BugTraq Mode:
(Page 1230 of 1748)  < Prev  1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235  Next >
RE: Download Accelerator Plus can be tricked to download malicious file 2006-01-04
NaPa (napa securitynation com)
I didn't see this as a DAP fail, is normal to have out because of network
configuration, but, how you can make your own Server to be detected as a
mirror of the file. I mean if you could do this is that a fact nut by know
for me is not a flaw.

What do you think?

-----Mensaje original-----
De: visi

[ more ]  [ reply ]
Contact information for Symantec Vulnerability Management 2006-01-05
secure symantec com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This email is intended to provide contact information for reporting
vulnerabilities in Symantec products. If you believe that you have
discovered a vulnerability in one of Symantec supported products, we
encourage you to contact secure (at) symantec (dot) com. [email concealed]

I

[ more ]  [ reply ]
HylaFAX Security advisory - fixed in HylaFAX 4.2.4 2006-01-05
Aidan Van Dyk (aidan ifax com)

I'm passing this on for Patrice Fournier who is not around today.
------------------------------------------------------------------------
------

HylaFAX security advisory
4 Jan 2006

Subject: HylaFAX hfaxd and notify/faxrcvd vulnerabilities

Introduction:

HylaFAX is a mature (est. 1991) enterpri

[ more ]  [ reply ]
SysCP WebFTP local file inclusion vulnerability 2006-01-04
Thomas Henlich (thomas henlich de)
SYSCP WEBFTP LOCAL FILE INCLUSION VULNERABILITY

Thomas Henlich

DESCRIPTION

Thomas Henlich has discovered a vulnerability in WebFTP, which can be
used by remote attackers to disclose potentially sensitive information
and to compromise a vulnerable system.

Input passed to the "webftp_language" par

[ more ]  [ reply ]
What is sbininitd port 65534 ??? 2006-01-05
waltdnes waltdnes org
I've seen graphs on the sans.org site indicating that traffic on this
port has seen a major rise. It sounds like something linux might be
vulnerable to. I've tried finding out what gives, but neither Google
nor the major security sites I've tried show any hits for "sbininitd",
other than to note

[ more ]  [ reply ]
iDefense Security Advisory 01.05.06: Blue Coat Systems WinProxy Host Header Stack Overflow Vulnerability 2006-01-05
labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com)
Blue Coat Systems WinProxy Host Header Stack Overflow Vulnerability

iDefense Security Advisory 01.05.06
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=364
January 05, 2006

I. BACKGROUND

BlueCoat WinProxy is an Internet sharing proxy server designed for small
to medium busines

[ more ]  [ reply ]
CyberShop User Login Sql Injection 2006-01-05
night_warrior771 hotmail com
##Night_Warrior<Kurdihs Hacker>
##night_warrior771[at]hotmail.com
##CyberShop User Login Sql Injection
##Site:http://www.gencbeyin.gen.tr/cybershop/test

Code For User Login :

Username : ' or ''='
Password: ' or ''='

Contact :night_warrior771[at]hotmail.com
Night_Warrior<Kurdihs Hacker>

[ more ]  [ reply ]
[ECHO_ADV_25$2006] Full path disclosure on boastMachine v3.1 2006-01-05
eufrato gmail com
____________________ ___ ___ ________
\_ _____/\_ ___ \ / | \\_____ \
| __)_ / \ \// ~ \/ | \
| \\ \___\ Y / | /_______ / \______ /\___|_ /\_______ /
\/ \/ \/ \/

.OR.ID
ECHO_ADV_25$2006

--------------

[ more ]  [ reply ]
MD:Pro - Malware Distribution Project 2006-01-05
anthony aykut frame4 com
On 01 February 2006 Frame4 Security Systems will launch their Malware Distribution Project (MD:Pro) service, which will offer developers of security systems and anti-malware products a vast collection of downloadable malware from a secure and reliable source, exclusively for the purposes of analysis

[ more ]  [ reply ]
RE: Dumb IE6/XP denial of service found on the web 2006-01-05
Mario Contestabile (marioc computer org)
Nice, seems to crash the intel graphics controller.

Here's a zip for your perusal.

Mario Contestabile
Developer , RadialPoint
marioc (at) computer (dot) org [email concealed]
Profile: https://www.linkedin.com/e/fps/3704298/

-----Original Message-----
From: 8ux1fpd02 (at) sneakemail (dot) com [email concealed] [mailto:8ux1fpd02 (at) sneakemail (dot) com [email concealed]]
Sent:

[ more ]  [ reply ]
Open Letter on the Interpretation of "Vulnerability Statistics" 2006-01-05
Steven M. Christey (coley mitre org)

Open Letter on the Interpretation of "Vulnerability Statistics"
---------------------------------------------------------------
Author: Steve Christey, CVE Editor
Date: January 4, 2006

All,

As the new year begins, there will be many temptations to generate,
comment, or report on vulnerability st

[ more ]  [ reply ]
what we REALLY learned from WMF 2006-01-05
Gadi Evron (ge linuxbox org)
What we really learn from this all WMF "thingie", is that when Microsoft
wants to, it can.

Microsoft released the WMF patch ahead of schedule
( http://blogs.securiteam.com/index.php/archives/181 )

Yep, THEY released the PATCH ahead of schedule.

What does that teach us?

There are a few options:

[ more ]  [ reply ]
[eVuln] TinyPHPForum Multiple Vulnerabilities 2006-01-05
alex evuln com
New eVuln Advisory:
TinyPHPForum Multiple Vulnerabilities

--------------------Summary----------------

Software: TinyPHPForum
Sowtware's Web Site: http://www.ralpharama.co.uk/tpf/
Versions: 3.6 and earlier
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched
Explo

[ more ]  [ reply ]
Re: Dumb IE6/XP denial of service found on the web 2006-01-05
Francois Labreque (flabreq ca ibm com)
8ux1fpd02 (at) sneakemail (dot) com [email concealed] a écrit sur 2005-12-31 13:13:12 :

> Wow, a simple big jpeg completely crashes (and reboots) Windows XP
> SP2 with all the latest patches when viewed in IE6.
>
> -> DON'T GO with Internet Explorer if you don't want to crash: http:
> //www.geocities.com/teh_kids/index.html

[ more ]  [ reply ]
iDefense Security Advisory 01.05.06: Blue Coat WinProxy Remote DoS Vulnerability 2006-01-05
labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com)
Blue Coat WinProxy Remote DoS Vulnerability

iDefense Security Advisory 01.05.06
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=363
January 05, 2006

I. BACKGROUND

BlueCoat WinProxy is an Internet sharing proxy server designed for small
to medium businesses. In addition to Inte

[ more ]  [ reply ]
Re: WMF Exploit 2006-01-03
Joshua (joshua broussard gmail com)
This is probably due to M$ thumbnail generation. You can disable that
and see if it fixes the problem...

grasshopa (at) securityfocus (dot) com [email concealed] wrote:

>I've tested the exploit on XP home and I've found that it does not even need a single click on my machine. Once the folder containing the file is open (this

[ more ]  [ reply ]
Re: WMF browser-ish exploit vectors 2006-01-03
Dave Korn (davek_throwaway hotmail com)
Evans, Arian wrote in
news:8654C851B1DAFA4FA18A9F150145F92502C16D7A (at) fnex01.fishnetsecurity (dot) com [email concealed]

> Here, let's make the rendering issue simple:
>
> Due to IE being so content help-happy there are a
> myriad of IE-friend file types (e.g.-.jpg) that one
> can simply rename a metafile to for purpose of

[ more ]  [ reply ]
Re: WTF?? 2005-12-31
anthony aykut frame4 com
Can someone *please* remove this post? The service this posting is referring to is not ready yet & I am guessing it has been leaked either via somebody working for us or as a result of the "interest" we have been getting in certain circles.

This service is not active until February 01, 2006, and we

[ more ]  [ reply ]
WMF: New Metasploit Framework Module 2005-12-31
H D Moore (sflist digitaloffense net)
We just released a new version of the Metasploit Framework exploit module
for the Escape/SetAbortFunc code execution flaw. This module now pads the
Escape() call with random WMF records. You may want to double check your
IDS signatures -- most of the ones I saw today could be easily bypassed
or

[ more ]  [ reply ]
Mapping and Remote manipulation of databases 2005-12-31
Gandalf The White (gandalf digital net)
Greetings and Salutations:

I am requesting discussion on the below idea. I have seen this (in a very
crude way, see bottom) work. I suspect, however, that this idea could be
fine tuned to produce specific results.

Abstract:
As company partnerships increase, networking, databases and information

[ more ]  [ reply ]
Re: WTF?? 2005-12-31
Nick FitzGerald (nick virus-l demon co uk)
veil_of_darkness (at) yahoo (dot) com [email concealed] wrote:

> Anyone know anything about:
> http://www.frame4.net/mdpro

It appears to be a "pay for" VX site.

There've been a couple already that, AFAICT, just faded away.

I mean, why pay for it when the bad guys shovel it at you faster than
most folk can keep up??

Regar

[ more ]  [ reply ]
Re: WMF browser-ish exploit vectors 2005-12-31
Nick FitzGerald (nick virus-l demon co uk)
Evans, Arian wrote:

> Due to IE being so content help-happy there are a
> myriad of IE-friend file types (e.g.-.jpg) that one
> can simply rename a metafile to for purpose of web
> exploitation, and IE will pull out the wonderful hey;
> you're-not-a-jpeg-you're-a-something-else-that-I-can-
> -autom

[ more ]  [ reply ]
RE: WMF Exploit 2005-12-30
Discussion Lists (discussions lagraphico com)
All,
I think I was able to get the SAFER mechanism to block this for IE, and
any program covered under it. I know that there are other workarounds,
but I have found the SAFER approach has stopped every one of these sorts
of attacks. I have a vbscript that activates SAFER for IE, and various
other

[ more ]  [ reply ]
MDKSA-2005:239 - Updated printer-filters-utils packages fix local vulnerability 2005-12-30
Mandriva Security Team (security mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2005:239
http://www.mandriva.com/security/
_____________________________________________________________________

[ more ]  [ reply ]
Re: Cisco PIX / CS ACS: Downloadable RADIUS ACLs vulnerability 2005-12-30
Eloy A. Paris (elparis cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Response
==============

This is the Cisco Product Security Incident Response Team (PSIRT)'s
response to the statements made by Oleg Tipisov in his message with
subject "Cisco PIX / CS ACS: Downloadable RADIUS ACLs vulnerability",
posted to Bugtra

[ more ]  [ reply ]
Dumb IE6/XP denial of service found on the web 2005-12-31
8ux1fpd02 sneakemail com
Wow, a simple big jpeg completely crashes (and reboots) Windows XP SP2 with all the latest patches when viewed in IE6.

-> DON'T GO with Internet Explorer if you don't want to crash: http://www.geocities.com/teh_kids/index.html (no problems whatsoever in Firefox or Opera).

Is this a known unpatched

[ more ]  [ reply ]
Re[2]: [funsec] WMF round-up, updates and de-mystification 2006-01-03
Pierre Vandevenne (pierre datarescue com)
Good Day,

Tuesday, January 3, 2006, 12:59:22 PM, you wrote:

GE>> The "patch" by Ilfak Guilfanov works, but by disabling a DLL in Windows.
PV>> I wouldn't say it does that. If you really want to simplify it in the
LS> extreme, it hides the vulnerable function.

LS> Think of it as a "White Hat Roo

[ more ]  [ reply ]
New from the MS Advisory 2006-01-03
Larry Seltzer (larry larryseltzer com)
*What's Microsoft's response to the availability of third party patches for
the WMF vulnerability?

Microsoft recommends that customers download and deploy the security update
for the WMF vulnerability that we are targeting for release on January 10,
2006.

As a general rule, it is a best practice t

[ more ]  [ reply ]
Re: WMF Exploit 2006-01-03
Paul Laudanski (zx castlecops com)
On Tue, 3 Jan 2006, Sam Munro wrote:

> I haven't seen this mentioned yet so I thought I would give you guys a
> heads-up a very good patch has been written by Ilfak
> Guilfanov<http://www.hexblog.com/2005/12/wmf_vuln.html> as
> a tempory solution until ms get their act together.
>
> Can be downloa

[ more ]  [ reply ]
Download Accelerator Plus can be tricked to download malicious file 2006-01-04
visitbipin hotmail com
Product(ONLY TESTED ON): Download Accelerator Plus 7.4.0.2 (unregistered)
Test Environment: Winxp Pro sp2 (patch level latest)
Risk Type: Rare exception
Threat Level: High
Vendor website:www.speedbit.com

POC screenshots: http://img482.imageshack.us/img482/4205/31uk.jpg
http://img425.imageshack.us/

[ more ]  [ reply ]
(Page 1230 of 1748)  < Prev  1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus