BugTraq Mode:
(Page 878 of 1748)  < Prev  873 874 875 876 877 878 879 880 881 882 883  Next >
Skype Network Remote DoS Exploit 2007-08-17
Valery Marchuk (tecklord argocom cv ua)
Hi all!

On SecurityLab.ru forum an exploit code was published by an anonymous user.
Reportedly it must have caused Skype massive disconnections today.

The PoC uses standard Skype client to call to a specific number. This call
causes denial of service of current Skype server and forces Skype

[ more ]  [ reply ]
Re: vBulletin V3.6.8 XSS Password Md5 Hash 2007-08-17
scott-REMOVE vbulletin com
I can't reproduce a single one of these, I've tested on our own internal boards as well as some random customer boards just to make sure.

It looks like your trying to inject into the session hash entry but that always comes from the database.

$this->vars['sessionurl'] = 's=' . $this->vars['dbsessi

[ more ]  [ reply ]
Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-17
Glynn Clements (glynn gclements plus com)

Dan Yefimov wrote:

> > However, the bug in question allows sending signals which cannot be
> > blocked or ignored (SIGKILL, SIGSTOP). Moreover, the cause (PDEATHSIG)
> > cannot be disabled
>
> Really? An what if we fork right after startup and perform operations as a
> child?

That would work, b

[ more ]  [ reply ]
Re: Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16
x82_ bk ru
>Under some circumstances this may lead to other >consequences. For example I was able
>to code local root exploit using some very common >suid binary, althou...
What do you think of publishing the code? Other researchers could learn something from it. Myself included.

[ more ]  [ reply ]
Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-17
Dan Yefimov (dan ns15 lightwave net ru)
On Fri, 17 Aug 2007, Glynn Clements wrote:

> > Really? An what if we fork right after startup and perform operations as a
> > child?
>
> That would work, but might have undesirable consequences of its own.
>
> In particular, it prevents a non-malicious caller from using PDEATHSIG
> to send e.g.

[ more ]  [ reply ]
Olate Download 3.4.1~environment.php.php~Code Execution 2007-08-17
imei Addmimistrator (addmimistrator gmail com)
VISITE ORIGINAL ADVISORY FOR MORE DETAILES
http://myimei.com/security/2007-08-17/olate-download-341-environmentphpp
hp-code-execution.html
VISITE ORIGINAL ADVISORY FOR MORE DETAILES

â??â??â??â??â??â??-Summaryâ??â??â??â??â??-
Software: Olate Download
Sowtware's Web Site: http://www.olate.co.uk/
Versi

[ more ]  [ reply ]
vBulletin V3.6.8 XSS Password Md5 Hash 2007-08-17
RaeD BsdMail Com
#Discovred By : Hasadya Raed
----------------
#Contact : RaeD (at) BsdMail (dot) Cpm [email concealed]
----------------
#Script: vBulletin V3.6.8ulletin V3.6.8
----------------
#Dork: vBulletin V3.6.8ulletin V3.6.8
----------------
#Exploit :

http://www.Victim.com/vBulletin V3.6.8ulletin V3.6.8/faq.php?s=&do=search&q=%22%3E%3C

[ more ]  [ reply ]
Re: Guidance Software response to iSEC report on EnCase 2007-08-16
luke cleverley gmail com
Guidance, in its response to ISEC report, stated on more than one occasion:-
"Also, by corrupting the NTFS partitions, the perpetrator would likely render his file system dysfunctional, which calls into question both the likelihood and feasibility of such a tactic. Thus, the chances of this specific

[ more ]  [ reply ]
Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-17
Dan Yefimov (dan ns15 lightwave net ru)
On Thu, 16 Aug 2007, Glynn Clements wrote:

> However, the bug in question allows sending signals which cannot be
> blocked or ignored (SIGKILL, SIGSTOP). Moreover, the cause (PDEATHSIG)
> cannot be disabled
>
Really? An what if we fork right after startup and perform operations as a
child?

> SIG

[ more ]  [ reply ]
Release of Pass-The-Hash Toolkit for Windows v1.0 2007-08-15
Hernan Ochoa (hernan gmail com)
Hi!,

I'm releasing Pass-The-Hash Toolkit v1.0, you can find it here:
http://oss.coresecurity.com/projects/pshtoolkit.htm.

source code:
http://oss.coresecurity.com/pshtoolkit/release/1.0/pshtoolkit_src_v1.0.t
gz

binaries:
http://oss.coresecurity.com/pshtoolkit/release/1.0/pshtoolkit_v1.0.tgz

For t

[ more ]  [ reply ]
iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Multiple Untrusted Search Path Vulnerabilities 2007-08-16
iDefense Labs (labs-no-reply idefense com)
IBM DB2 Universal Database Multiple Untrusted Search Path Vulnerabilities

iDefense Security Advisory 08.16.07
http://labs.idefense.com/intelligence/vulnerabilities/
Aug 16, 2007

I. BACKGROUND

IBM Corp.'s DB2 Universal Database product is a large database server
product commonly used for high end

[ more ]  [ reply ]
iDefense Security Advisory 08.16.07: IBM DB2 Universal Database buildDasPaths Buffer Overflow Vulnerability 2007-08-16
iDefense Labs (labs-no-reply idefense com)
IBM DB2 Universal Database buildDasPaths Buffer Overflow Vulnerability

iDefense Security Advisory 08.16.07
http://labs.idefense.com/intelligence/vulnerabilities/
Aug 16, 2007

I. BACKGROUND

IBM Corp.'s DB2 Universal Database product is a large database server
product commonly used for high end dat

[ more ]  [ reply ]
iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Directory Traversal Vulnerability 2007-08-16
iDefense Labs (labs-no-reply idefense com)
IBM DB2 Universal Database Directory Traversal Vulnerability

iDefense Security Advisory 08.16.07
http://labs.idefense.com/intelligence/vulnerabilities/
Aug 16, 2007

I. BACKGROUND

IBM Corp.'s DB2 Universal Database product is a large database server
product commonly used for high end databases. Fo

[ more ]  [ reply ]
[USN-499-1] Apache vulnerabilities 2007-08-17
Kees Cook (kees ubuntu com)
===========================================================
Ubuntu Security Notice USN-499-1 August 16, 2007
apache2 vulnerabilities
CVE-2006-5752, CVE-2007-1863, CVE-2007-3304
===========================================================

A security issue affects the following Ubuntu rele

[ more ]  [ reply ]
Re: Re: Safari for windows remote arbitry file upload 2007-08-16
laurent gaffie gmail com
"Firefox will do the same if it's configured that.Is this the default behavior with Safari?"

yes it's a default setting .

"I don't see that this is a bug. Could you explain a little more fully?"

well configured like this by default,it's a security hole . it's a perfect hole for a virus, trojan, e

[ more ]  [ reply ]
ToorCon 9 CFP 2007-08-17
David Hulton (0x31337 gmail com)
Hey guys,

Just thought I'd shoot this out to you all and let you know that we're
doing our first round of speaker selection on Sunday the 19th.
Otherwise, we'll be accepting submissions until September 9th.

Thanks!
-David

--snip--

TOORCON 9 CFP

Papers and presentations are being accepted for T

[ more ]  [ reply ]
rPSA-2007-0164-1 kernel 2007-08-16
rPath Update Announcements (announce-noreply rpath com)
rPath Security Advisory: 2007-0164-1
Published: 2007-08-16
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Local Root Deterministic Privilege Escalation
Updated Versions:
kernel=/conary.rpath.com@rpl:devel//1/2.6.22.3-0.1-1

References:
http://cve.mitre.org/cgi-bin/

[ more ]  [ reply ]
[ GLSA 200708-10 ] MySQL: Denial of Service and information leakage 2007-08-16
Raphael Marichez (falco gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200708-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Local privilege escalation vulnerability in Cisco VPN client 2007-08-16
NGSSoftware Insight Security Research (nisr ngssoftware com)
=======
Summary
=======
Name: Permissively-ACLed cvpnd.exe allows interactive users to run
arbitrary binaries with Local System Privileges
Release Date: 16 August 2007
Reference: NGS00503
Discover: Dominic Beecher <dominic (at) ngssoftware (dot) com [email concealed]>
Vendor: Cisco
Vendor Reference: cisco-sa-20070815-vpnclient

[ more ]  [ reply ]
[ GLSA 200708-12 ] Wireshark: Multiple vulnerabilities 2007-08-16
Raphael Marichez (falco gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200708-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16
Glynn Clements (glynn gclements plus com)

