|
Colapse all |
Post message
MDKSA-2005:239 - Updated printer-filters-utils packages fix local vulnerability 2005-12-30 Mandriva Security Team (security mandriva com) Dumb IE6/XP denial of service found on the web 2005-12-31 8ux1fpd02 sneakemail com Wow, a simple big jpeg completely crashes (and reboots) Windows XP SP2 with all the latest patches when viewed in IE6. -> DON'T GO with Internet Explorer if you don't want to crash: http://www.geocities.com/teh_kids/index.html (no problems whatsoever in Firefox or Opera). Is this a known unpatched [ more ] [ reply ] New from the MS Advisory 2006-01-03 Larry Seltzer (larry larryseltzer com) *What's Microsoft's response to the availability of third party patches for the WMF vulnerability? Microsoft recommends that customers download and deploy the security update for the WMF vulnerability that we are targeting for release on January 10, 2006. As a general rule, it is a best practice t [ more ] [ reply ] Re: WMF Exploit 2006-01-03 Paul Laudanski (zx castlecops com) On Tue, 3 Jan 2006, Sam Munro wrote: > I haven't seen this mentioned yet so I thought I would give you guys a > heads-up a very good patch has been written by Ilfak > Guilfanov<http://www.hexblog.com/2005/12/wmf_vuln.html> as > a tempory solution until ms get their act together. > > Can be downloa [ more ] [ reply ] Download Accelerator Plus can be tricked to download malicious file 2006-01-04 visitbipin hotmail com Product(ONLY TESTED ON): Download Accelerator Plus 7.4.0.2 (unregistered) Test Environment: Winxp Pro sp2 (patch level latest) Risk Type: Rare exception Threat Level: High Vendor website:www.speedbit.com POC screenshots: http://img482.imageshack.us/img482/4205/31uk.jpg http://img425.imageshack.us/ [ more ] [ reply ] Another WMF exploit workaround 2006-01-04 Ivan Arce (ivan arce coresecurity com) For those interested, Core FORCE its a free endpoint security software currently in Beta stage. With it users can configure access control permissions to file system objects independently of the operating System's ACLs and security policy enforcement mechanisms. The default security profiles of IE [ more ] [ reply ] [eVuln] Lizard Cart CMS SQL Injection Vulnerability 2006-01-04 alex evuln com New eVuln Advisory: Lizard Cart CMS SQL Injection Vulnerability --------------------Summary---------------- Software: Lizard Cart CMS Sowtware's Web Site: http://sourceforge.net/projects/lizardcart Versions: 1.04 Critical Level: Dangerous Type: SQL Injection Class: Remote Status: Unpatched Exploit [ more ] [ reply ] RE: WMF round-up, updates and de-mystification 2006-01-03 Krpata, Tyler (tkrpata bjs com) It looks like MS has backed off on "viewing mail" as a possible attack vector. As of today, the advisory (http://www.microsoft.com/technet/security/advisory/912840.mspx) reads: "In an E-mail based attack involving the current exploit, customers would have to be persuaded to click on a link within a [ more ] [ reply ] WMF exploit 2006-01-03 Andreas Marx (gega-it web de) Hi, I like what SANS is saying about the current MS announcement to deliver a patch by Jan 10, 2006, but not earlier: http://isc.sans.org/diary.php This is the interesting part: "Although the issue is serious and malicious attacks are being attempted, Microsoft's intelligence sources indicate that [ more ] [ reply ] Recruitment Software allows MySQL credentials disclosure 2005-12-31 Rafael San Miguel Carrasco (smcsoc yahoo es) PRODUCT DESCRIPTION Recruitment Software (http://www.recruitment-agency-software.com/) is a free full featured web-based recruitment agency software product. An easy to use back-end administration gives you full control over your recruitment job listings. It has been checked that several institu [ more ] [ reply ] WSJ: The new "metasploit" computer virus 2006-01-03 Richard M. Smith (rms computerbytesman com) Hmm, has anyone else seen this new "rapidly spreading computer virus" known as "metasploit"? ;-) Richard http://online.wsj.com/article/SB113630873566736620.html?mod=yahoo_hs&ru= yaho o Microsoft Readies Fix As New Virus Spreads By CHRIS REITER DOW JONES NEWSWIRES January 3, 2006 1:20 p.m. Micros [ more ] [ reply ] [eVuln] phpBook PHP Code Execution 2006-01-01 alex evuln com New eVuln Advisory: phpBook PHP Code Execution --------------------Summary---------------- Software: phpBook (http://sourceforge.net/projects/phpbook/) Versions: 1.3.2 and earlier Critical Level: Dangerous Type: PHP Code Execution Class: Remote Status: Unpatched Exploit: Available Solution: Not Av [ more ] [ reply ] [eVuln] VEGO Links Builder Authentication Bypass 2006-01-01 alex evuln com New eVuln Advisory: VEGO Links Builder Authentication Bypass --------------------Summary---------------- Vendor: VEGO Software: VEGO Links Builder Versions: 2.0 Critical Level: Moderate Type: SQL Injection Class: Remote Status: Unpatched Exploit: Available Solution: Not Available Discovered by: Ali [ more ] [ reply ] [eVuln] PHPenpals SQL Injection Vulnerabilit 2006-01-01 alex evuln com New eVuln Advisory: PHPenpals SQL Injection Vulnerability --------------------Summary---------------- Vendor: Jevontec (http://jevontech.com/) Software: PHPenpals Versions: 310704 Critical Level: Moderate Type: SQL Injection Class: Remote Status: Unpatched Exploit: Available Solution: Not Available [ more ] [ reply ] WMF SETABORTPROC exploit 2006-01-03 SanjayR (sanjayr intoto com) Hi Moore et al (and All): I was trying to understand the wmf setabortproc exploit code. I got confused over one point. In the code, under the point "StandardMetaRecord - Escape()", you have given the value of WORD function as 0x0026 and other possible values can be (according to the code) 0x0626, [ more ] [ reply ] Re: Drupal all versiyon xss cehennem.org 2006-01-03 security drupal org I have inspected the latest XSS filter mechanism of Drupal which is included in 4.5.6 and 4.6.4 versions and onward and both the decimal and the hexadecimal version is escaped when choosing the "Filtered HTML" format. The "Full HTML" format, as its name implies, does not filter HTML and its documen [ more ] [ reply ] WMF round-up, updates and de-mystification 2006-01-03 Gadi Evron (ge linuxbox org) (4 replies) Quite a bit of confusing and a vast amount of information coming from all directions about the WMF 0day. Here are some URL's and generic facts to set us straight. The "patch" by Ilfak Guilfanov works, but by disabling a DLL in Windows. So far no problems have been observed by anyone using this p [ more ] [ reply ] Re: [funsec] WMF round-up, updates and de-mystification 2006-01-03 Pierre Vandevenne (pierre datarescue com) (2 replies) RE: [funsec] WMF round-up, updates and de-mystification 2006-01-03 Larry Seltzer (larry larryseltzer com) (1 replies) Re[2]: [funsec] WMF round-up, updates and de-mystification 2006-01-03 Pierre Vandevenne (pierre datarescue com) Re: [Full-disclosure] WMF round-up, updates and de-mystification 2006-01-03 InfoSecBOFH (infosecbofh gmail com) (1 replies) RE: [Full-disclosure] WMF round-up, updates and de-mystification 2006-01-03 Larry Seltzer (larry larryseltzer com) Re: [Full-disclosure] WMF round-up, updates and de-mystification 2006-01-03 Nancy Kramer (nekramer mindtheater net) |
|
Privacy Statement |
I think I was able to get the SAFER mechanism to block this for IE, and
any program covered under it. I know that there are other workarounds,
but I have found the SAFER approach has stopped every one of these sorts
of attacks. I have a vbscript that activates SAFER for IE, and various
other
[ more ] [ reply ]