|
Colapse all |
Post message
Astaro Security Linux 6.0 - HTTP CONNECT Access Localhost Weakness 2005-08-25 oliver karow (oliver karow gmx de) Tool Announcement: AIRT -- the Advanced Incident Response Tool 0.4.2 released 2005-08-25 madsys (admin ercist iscas ac cn) hey all, I'm proud to announce that the AIRT 0.4.2 is now available: http://sourceforge.net/projects/airt-linux/ AIRT (Advanced incident response tool) is a set of incident response assistant tools on linux platform. It's useful when you want to know what evil kernel backdoor is resi [ more ] [ reply ] Re: unload event in ie/mozilla/opera 2005-08-24 Niels Bakker (niels-bugtraq bakker net) * gillettdavid (at) fhda (dot) edu [email concealed] (David Gillett) [Thu 25 Aug 2005, 00:02 CEST]: > What's worse, some browsers interpret "close the browser" to trigger >the onunload() method, and that's just wrooong. Not that wrong, the website author could want to clear a session cookie or similar. -- Niels. -- (ple [ more ] [ reply ] ssl-login-checkbox faked in Lycos webmail-frontend 2005-08-25 Fischer, Andreas (Andreas Fischer t-systems com) Lycos Webmail offers a checkbox named "SSL LOGIN" which let you assume a secure transfer of your credentials - it's only pretended! Repeatedly sniffs shows account and password in cleartext - no https-packet came across... The interesting part of the relating http-packet: ... login=dasbinich&hidden [ more ] [ reply ] Re: LeapFTP .lsq Buffer Overflow Vulnerability 2005-08-25 Damien Palmer (alacrity gmail com) Seeing as how, given a large enough buffer, it is relatively easy to write arbitrary shell code using just ASCII characters, the larger unicode space would make this even easier. Unless there are some pretty severe unlisted restrictions on either the length or content of the overflow string, making [ more ] [ reply ] RE: unload event in ie/mozilla/opera 2005-08-25 Early, Clint (clint early kaz com) Has this been reported in bugzilla? I can't find it anywhere.... Cheers, Clint > -----Original Message----- > From: Tobias Boonstoppel [mailto:boonstoppel (at) gmail (dot) com [email concealed]] > Sent: Tuesday, August 23, 2005 7:10 AM > To: bugtraq (at) securityfocus (dot) com [email concealed] > Subject: unload event in ie/mozilla/opera > > > in ne [ more ] [ reply ] [ GLSA 200508-16 ] Tor: Information disclosure 2005-08-25 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Re: ZipTorrent 1.3.7.3 Discloses Proxy Passwords to Local Users 2005-08-25 Nick Boyce (nick boyce gmail com) On 8/24/05, Allen Parker <infowolfe (at) gmail (dot) com [email concealed]> wrote: > On 23 Aug 2005 13:21:23 -0000, kozan (at) spyinstructors (dot) com [email concealed] > <kozan (at) spyinstructors (dot) com [email concealed]> wrote: [...] > > ZipTorrent stores proxy server information and password in > > X:\\[Program_Files_Path]\[ZipTorrent_Path]\pref.txt > > in plain text. A loca [ more ] [ reply ] Re: [NOBYTES.COM: #8] Naxtor Shopping Cart 1.0 - Information Disclosure & Possible SQL Injection 2005-08-25 devfreedom gmail com Yes, it is vulnerable. The user inputs as cat_id is not quoted when retrieving the category text. You can test the vulerability by: cat_id=2%20and%201=1 cat_id=2%20and%201=2 >Patrick Morris wrote: > >Do you have any evidence that there is a real vulerability here, or are you basing your assumptio [ more ] [ reply ] CORRECTION: Remote IIS 5.x and IIS 6.0 Server Name Spoof 2005-08-25 Mark Burnett (mb xato net) I just wanted to clarify some issues here. First of all, this is by no means a new discovery. Others have mentioned it and I even used it as an example in my book "Hacking the Code". It is not a flaw in the handling of the server variable, but a bug in the 500-100.asp script. It is also important to [ more ] [ reply ] An Illustrated Guide to IPSec 2005-08-25 Steve Friedl (steve unixwiz net) Hello listmates, One of the most widespread security protocols is IPSec, but many of us have found that the number of knobs and settings and switches gets really overwhelming. I was in that boat as well, so I dove in and wrote a paper that covers IPSec at the protocol level. It doesn't cover thing [ more ] [ reply ] Quake 2 Lithium Mod V 1.24 Macro Expansion Vuln? 2005-08-25 nukemmeister gmail com Well I ran quake 2 (using Lithium mod V 1.24) under OllyDBG and it seems that the lithium II mod for quake 2 (latest PATCH 3.20) is parsing the '%' in nicks. My well crafted nickname '%999f%f%f%f%f' is being pushed onto the stack as 004144A1 |. 68 E821AF00 PUSH QUAKE2.00AF21E8 ; ASCII "0.000000 0.00 [ more ] [ reply ] Tool for Identifying Rogue Linksys Routers 2005-08-25 Martin Mkrtchian (dotsecure gmail com) Dear Group Members We are migrating from Lucent QIP to MetaIP for DHCP services and so far we have had two issues when MetaIP has been implemented for VLAN that has an unauthorized Linksys router giving out IP addresses. Is there a scanning tool out there that can determine if there are unauthori [ more ] [ reply ] [security bulletin] SSRT4702 rev.0 - HP-UX running Veritas 3.3/3.5 unauthorized data access 2005-08-25 Boren, Rich (HP SSRT) (rich boren hp com) MS05_039 Exploitation (different languages) 2005-08-25 Roman Medina-Heigl Hernandez (roman rs-labs com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, I tested existing exploits for PnP bug on my W2k SP4 machine (Spanish) and they didn't work ("services" process is crashing but I got no shell). So I did a quick review with Olly and I realized that umpnpmgr.dll is being loaded at a different base [ more ] [ reply ] Re: LeapFTP .lsq Buffer Overflow Vulnerability 2005-08-25 Kaveh Razavi (c0d3rz_team yahoo com) I talked on this issue with kf . reading unicodeproof shellcode in phrake magazine is extremely recommended . I add the replys with kf as an attachment . might be useful . c0d3r of IHS Network Security Researcher --- Damien Palmer <alacrity (at) gmail (dot) com [email concealed]> wrote: > Seeing as how, given a large enough [ more ] [ reply ] [SECURITY] [DSA 785-1] New libpam-ldap packages fix authentication bypass 2005-08-25 joey infodrom org (Martin Schulze) Portcullis Security Advisory 05-014 HP Openview Remote Command Execution Vulnerability 2005-08-25 Paul J Docherty (PJD portcullis-security com) (1 replies) Portcullis Security Advisory 05-014 HP Openview Remote Command Execution Vulnerability Vulnerable System: HP OpenView Network Node Manager 6.41 and 7.5 running on Solaris 8 (confirmed) HP OpenView Network Node Manager all version all operating systems (unconfirmed) Vulnerability Title: Unauthen [ more ] [ reply ] Re: Portcullis Security Advisory 05-014 HP Openview Remote Command Execution Vulnerability 2005-08-25 David Litchfield (davidl ngssoftware com) [SECURITY] [DSA 784-1] New courier packages fix denial of service 2005-08-25 joey infodrom org (Martin Schulze) Re: unload event in ie/mozilla/opera 2005-08-25 Drew Haven (drew haven gmail com) (1 replies) In Firefox (the browser I was just testing that in), the only time that seems to trigger is when a different address is placed in the address bar. Other events such as back, forward, and closing the window don't call it. What I found most interesting is that if you type an address in and are redir [ more ] [ reply ] [ GLSA 200508-15 ] Apache 2.0: Denial of Service vulnerability 2005-08-25 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Advisory: iTAN not as secure as claimed 2005-08-25 release redteam-pentesting de Advisory: New banking security system iTAN not as secure as claimed The new iTAN security feature for online banking promoted by german banks does not protect against phishing attacks and trojans as claimed. Details ======= Product: iTAN Online-Banking Security System Vulnerability Type: Design F [ more ] [ reply ] [ GLSA 200508-14 ] TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC 2005-08-24 Thierry Carrez (koon gentoo org) [USN-173-2] PCRE vulnerability 2005-08-24 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-173-2 August 24, 2005 pcre3, apache2 vulnerabilities CAN-2005-2491 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warth [ more ] [ reply ] |
|
Privacy Statement |
==================================================================
Product:
========
Astaro Security Linux 6.0 is a network security solution, including a
combination of the following security applications:
- Stateful inspection f
[ more ] [ reply ]