BugTraq Mode:
(Page 1232 of 1748)  < Prev  1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237  Next >
RE: WMF Exploit 2005-12-29
Derick Anderson (danderson vikus com)


> -----Original Message-----
> From: Hayes, Bill [mailto:Bill.Hayes (at) owh (dot) com [email concealed]]
> Sent: Wednesday, December 28, 2005 6:02 PM
> To: davidribyrne (at) yahoo (dot) com [email concealed]
> Cc: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: RE: WMF Exploit
>
> CERT now has posted Vulnerability Note VU#181038, "Microsoft
> Windows may be vu

[ more ]  [ reply ]
WTF?? 2005-12-29
veil_of_darkness yahoo com
Anyone know anything about:
http://www.frame4.net/mdpro

?

[ more ]  [ reply ]
Re: Exploitation of Windows WMF on the web 2005-12-29
psgw internode on net
If you have the latest Norton Defintions you will not be ale to save the WMF file to your hard drive. It will be detected as being infected with "Bloodhound.Exploit.56"

http://securityresponse.symantec.com/avcenter/venc/data/bloodhound.explo
it.56.html

[ more ]  [ reply ]
Advisory 26/2005: TinyMCE Compressor Vulnerabilities 2005-12-29
Stefan Esser (sesser hardened-php net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hardened-PHP Project
www.hardened-php.net

-= Security Advisory =-

Advisory: TinyMCE Compressor Vulnerabilities
Release Date: 2005/12/29
Last Modified: 2005/12/29
Aut

[ more ]  [ reply ]
Secunia Research: TUGZip ARJ Archive Handling Buffer OverflowVulnerability 2005-12-30
Secunia Research (vuln secunia com)
======================================================================

Secunia Research 30/12/2005

- TUGZip ARJ Archive Handling Buffer Overflow Vulnerability -

======================================================================
Table of Contents

Affected Software..

[ more ]  [ reply ]
phpbb2.0.19 fixes security issues 2005-12-30
Paul Laudanski (zx castlecops com)
re: http://www.phpbb.com/phpBB/viewtopic.php?t=352966

[Sec] fixed XSS issue (only valid for Internet Explorer) within the url bbcode
[Sec] fixed XSS issue (only valid for Internet Explorer) if html tags are allowed and enabled
[Sec] added configurable maximum login attempts to prevent dictionary

[ more ]  [ reply ]
rssh: root privilege escalation flaw 2005-12-30
Derek Martin (code pizzashack org)
Affected Software: rssh - all versions prior to 2.3.0
Vulnerability: local user privilege escalation
Severity: *CRITICAL*
Impact: local users can gain root access
Solution: Please upgrade to v2.3.1

Summary
-------

rssh is a restricted shell which allows a system administrator to
limit users

[ more ]  [ reply ]
[ GLSA 200512-17 ] scponly: Multiple privilege escalation issues 2005-12-29
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200512-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Black Hat Federal and Europe Call for Papers 2005-12-29
Jeff Moss (jmoss blackhat com)
Some quick updates for Bug Traq readers:

Black Hat Federal 2006 Speakers Chosen
Black Hat Federal speakers have now been chosen. Black Hat Federal focuses on threats and defenses to those in the Federal sector. From root kit hunting and physical forensics to adversary characterization, Black Hat Fe

[ more ]  [ reply ]
Airscanner Mobile Security Advisory #05083102 Spb Kiosk Engine Program Bypass 2005-12-28
contact removethis removethis airscanner com
Airscanner Mobile Security Advisory #05083102:
Spb Kiosk Engine Program Bypass

Product:
Kiosk Engine 1.0.0.1

Platform:
Tested on Windows Mobile Pocket PC 2003

Requirements:
Mobile device running Windows Mobile Pocket PC with Kiosk Engine 1.0.0.1 installed

Credits:
Seth Fogie
Airscanner Mobile Se

[ more ]  [ reply ]
WMF exploit 2005-12-29
ninjapicook gmail com
use c:\regsvr32.exe /u shimgvw.dll
to disable wmf execution

[ more ]  [ reply ]
RE: WMF Exploit 2005-12-28
Hayes, Bill (Bill Hayes owh com)
CERT now has posted Vulnerability Note VU#181038, "Microsoft Windows may
be vulnerable to buffer overflow via specially crafted WMF file"
(http://www.kb.cert.org/vuls/id/181038). The note provides additional
details about the exploit and its effects. Very few workarounds have
been proposed other tha

[ more ]  [ reply ]
[SECURITY] [DSA 927-2] New tkdiff packages fix insecure temporary file creation 2005-12-29
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 927-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
December 29th, 2005

[ more ]  [ reply ]
PhpDocumentor <= 1.3.0 rc4 Arbitrary remote/local inclusion 2005-12-29
retrogod aliceposta it
---- PhpDocumentor <= 1.3.0 rc4 Arbitrary remote/local inclusion ---

software:
site: http://www.phpdoc.org/
description: "phpDocumentor, sometimes referred to as phpdoc or phpdocu,
is the current standard auto-documentation tool for the php language.
Similar to Javadoc, and written in php, phpDocum

[ more ]  [ reply ]
WMF Exploit 2005-12-28
davidribyrne yahoo com
Another quick observation, again, I apologize if this information has already been posted; I haven?t been able to read all the posts today. The thumbnail view in Windows Explorer will parse the graphics files in a folder, even if the file is never explicitly opened. This is enough to trigger the exp

[ more ]  [ reply ]
WMF Exploit 2005-12-28
davidribyrne yahoo com
I apologize if this information has already been posted; I haven?t been able to read all the posts today. Many of the exploit descriptions that I?ve seen reference .WMF files. Like prior GDI exploits, this isn?t strictly true. If the exploit file is named with another graphics extension (i.e. .gif,

[ more ]  [ reply ]
[ GLSA 200512-16 ] OpenMotif, AMD64 x86 emulation X libraries: Buffer overflows in libUil library 2005-12-28
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200512-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
RE: Is this a new exploit? 2005-12-28
Portz, Jon (jportz kforce com)

Windows .wmf vulnerability, look here:

http://secunia.com/advisories/18255/

JTP

-----Original Message-----
From: noemailpls (at) noemail (dot) zipe [email concealed]r [mailto:noemailpls (at) noemail (dot) zipe [email concealed]r]
Sent: Tuesday, December 27, 2005 3:20 PM
To: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: Is this a new exploit?

Warning the followi

[ more ]  [ reply ]
Re: Is this a new exploit? 2005-12-28
Andreas Marx (gega-it web de)
Hi,

yes, it seems to be a new exploit. More details about the problem can be found here:

http://www.f-secure.com/weblog/archives/archive-122005.html#00000752
http://isc.sans.org/diary.php?storyid=972
http://www.heise.de/newsticker/meldung/67794

Some AV companies have created signatures for the la

[ more ]  [ reply ]
RE: [Full-disclosure] Someone wasted a nice bug on spyware... 2005-12-28
Paul (pvnick gmail com) (1 replies)
Indeed, this is quite an annoyance. Buytoolbar.biz/xpl.wmf also works. I
sent it to Microsoft a few days ago and they're looking into it. It looks
like it's going to be a bad week at MSRC :(

I whoised the owners of a couple domains who host the image and got the
following information:

Domain Name:

[ more ]  [ reply ]
RE: [Full-disclosure] Someone wasted a nice bug on spyware... 2005-12-28
Jim Serino (jim serino mindspring com)
[BUGZILLA] Security advisory for Bugzilla < 2.16.11 2005-12-28
David Miller (justdave bugzilla org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Bugzilla Security Advisory
==========================

December 27, 2005

Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers an insecure temporary filename handling issue in
v

[ more ]  [ reply ]
Exploitation of Windows WMF on the web 2005-12-27
Daniel Bonekeeper (thehazard gmail com)
*** PAY ATENTION BEFORE CLICK ON ANY LINK ON THAT MESSAGE ***

I don't know if this thing is already known, but I just got this when
I was "navigating" on a certain website. It was a sucession of hidden
<frames> from diferent domains, ending on:

http://69.50.183.34/m.html

It will then call another

[ more ]  [ reply ]
MDKSA-2005:238 - Updated php/php-mbstring packages fix mail injection vulnerability 2005-12-27
Mandriva Security Team (security mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2005:238
http://www.mandriva.com/security/
_____________________________________________________________________

[ more ]  [ reply ]
Re: Is this a new exploit? 2005-12-28
redxii1234 hotmail com
apparently WMF can still execute code;

http://redxii.blogspot.com/2005/12/vulnerabilities-in-graphics-rendering
.html

there was a patch for it two Tuesdays ago. It can still execute code even with the aforementioned patch

[ more ]  [ reply ]
Is this a new exploit? 2005-12-27
noemailpls noemail ziper (1 replies)
Warning the following URL successfully exploited a fully patched windows xp system with a freshly updated norton anti virus.

unionseek.com/d/t1/wmf_exp.htm

The url runs a .wmf and executes the virus, f-secure will pick up the virus norton will not.

[ more ]  [ reply ]
Re: Is this a new exploit? 2005-12-28
H D Moore (sflist digitaloffense net)
Malware sample site 2005-12-22
mvalsmith gmail com
Just wanted to let you guys know about a new computer security site at
http://www.offensivecomputing.net

The purpose of this site is to foster collaborative analysis, cataloging and
identification of malware in order to improve defense and awareness.
This was something myself and other colleagues h

[ more ]  [ reply ]
dtSearch DUNZIP32.dll Buffer Overflow Vulnerability 2005-12-23
Juha-Matti Laurio (juha-matti laurio netti fi)
Networksecurity.fi Security Advisory (21-12-2005)

Title: dtSearch DUNZIP32.dll Buffer Overflow Vulnerability
Criticality: High (3/3)
Affected software: dtSearch versions prior than 7.20 Build 7136
Author: Juha-Matti Laurio
Date: 21th December, 2005
Advisory ID: Networksecurity.fi Security Advisory

[ more ]  [ reply ]
[SECURITY] [DSA 927-1] New tkdiff packages fix insecure temporary file creation 2005-12-27
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 927-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
December 27th, 2005

[ more ]  [ reply ]
(Page 1232 of 1748)  < Prev  1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus