $B$^$H$a(B: Lotus Domino Server $B$O(B Web $B$rMxMQ$7$?6(6H4D6-$rDs6!$9$k$?$a$N!"%"%W%j%1!<(b $B%7%g%s$r9=C[$9$k$?$a$N%U%l!<%`%o!<%/$rds6!$9$k%=%u%h%&%'%"$g$"$k!#$3$n(b $B%=%U%H%&%'%"$OJ#?t$N4D6-$GF0:n$7!"9-$/Ia5Z$7$F$$$k(B Lotus Notes $B%/%i%$%"(B $B%s%H%=%U%H%&%'%"8~$1$N%5%]!<%h5!g=$r4^$s$g$$$k!#(b Lotus Domino $B$,(B SunRPC $B$N(B NULL $B%3%^%s%I$r%]!<%hhv9f(b 443 $B$GoF0:n$X$NI|5l$O$3$N%W%m%;%9$N:F5/F0$,I,MW$G$"$k!#(B SunRPC $B$N(B NULL $B%3%^%s%I$rMxMQ$9$k967b$O!"(B-sR $B%U%i%0IU$-$G(B nmap $B$ruBV$G(B $BJ]$NZL@$5$l$F$$$k!#$3$N%=(B $B%U%H%&%'%"$G$O6-3&%A%'%C%/$,==J,$G$O$J$$$?$a$K!"%P%C%U%!%*!<%p!<%u%m!<(b $B$rD9$$%Q%9L>IU$-$N%U%!%$%k$r;XDj$9$k;v$K$h$j0z$-5/$3$9;v$,2DG=$J$N$G$"(B $B$k!#$3$N7k2L!"%j%?!<%s%"%i%l%9$r4^$`%9%?%c%/fb$ncm$n>e=q$-$r9T$$!"(BFrox $B$N7$/;v$,2DG=$G$"$k!#(B $B$3$NLdBj$rMxMQ$9$k;v$G!"0-0U$"$k(B FTP $B%5!<%p$oldbj$rjz$($k%=%u%h%&%'%"$r(b $Be$NLdBj$r$b8!::$G$-$kMM$K!"FC$KCeL\$7$F@_7W$5$l(B $B$F$$$^$9!#>&6HMxMQ!"Hs>&6HMxMQ$N$$$:$l$K$*$$$F$b40A4$K%U%j!<$gmxmq2dg=(b $B$G$9!#(B 3. CHX-I Universal Application Firewall and Intrusion Detection Engine. v1.7 $B:ne$N(B POP3 $B%"%+%&%s%H$r%5%]!<%h$7!"$h$j$o$1%b%g%`7pm3$n%@%$%"%k%"%c%w%"%+%&%s%h4d(b $B6-$K$*$$$FM-MQ$G$9!#%f!<%6$o$i$n%a!<%k$,g[aw$5$l$k$y$-$g!"$i$n%a!<%k$,(b $BGK4~$5$l$k$Y$-$+$rH=CG$9$k8DJL$N%U%#%k%?(B ($B%k!<%k(b) $B$r@_Dj2DG=$G$9!#(B 5. IP Sorcery v1.4 $B:nl9g!"%W%m%0%i%`$O%-%c%C%7%eFb$NFbMF$HJQ2=$,(B $B$"$k$+$I$&$+$r3NG'$7$^$9!#(B - -- $BLu(B: $B:d0f=g9T(B(SAKAI Yoriyuki), $B1F;3E0:H(B(KAGEYAMA Tetsuya) $B4F=$(B: $B:d0f=g9T(B(SAKAI Yoriyuki) LAC Co., Ltd. http://www.lac.co.jp/security/ -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Edition 5.5.5J Comment: SAKAI Yoriyuki iQA/AwUBPBUbcZQwtHQKfXtrEQICwACfV7LiTJVsOJ3pUJ3Z5ti2v68JnIsAnj5o sApIucIHGuiecUm9N9KlKROG =J5dp -----END PGP SIGNATURE-----

AltStyle $B$K$h$C$FJQ49$5$l$?%Z!<%8(b (->$B%*%j%8%J%k(B) /