|
Colapse all |
Post message
[security bulletin] SSRT051005 rev.0 - HP ProLiant DL585 Servers Unauthorized Remote Access 2005-08-10 security-alert hp com Design Flaw at Microsoft's AntiSpyware 2005-08-05 manolisgavriil hotmail com Hi, A possible design flaw i encountered during my research on Microsoft's AntiSpyware(Beta Version). Summary: Bypassing Microsoft's AntiSpyware alerting system on programs trying to access Registry. Details: When a program is trying to write to Registry Startup Keys like for example HKEY_LOCAL_M [ more ] [ reply ] BID 14355, VERITAS NetBackup 5.1 Time Stamp Vulnerability 2005-08-09 secure symantec com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: BID 14355, http://www.securityfocus.com/bid/14355, Risk: Very Low to minimal Affected product: Veritas NetBackup minimal impact only This issue does NOT affect Veritas Backup Exec Symantec engineers have thoroughly reviewed the issu [ more ] [ reply ] [security bulletin] SSRT5940 rev.1 - HP-UX Mozilla remote, unauthorized user may execute privileged code 2005-08-09 security-alert hp com iDEFENSE Security Advisory 08.09.05: AWStats ShowInfoURL Remote Command Execution Vulnerability 2005-08-09 iDEFENSE Labs (labs-no-reply idefense com) AWStats ShowInfoURL Remote Command Execution Vulnerability iDEFENSE Security Advisory 08.09.05 www.idefense.com/application/poi/display?id=290&type=vulnerabilities August 09, 2005 I. BACKGROUND AWStats is a free tool that generates web, streaming, ftp or mail server statistics, graphically. It [ more ] [ reply ] Mozilla Firefox up to 1.0.6 and Mozilla Thunderbird up to 1.0 url string obfuscation 2005-08-09 Marc Ruef (maru scip ch) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dear lists, During a web application audit for a customer I detected a design error in the applications of the Mozilla suite. I was testing very long URL requests what I am usually do with a terminal emulation (e.g. Telnet or NetCat) or tools as like [ more ] [ reply ] Bugtraq ID: 14460 : Coldfusion Fusebox V4.1.0 Vulnerability 2005-08-09 Adrocknaphobia (adrocknaphobia gmail com) The following vulnerability is inaccurate. Fusebox is a framework popular with ColdFusion developers. The cross-site scripting vulnerability is not specific to the framework, and is clearly an implementation issue. Fusebox, as a framework, does not output any URL parameters to HTML. The output is c [ more ] [ reply ] Apple Safari & Javascript - KERN_INVALID_ADDRESS (0x0001) 2005-08-09 Patrick Webster (pwebster ausgeo com au) Hi Guys, Was trying to work out some code and came across a bug. Was wondering if it can be of any use ;-), or just a DoS? I'm running OS X 1.3.9 & Safari 1.3 (132) Create a HTML document, with the code below: <html> <script name="JavaScript"> <!-- function tickTock() { setTimeout("tic [ more ] [ reply ] Sql injection and global variables poisoning in XMB Forum 1.9.1 2005-08-09 heintz hotmail com Vendor notified at and partial patch: http://forums.xmbforum.com/viewthread.php?tid=754523 firstly the input validation at xmb.php: foreach ($global as $num => $array) { if (is_array($array)) { extract($array, EXTR_OVERWRITE); } } this should put to not overwrite any variables cause it overwrite [ more ] [ reply ] [USN-163-1] xpdf vulnerability 2005-08-09 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-163-1 August 09, 2005 xpdf vulnerability CAN-2005-2097 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5 [ more ] [ reply ] [AppSecInc Advisory MYSQL05-V0003] Multiple Issues with MySQL User Defined Functions 2005-08-08 Team SHATTER (shatter appsecinc com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Multiple Issues with MySQL User Defined Functions AppSecInc Team SHATTER Security Advisory MYSQL05-V0003 http://www.appsecinc.com/resources/alerts/mysql/2005-003.html August 08, 2005 Risk level: LOW Credits: This vulnerability was discovered and res [ more ] [ reply ] [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions 2005-08-08 Team SHATTER (shatter appsecinc com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions AppSecInc Team SHATTER Security Advisory MYSQL05-V0001 http://www.appsecinc.com/resources/alerts/mysql/2005-001.html August 08, 2005 Risk level: LOW Credits: This v [ more ] [ reply ] FunkBoard V0.66CF (possibly prior versions) cross site scripting, possible database username/password disclosure & board takeover,possible remote code execution 2005-08-08 retrogod aliceposta it FunkBoard V0.66CF (possibly prior versions) cross site scripting, possible database username/password disclosure & board takeover, possible remote code execution software: author site: http://www.[path_to_funkboard].co.uk/ xss: http://[target]/[path_to_funkboard]/editpost.php?fbusername="><scrip [ more ] [ reply ] Re: GNU tar and the setuid bit 2005-08-06 David Watson (baikie ehwhat freeserve co uk) On Saturday 06 Aug 2005 4:22 pm, David Watson wrote: > (By the way, -o is broken in version 1.14 at least, but --no-same-owner > works.) Sorry, I just noticed that that last comment was entirely misleading! In all versions, using --no-same-owner without --no-same-permissions *will* cause the setu [ more ] [ reply ] Re: Trillian Ver 3.1 saves password's in plain Text 2005-08-06 Suramya Tomar (security suramya com) Hi Patrick, > I'd just like to add that, while it may not be relevant, but Gaim does > the same thing (in Window$). It stores the passwords in plain text, in > the User accounts directory (ie. c:\documents and settings\user123). > More on that here. <http://gaim.sourceforge.net/plaintextpasswords.p [ more ] [ reply ] Re: tar preserves setuid bit 2005-08-05 Imran Ghory (imranghory gmail com) (1 replies) On 8/5/05, Neil McKellar <mckellar (at) telusplanet (dot) net [email concealed]> wrote: > Imran Ghory <imranghory (at) gmail (dot) com [email concealed]> wrote: > > If running as the root user tar restores the original permissions to > > extracted files, this includes the setuid bit. No warning is given to > > the user that this has happened. > > From the [ more ] [ reply ] Re: Zip 2,31 bad default file-permissions vulnerability 2005-08-05 Imran Ghory (imranghory gmail com) On 8/5/05, Lupe Christoph <lupe (at) lupe-christoph (dot) de [email concealed]> wrote: > > I still don't understand why this is a problem. If it were a problem, it > would be one of humongous dimensions because it affects all programs > that use open(..., 0666) to create non-executable files potentially > containing sensitive [ more ] [ reply ] nbSMTP v0.99 remote format string exploit 2005-08-05 coki nosystem com ar /* nbSMTP_fsexp.c * * nbSMTP v0.99 remote format string exploit * by CoKi <coki (at) nosystem.com (dot) ar [email concealed]> * * root@nosystem:/home/coki/audi# ./nbSMTP_fsexp * * nbSMTP v0.99 remote format string exploit * by CoKi <coki (at) nosystem.com (dot) ar [email concealed]> * * Use: ./nbSMTP_fsexp [options] * * options: * [ more ] [ reply ] Creating a secret web site on IIS 5.x using Alternative Data Streams 2005-08-04 inge_eivind henriksen chello no (1 replies) ** Inge Henriksen Security Advisory http://ingehenriksen.blogspot.com/ ** Creating a secret web site on IIS 5.x using Alternative Data Streams -------------------------------------------------------------------- Using a little known feature of the Windows NT file system (NTFS) one can create a se [ more ] [ reply ] RE: Creating a secret web site on IIS 5.x using Alternative Data Streams 2005-08-09 James C Slora Jr (Jim Slora phra com) |
|
Privacy Statement |
Hash: SHA1
HP SECURITY BULLETIN
HPSBMA01220 REVISION: 0
SSRT051005 rev.0 - HP ProLiant DL585 Servers Unauthorized Remote
Access
NOTICE:
The information in this Security Bulletin should be acted upon
as soon as possible.
INITIAL RELEASE:
[ more ] [ reply ]