Specifications
SAFER – Vol. 3, Issue 6 4 © 2000 The Relay Group
HP SECURITY ADVISORY #00104 REVISED: SEC. VULNERABILITY REGARDING AUTOMOUNTD (REV. 01).........41
DENIAL-OF-SERVICE ................................................................................................................................42
CERBERUS INFORMATION SECURITY ADVISORY (CISADV000527): WINDOWS NT BROWSER SERVICE DOS...42
DEERFIELD MDAEMON MAIL SERVER DOS VULNERABILITY .........................................................................42
HP WEB JETADMIN 6.0 PRINTING DOS VULNERABILITY ...............................................................................42
TOPLAYER APPSWITCH 2500 MULTIPLE DOS VULNERABILITIES ...................................................................42
NITE SERVER FTPD MULTIPLE DOS VULNERABILITIES..................................................................................43
MICROSOFT WINDOWS 9X / NT 4.0 / 2000 FRAGMENTED IP PACKETS DOS VULNERABILITY..........................43
AXENT NETPROWLER MALFORMED IP PACKETS DOS VULNERABILITY..........................................................43
XFREE86 XSERVER DENIAL OF SERVICE VULNERABILITY .............................................................................44
BEOS TCP FRAGMENTATION REMOTE DOS VULNERABILITY........................................................................44
CAYMAN 3220-H DSL ROUTER DOS VULNERABILITY ..................................................................................44
CPROXY 3.3 SP2 BUFFER OVERFLOW DOS VULNERABILITY .........................................................................44
ALLAIRE COLDFUSION 4.5.1 CACHED FILE REQUEST DOS VULNERABILITY ...................................................45
ULTRABOARD DOS VULNERABILITY ............................................................................................................45
LINUX KNFSD DENIAL OF SERVICE VULNERABILITY.......................................................................................45
SECURITY BUGS.........................................................................................................................................46
UNDERGROUND TOOLS ...........................................................................................................................47