Dan Yefimov wrote:

> > > The signal in question in the given situation is issued by PRIVILEGED process,
> > > no matter how.
> >
> > And that's the bug,
>
> The case we consider is of course a bug. But generally privileged process
> sending a signal to another privileged process is of course n

[ more ]  [ reply ]
[ GLSA 200708-11 ] Lighttpd: Multiple vulnerabilities 2007-08-16
Raphael Marichez (falco gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200708-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16
Glynn Clements (glynn gclements plus com)

Dan Yefimov wrote:

> > > If setuid program just
> > > trusts the environment in that it doesn't properly handle or block signals
> > > whose default action is terminating the process and doesn't perform it's
> > > actions in a fail-safe manner, it is certainly broken. Setuid program must
> > >

[ more ]  [ reply ]
Re: Vulnerability in multiple "now playing" scripts for various IRC clients 2007-08-16
Wouter Coekaerts (wouter coekaerts be)
On Wednesday 15 August 2007 18:27, v9 (at) fakehalo (dot) us [email concealed] wrote:
> I may be rusty with knowledge about mirc (say almost 10 years out of
> date)...but, in what situation would the pipe ('|') ever be processed from
> a variable, even if it was read from a mp3 ID3?

It gets processed before it ends up in an mi

[ more ]  [ reply ]
TS-2007-003-0: BlueCat Networks Adonis CLI root privilege escalation 2007-08-16
anonymous.c7ffa4057a (anonymous c7ffa4057a anonymousspeech com)
Template Security Security Advisory
-----------------------------------

BlueCat Networks Adonis CLI root privilege escalation

Date: 2007-08-16
Advisory ID: TS-2007-003-0
Vendor: BlueCat Networks, http://www.bluecatnetworks.com/
Revision: 0

Contents
--------

Summary
Software Version

[ more ]  [ reply ]
Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16
Dan Yefimov (dan ns15 lightwave net ru)
On Thu, 16 Aug 2007, Glynn Clements wrote:

> > The signal in question in the given situation is issued by PRIVILEGED process,
> > no matter how.
>
> And that's the bug,

The case we consider is of course a bug. But generally privileged process
sending a signal to another privileged process is of

[ more ]  [ reply ]
FLEA-2007-0046-1 cups 2007-08-16
Foresight Linux Essential Announcement Service (foresight-security-noreply foresightlinux org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Foresight Linux Essential Advisory: 2007-0046-1
Published: 2007-08-14

Rating: Major

Updated Versions:
cups=/conary.rpath.com@rpl:devel//foresight.rpath.org@fl:1-devel//1/1.2.
12-0.2-1
group-dist=/foresight.rpath.org@fl:1-devel//1/1.3.2-0.8-2

R

[ more ]  [ reply ]
Another Oracle Forensics Paper... 2007-08-16
David Litchfield (davidl ngssoftware com)
Hey all,
For anyone that's interested I've just posted another paper entitled "Oracle
Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle
Bin". You can get this and other papers on Oracle forensics from
http://www.databasesecurity.com/oracle-forensics.htm
Cheers,
David Lit

[ more ]  [ reply ]
Olate Download 3.4.1 ~ admin.php ~ Admin authentication bypassing 2007-08-16
imei Addmimistrator (addmimistrator gmail com)
VISIT ORIGINAL LINK FOR MORE DETAILES
http://myimei.com/security/2007-08-16/olate-download-341adminphpauthenti
cation-bypassing.html
VISIT ORIGINAL LINK FOR MORE DETAILES

oftware: Olate Download
Sowtware's Web Site: http://www.olate.co.uk/
Versions: 3.4.1
Status: Unpatched
Exploit: Available
So

[ more ]  [ reply ]
Re: Trackeur v.1 Remote File İnclude Bug 2007-08-16
the tiger100 gmail com
sorry man but its not exploit
u forgot something

include("track_config.php");

and this code in the begining of ur file that contain the exploit
and the config file have value for
$header

track_config.php
//Design
$header="c_header.php";
$footer="c_footer.php";

so it CAAAAAANT BE INCLUSION

it al

[ more ]  [ reply ]
(Page 878 of 1748)  < Prev  873 874 875 876 877 878 879 880 881 882 883  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus