BugTraq Mode:
(Page 1304 of 1748)  < Prev  1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309  Next >
MRV In-Reach console server: Port Access Control Bypass Vulnerability 2005-07-18
spam drwetter org
Hi,

this is another bug I encountered during my research on console servers.

Summary:
Port Access Control Bypass Vulnerability on MRVs
In-Reach console servers.

Details:
MRV's In-Reach console servers come with feature that enables access to
their ports by ssh public keys. As opposed to e.g. stan

[ more ]  [ reply ]
NTLM HTTP Authentication is insecure by design - a new writeup by Amit Klein 2005-07-18
Amit Klein (AKsecurity) (aksecurity hotpop com)
NTLM HTTP Authentication
(and possibly other connection-oriented
HTTP authentication and authorization protocols)
is insecure by design

Or

NTLM Authentication and HTTP proxies

[ more ]  [ reply ]
Broadcast format string and buffer-overflow in Race Driver 1.20 2005-07-18
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Race Driver
http://www.codemasters.com/tocaracedriver/
Versions: <= 1.20
Platforms: Windows
Bugs: A] broadcast format string

[ more ]  [ reply ]
[SECURITY] [DSA 759-1] New phppgadmin packages fix directory traversal vulnerability 2005-07-18
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 759-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
July 18th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 760-1] New ekg packages fix several vulnerabilities 2005-07-18
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 760-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
July 18th, 2005

[ more ]  [ reply ]
Re: several vulnerabilities present in Belkin wireless routers 2005-07-18
ian latter midnightcode org
Hello,

> As it can be seen, the OS firmware is developed
> by Conexant, although the routers themselves are
> from Belkin. After researching on both Belkin
> and Conexant websites I found nothing about the
> OS running in these devices and ways to
> configure them through telnet. However, the
>

[ more ]  [ reply ]
HPSBTU01210 SSRT4743, SSRT4884 rev.0 - HP Tru64 UNIX TCP/IP remote Denial of Service (DoS) 2005-07-18
Security Alert (secure hpchs cup hp com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBTU01210 REVISION: 0

SSRT4743, SSRT4884 rev.0 - HP Tru64 UNIX TCP/IP remote Denial of
Service (DoS)

NOTICE:
There are no restrictions for distribution of this Security
Bulletin provided that it r

[ more ]  [ reply ]
[KDE Security Advisory]: Kate backup file permission leak 2005-07-18
Dirk Mueller (mueller kde org)

KDE Security Advisory: Kate backup file permission leak
Original Release Date: 2005-07-18
URL: http://www.kde.org/info/security/advisory-20050718-1.txt

0. References
CVE CAN-2005-1920
https://bugs.kde.org/show_bug.cgi?id=103331

1. Systems affected:

All maintained version

[ more ]  [ reply ]
[SECURITY] [DSA 758-1] New heimdal packages fix arbitrary code execution 2005-07-18
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 758-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
July 18th, 2005

[ more ]  [ reply ]
Re: several vulnerabilities present in Belkin wireless routers 2005-07-15
Ian Clelland (ian veryfresh com)
On Fri, Jul 15, 2005 at 04:37:10PM +0100, Steve Kemp wrote:
> On Fri, Jul 15, 2005 at 08:14:14AM -0000, m123303 (at) securityfocus (dot) com [email concealed] wrote:
>
> > The first problem is the existance of a default telnet backdoor
> > running on the usual 23/tcp port. From my experience, telnet
> > interfaces are NOT enab

[ more ]  [ reply ]
[ZH2005-16SA] Insecure temporary file creation in Skype for Linux 2005-07-16
badpenguin zone-h org
[ZH2005-16SA] Insecure temporary file creation in Skype for Linux

Application: Skype for Linux
Version affected: <= 1.1.0.20
Vendor website : http://www.skype.com

Author: Giovanni Delvecchio
e-mail: badpenguin at zone-h.org

About Skype
==========
Skype is a free program that uses the latest P

[ more ]  [ reply ]
Re: [HSC Security Group] Invision PowerBoard 1.3.x - 2-x Exploit and Patch 2005-07-16
augustusx00 gmail com
Isn't that the same code as this, but with the credits ripped?

http://www.milw0rm.com/id.php?id=1013

Also, your "discovery" is _OLD_ news.

http://forums.invisionpower.com/index.php?showtopic=168016

I see hackerscenter.com uses Invision Power Board. If you guys are just now finding out about this

[ more ]  [ reply ]
PowerDNS 2.9.18 fixes two security issues affecting users of LDAP backend or limited recursion 2005-07-16
bert hubert netherlabs nl
PowerDNS 2.9.18 fixes two bugs with security implications, which only apply to installations running on the LDAP backend, or installations providing recursion to a limited range of IP addresses. If any of these apply to you, an upgrade is highly advised.

