It has been reported that SCO OpenServer Inertnet Manager 'mana' process is prone to a privilege escalation issue allow local users to execute arbitrary code with elevated privileges. mana normally requires authentication, but this may be circumvented via exploitation of BID 8616. An attacker could exploit this issue by setting certain environment variables used by the program to cause an attacker-specified file to be executed with elevated privileges. Successful exploitation of this issue would allow a remote attacker to execute arbitrary code as root.
WideChapter has been reported prone to a buffer overflow vulnerability when handling HTTP requests of excessive length. It has been reported that the condition may be triggered remotely when a malicious website is rendered in the affected browser. Although unconfirmed, a remote attacker may exploit this condition to execute arbitrary instructions in the context of the user who is running the affected browser.
It has been reported that SCO OpenServer Internet Manager 'mana' process is prone to an authentication bypass issue. The issue is reported to occur as a local user is able to export the REMOTE_ADDR environment variable and set its value to 127.0.0.1. This would cause the mana process to execute the file menu.mana with administrative privileges without proper authentication. Normally executing mana would require proper credentials.
It has been reported that vbPortal is prone to SQL injection attacks when authentication users. The problem occurs due to insufficient sanitization of the $aid variable, used to store the name of the authenticating user. As a result, an attacker may supply data within the username designed to prematurely terminate the string, and influence the logic of the current SQL query. This may be exploited to expose sensitive information, or potentially to launch attacks against the underlying database.
myServer has been reported prone to a remote buffer overflow vulnerability. It is possible to trigger this issue by sending overly long values for URI parameters. Although unconfirmed, this vulnerability may be potentially exploited to execute attacker-supplied code with the privileges of the vulnerable web server.
MySQL server is prone to a buffer overflow vulnerability when handling user passwords of excessive size. A password greater than 16 characters may overrun the bounds of a reserved buffer in memory and corrupt adjacent memory. An attacker with global administrative privileges on an affected MySQL server may potentially exploit this condition to have arbitrary supplied instructions executed in the context of the MySQL server.
It has been reported that CacheFlow CacheOS may allow the misuse of the HOST header value. This may provide for the use of an internal mail server as an open relay for the purposes of sending unsolicited mass email.
It has been reported that FutureWave WebX Server may be prone to a directory traversal issue allow a remote attacker to traverse outside the server root directory in order to retrieve arbitrary files. This vulnerablity may allow an attacker to gain access to sensitive data that may be used to launch further attacks.
A weakness has been reported in the FTGatePro WebAdmin Interface that could allow an unauthorized user to gain sensitive information. The problem is believed to occur due to insufficient access controls put in place by FTGatePro. As a result, an attacker may be capable of viewing various configuration information, and possibly username and password data. Access to this data may aid an attacker in launching future attacks against the target system.
Multiple issues have been reported in Microsoft Internet Explorer. Though these issues have been reported by a reliable source, communication issues have presented difficulty in obtaining details surrounding the reported issues.