|
Colapse all |
Post message
NTLM HTTP Authentication is insecure by design - a new writeup by Amit Klein 2005-07-18 Amit Klein (AKsecurity) (aksecurity hotpop com) Broadcast format string and buffer-overflow in Race Driver 1.20 2005-07-18 Luigi Auriemma (aluigi autistici org) [SECURITY] [DSA 759-1] New phppgadmin packages fix directory traversal vulnerability 2005-07-18 joey infodrom org (Martin Schulze) [SECURITY] [DSA 760-1] New ekg packages fix several vulnerabilities 2005-07-18 joey infodrom org (Martin Schulze) Re: several vulnerabilities present in Belkin wireless routers 2005-07-18 ian latter midnightcode org Hello, > As it can be seen, the OS firmware is developed > by Conexant, although the routers themselves are > from Belkin. After researching on both Belkin > and Conexant websites I found nothing about the > OS running in these devices and ways to > configure them through telnet. However, the > [ more ] [ reply ] HPSBTU01210 SSRT4743, SSRT4884 rev.0 - HP Tru64 UNIX TCP/IP remote Denial of Service (DoS) 2005-07-18 Security Alert (secure hpchs cup hp com) [SECURITY] [DSA 758-1] New heimdal packages fix arbitrary code execution 2005-07-18 joey infodrom org (Martin Schulze) Re: several vulnerabilities present in Belkin wireless routers 2005-07-15 Ian Clelland (ian veryfresh com) On Fri, Jul 15, 2005 at 04:37:10PM +0100, Steve Kemp wrote: > On Fri, Jul 15, 2005 at 08:14:14AM -0000, m123303 (at) securityfocus (dot) com [email concealed] wrote: > > > The first problem is the existance of a default telnet backdoor > > running on the usual 23/tcp port. From my experience, telnet > > interfaces are NOT enab [ more ] [ reply ] [ZH2005-16SA] Insecure temporary file creation in Skype for Linux 2005-07-16 badpenguin zone-h org [ZH2005-16SA] Insecure temporary file creation in Skype for Linux Application: Skype for Linux Version affected: <= 1.1.0.20 Vendor website : http://www.skype.com Author: Giovanni Delvecchio e-mail: badpenguin at zone-h.org About Skype ========== Skype is a free program that uses the latest P [ more ] [ reply ] Re: [HSC Security Group] Invision PowerBoard 1.3.x - 2-x Exploit and Patch 2005-07-16 augustusx00 gmail com Isn't that the same code as this, but with the credits ripped? http://www.milw0rm.com/id.php?id=1013 Also, your "discovery" is _OLD_ news. http://forums.invisionpower.com/index.php?showtopic=168016 I see hackerscenter.com uses Invision Power Board. If you guys are just now finding out about this [ more ] [ reply ] PowerDNS 2.9.18 fixes two security issues affecting users of LDAP backend or limited recursion 2005-07-16 bert hubert netherlabs nl PowerDNS 2.9.18 fixes two bugs with security implications, which only apply to installations running on the LDAP backend, or installations providing recursion to a limited range of IP addresses. If any of these apply to you, an upgrade is highly advised. Version 2.9.18 release notes are on: http:// [ more ] [ reply ] [HSC Security Group] Invision PowerBoard 1.3.x - 2-x Exploit and Patch 2005-07-16 zinho hackerscenter com (1 replies) Hackers Center Security Group (http://www.hackerscenter.com/) Zinho's Security Advisory Desc: Invision PowerBoard 1.3.x - 2.x Privilege escalation through SQL injection Risk: High hacky0u from http://www.h4cky0u.org kindly reported to me an exploit working against 1.3.x and 2.x versions of Invisi [ more ] [ reply ] Re: [HSC Security Group] Invision PowerBoard 1.3.x - 2-x Exploit and Patch 2005-07-17 milw0rm Inc. (milw0rm gmail com) Installation of software, and security. . . 2005-07-16 John Richard Moser (nigelenki comcast net) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I just had some time to think, and I've come across something that bothers me a lot. I've been attempting to write a small reference that pools together all of the knowledge I've accumulated about security enhancements that can be minimally invasive an [ more ] [ reply ] RE: Any info on potential 0day RDP vuln? 2005-07-15 Altheide, Cory B. (IARC) (AltheideC nv doe gov) > -----Original Message----- > From: Mark [mailto:bugtraq (at) mwebapps (dot) com [email concealed]] > Sent: Friday, July 15, 2005 12:43 PM > To: bugtraq (at) securityfocus (dot) com [email concealed] > Subject: Any info on potential 0day RDP vuln? > > > Any one have any info on the '0day' RDP DOS vuln as being > reported by SANS: https://www.immunity [ more ] [ reply ] Solaris Runtime Linker - Exploit Detection 2005-07-16 petefran gmail com This is a demonstration of exploit detection using the Solaris implementation of C2 Auditing (BSM) to detect the system has been compromised. Of course , it helps to be logging locally as well to a secure central log server or protected media. This was tested on an unpatched Solaris 10 Sparc syste [ more ] [ reply ] Re: On classifying attacks 2005-07-16 Derek Martin (code pizzashack org) (1 replies) On Fri, Jul 15, 2005 at 06:40:42PM -0500, James Longstreet wrote: > > On Jul 14, 2005, at 9:39 PM, Derek Martin wrote: > > > This kind of attack has a name already: it is a trojan horse. > <snip> > > But is this a remote exploit? > > No, it's not an exploit at all. Systems are not vulnerable to [ more ] [ reply ] Re: [Full-disclosure] Why Vulnerability Databases can't do everything 2005-07-16 Jason Coombs (jasonc science org) (1 replies) Do either of you seriously believe that it will ever be safe to use a software programmable CPU to automatically process data that originates from some place other than your fingertips? The entire personal and business computer industry is producing broken and dangerous products, yet it would requi [ more ] [ reply ] Re: [Full-disclosure] Why Vulnerability Databases can't do everything 2005-07-16 Joel Maslak (jmaslak antelope net) Internet Explorer / MSN ICC Profiles Crash PoC Exploit 2005-07-16 edward11 postmaster co uk */-----------------------------edwardgagnon--------------/* Can crash msn and execute commands Windows has a buffer overflow vulnerability in the processing of embedded ICC Profiles inside images (jpeg, tiff, etc...) To test - create a jpeg in adobe photoshop and save it with the ICC checkbox en [ more ] [ reply ] [ GLSA 200507-16 ] dhcpcd: Denial of Service vulnerability 2005-07-15 Thierry Carrez (koon gentoo org) Any info on potential 0day RDP vuln? 2005-07-15 Mark (bugtraq mwebapps com) Any one have any info on the '0day' RDP DOS vuln as being reported by SANS: http://isc.sans.org/diary.php "Windows 0 day exploit? News of a 0 day exploit against Windows Remote Desktop this morning has been light on details. A remote DOS is possible and has been discussed on the daily dave mailing [ more ] [ reply ] |
|
Privacy Statement |
this is another bug I encountered during my research on console servers.
Summary:
Port Access Control Bypass Vulnerability on MRVs
In-Reach console servers.
Details:
MRV's In-Reach console servers come with feature that enables access to
their ports by ssh public keys. As opposed to e.g. stan
[ more ] [ reply ]