Version 2.9.18 release notes are on: http://

[ more ]  [ reply ]
[HSC Security Group] Invision PowerBoard 1.3.x - 2-x Exploit and Patch 2005-07-16
zinho hackerscenter com (1 replies)
Hackers Center Security Group (http://www.hackerscenter.com/)
Zinho's Security Advisory

Desc: Invision PowerBoard 1.3.x - 2.x Privilege escalation through SQL injection
Risk: High

hacky0u from http://www.h4cky0u.org kindly reported to me an exploit working against 1.3.x and 2.x versions of Invisi

[ more ]  [ reply ]
Installation of software, and security. . . 2005-07-16
John Richard Moser (nigelenki comcast net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I just had some time to think, and I've come across something that
bothers me a lot. I've been attempting to write a small reference that
pools together all of the knowledge I've accumulated about security
enhancements that can be minimally invasive an

[ more ]  [ reply ]
RE: Any info on potential 0day RDP vuln? 2005-07-15
Altheide, Cory B. (IARC) (AltheideC nv doe gov)
> -----Original Message-----
> From: Mark [mailto:bugtraq (at) mwebapps (dot) com [email concealed]]
> Sent: Friday, July 15, 2005 12:43 PM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Any info on potential 0day RDP vuln?
>
>
> Any one have any info on the '0day' RDP DOS vuln as being
> reported by SANS:

https://www.immunity

[ more ]  [ reply ]
Solaris Runtime Linker - Exploit Detection 2005-07-16
petefran gmail com
This is a demonstration of exploit detection using the Solaris implementation of C2 Auditing (BSM) to detect the system has been compromised. Of course , it helps to be logging locally as well to a secure central log server or protected media.

This was tested on an unpatched Solaris 10 Sparc syste

[ more ]  [ reply ]
Re: On classifying attacks 2005-07-16
Derek Martin (code pizzashack org) (1 replies)
On Fri, Jul 15, 2005 at 06:40:42PM -0500, James Longstreet wrote:
>
> On Jul 14, 2005, at 9:39 PM, Derek Martin wrote:
>
> > This kind of attack has a name already: it is a trojan horse.
> <snip>
> > But is this a remote exploit?
>
> No, it's not an exploit at all. Systems are not vulnerable to

[ more ]  [ reply ]
Re: On classifying attacks 2005-07-17
Godwin Stewart (gstewart spamcop net)
Re: [Full-disclosure] Why Vulnerability Databases can't do everything 2005-07-16
Jason Coombs (jasonc science org) (1 replies)
Do either of you seriously believe that it will ever be safe to use a software programmable CPU to automatically process data that originates from some place other than your fingertips?

The entire personal and business computer industry is producing broken and dangerous products, yet it would requi

[ more ]  [ reply ]
Re: [Full-disclosure] Why Vulnerability Databases can't do everything 2005-07-16
Joel Maslak (jmaslak antelope net)
Internet Explorer / MSN ICC Profiles Crash PoC Exploit 2005-07-16
edward11 postmaster co uk
*/-----------------------------edwardgagnon--------------/*

Can crash msn and execute commands

Windows has a buffer overflow vulnerability in the processing of embedded ICC Profiles
inside images (jpeg, tiff, etc...)

To test - create a jpeg in adobe photoshop and save it with the ICC checkbox en

[ more ]  [ reply ]
[ GLSA 200507-16 ] dhcpcd: Denial of Service vulnerability 2005-07-15
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200507-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Any info on potential 0day RDP vuln? 2005-07-15
Mark (bugtraq mwebapps com)
Any one have any info on the '0day' RDP DOS vuln as being reported by SANS:

http://isc.sans.org/diary.php
"Windows 0 day exploit?
News of a 0 day exploit against Windows Remote Desktop this morning has been light on details. A remote DOS is possible and has been discussed on the daily dave mailing

[ more ]  [ reply ]
(Page 1304 of 1748)  < Prev  1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus