CVE-2006-3840
https://notcve.org/view.php?id=CVE-2006-3840
The SMB Mailslot parsing functionality in PAM in multiple ISS products with XPU (24.39/1.78/epj/x.x.x.1780), including Proventia A, G, M, Server, and Desktop, BlackICE PC and Server Protection 3.6, and RealSecure 7.0, allows remote attackers to cause a denial of service (infinite loop) via a crafted SMB packet that is not properly handled by the SMB_Mailslot_Heap_Overflow decode. La funcionalidad SMB Mailslot en PAM en múltiples productos ISS con XPU (24.39/1.78/epj/x.x.x.1780), incluyendo Proventia A, G, M, Server, y Desktop, BlackICE PC y Server Protection 3.6, y RealSecure 7.0,permiten a atacantes remotos provocar denegación de servicio (bucle infinito) a través de paquetes SMB manipulados que no son manejados adecuadamente por el decodificador SMB_Mailslot_Heap_Overflow. • http://secunia.com/advisories/21219 http://securitytracker.com/id?1016590 http://securitytracker.com/id?1016591 http://securitytracker.com/id?1016592 http://www.nsfocus.com/english/homepage/research/0607.htm http://www.securityfocus.com/archive/1/441278/100/0/threaded http://www.securityfocus.com/bid/19178 http://www.vupen.com/english/advisories/2006/2996 http://xforce.iss.net/xforce/alerts/id/230 https://exchange.xforce.ibmcloud.com/vulnerabilities/27965 https://iss.custhelp • CWE-399: Resource Management Errors •
CVE-2004-0362 – ISS - 'PAM.dll' ICQ Parser Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-0362
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm. Múltiples desbordamientos de búfer basado en la pila en las rutinas de análisis de ICQ en el componente ISS Protocol Analysis Module (PAM), utilizado en varios productos RealSecure, Proventia y BlackICE, permite a atacantes remotos ejecutar código arbitrario mediante un respuesta SRV_MULTI conteniendo un paquete de respuesta SRV_USER_ONLINE y un paquete de respuesta SRV_META_USER con campos 1) nickname, (2) firstname, (3) lastname, o (4) email largos, como son explotados por el gusanto 'Witty'. • https://www.exploit-db.com/exploits/16464 https://www.exploit-db.com/exploits/168 http://marc.info/?l=bugtraq&m=107965651712378&w=2 http://secunia.com/advisories/11073 http://www.ciac.org/ciac/bulletins/o-104.shtml http://www.eeye.com/html/Research/Advisories/AD20040318.html http://www.kb.cert.org/vuls/id/947254 http://www.osvdb.org/4355 http://www.securityfocus.com/bid/9913 http://xforce.iss.net/xforce/alerts/id/166 https://exchange.xforce.ibmcloud. •
CVE-2004-0193
https://notcve.org/view.php?id=CVE-2004-0193
Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username. Desbordamiento de búfer basado en la pila en el Módulo de análisis de Protocolos (PAM) de ISS, usado en ciertas versiones de RealSecure Network 7.0 y Server Sensor 7.0, Proventia series A, G, y M, Desktop 7.0 y 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, y BlackICE Server Protection 3.6, permite a atacantes remotos ejecutar código arbitrario mediante un paquete SMB conteniendo una petición de autenticación con un nombre de usuario largo. • http://marc.info/?l=bugtraq&m=107789851117176&w=2 http://secunia.com/advisories/10988 http://www.eeye.com/html/Research/Advisories/AD20040226.html http://www.eeye.com/html/Research/Upcoming/20040213.html http://www.kb.cert.org/vuls/id/150326 http://www.osvdb.org/4072 http://www.securityfocus.com/bid/9752 http://xforce.iss.net/xforce/alerts/id/165 https://exchange.xforce.ibmcloud.com/vulnerabilities/15207 •
CVE-2003-0702
https://notcve.org/view.php?id=CVE-2003-0702
Unknown vulnerability in an ISAPI plugin for ISS Server Sensor 7.0 XPU 20.16, 20.18, and possibly other versions before 20.19, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code in Internet Information Server (IIS) via a certain URL through SSL. • http://marc.info/?l=bugtraq&m=106278164225389&w=2 http://www.enteredge.com/research/CAN-2003-0702.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/13088 •
CVE-2002-0237
https://notcve.org/view.php?id=CVE-2002-0237
Buffer overflow in ISS BlackICE Defender 2.9 and earlier, BlackICE Agent 3.0 and 3.1, and RealSecure Server Sensor 6.0.1 and 6.5 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a flood of large ICMP ping packets. Desbordamiento de búfer en ISS BlackICE Defender 2.9 y anteriores, BlackICE Agente 3.0 y 3.1, y RealSecure Server Sensor 6.01 y 6.5 permiten a atacantes remotos que provoquen una denegación de servicio (caida) y posiblemente ejecutar código arbitrario por medio de un envío masivo de grandes paquetes ping ICMP. • http://marc.info/?l=bugtraq&m=101286393404301&w=2 http://marc.info/?l=bugtraq&m=101302424803268&w=2 http://marc.info/?l=bugtraq&m=101321744807452&w=2 http://marc.info/?l=ntbugtraq&m=101353165915171&w=2 http://www.iss.net/security_center/alerts/advise109.php http://www.iss.net/security_center/static/8058.php http://www.securityfocus.com/bid/4025 •