|
Colapse all |
Post message
AOL AIM Instant Messenger Buddy Icon "ateimg32.dll" DoS 2005-06-07 Tom Ferris (tommy security-protocols com) [ GLSA 200506-03 ] Dzip: Directory traversal vulnerability 2005-06-06 Thierry Carrez (koon gentoo org) `tattle` -- automatic reporting of SSH brute-force attacks 2005-06-05 C.J. Steele, CISSP (coreyjsteele yahoo com) Inspired by a post to the SANS Intrusions list, I have written `tattle` to automate the reporting of SSH brute-force attacks. `tattle` is a perl script that crawls through your sshd logs (/var/log/messages, or wherever you tell it to look) and finds hosts who've connected to your SSH server. All [ more ] [ reply ] Server termination in Raknet 2.33 (before 30 May 2005) 2005-06-05 Luigi Auriemma (aluigi autistici org) GIPTables Firewall <= v1.1 insecure temporary file creation 2005-06-06 ZATAZ Audits (exploits zataz net) ######################################################### GIPTables Firewall insecure temporary file creation Vendor: http://www.giptables.org/ Advisory: http://www.zataz.net/adviso/giptables-05222005.txt Vendor informed: yes Exploit available: yes Impact : medium Exploitation : low ############# [ more ] [ reply ] LutelWall <= 0.97 insecure temporary file creation 2005-06-06 ZATAZ Audits (exploits zataz net) ######################################################### LutelWall insecure temporary file creation Vendor: http://firewall.lutel.pl/index.php Advisory: http://www.zataz.net/adviso/lutelwall-05222005.txt Vendor informed: yes Exploit available: yes Impact : medium Exploitation : low ############# [ more ] [ reply ] Popper webmail remote code execution vulnerability - advisory fix 2005-06-06 LSS Security (exposed lss hr) Hi, This advisory was already released on http://security.lss.hr, but there was a mistake in advisory page that marked vulnerable PHP line as HTML tag, so it wasn't visible within web browser. That's why b0iler described it as a false positive (http://lists.grok.org.uk/pipermail/full-disclosure/2 [ more ] [ reply ] everybuddy <= 0.4.3 insecure temporary file creation 2005-06-06 Eric Romang / DATACENTER Luxembourg (eromang dclux com) ######################################################### everybuddy insecure temporary file creation Vendor: http://www.everybuddy.com/ (no more vendor URL) Advisory: http://www.zataz.net/adviso/everybuddy-06062005.txt Vendor informed: no more vendor Exploit available: yes Impact : low Exploitati [ more ] [ reply ] [ GLSA 200506-04 ] Wordpress: Multiple vulnerabilities 2005-06-06 Sune Kloppenborg Jeppesen (jaervosz gentoo org) A new whitepaper by Watchfire - HTTP Request Smuggling 2005-06-06 Ory Segal (orysegal netvision net il) Ory Segal wrote: > Hello, > Today, Watchfire released a new whitepaper, titled "HTTP Request > Smuggling". The full paper can be found in the following link: > http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf > <BLOCKED::http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf> [ more ] [ reply ] Malicious Bundles on Mac OS X 2005-06-04 Braden Thomas (braden127 myrealbox com) I wrote some information about Malicious Bundles on Mac OS X and posted source code that you can find here: http://braden.machacking.net/bundle.html The InputManagers directory on OS X gives the user the ability to load any bundle into any application. The Obj-C runtime environment gives c [ more ] [ reply ] [FLSA-2005:152532] Updated kernel packages fix security issues 2005-06-04 Marc Deslauriers (marcdeslauriers videotron ca) Israeli industrial espionage Trojan horse sample + snort sigs 2005-06-04 Gadi Evron (ge linuxbox org) Well, it's been few days since this story broke and amazingly only a few AV companies detect it. I am distributing it to the rest of the vendors with the help of a friend, so at least that's covered, however, due to the nature of this incident and the high interest I believe many others in the secu [ more ] [ reply ] [DRUPAL-SA-2005-001] New Drupal release fixes critical security issue 2005-06-03 Uwe Hermann (uwe hermann-uwe de) CastleCops phpBB bbcode Input Validation Disclosure 2005-06-02 Paul Laudanski (zx castlecops com) *CASTLECOPS.COM SUMMARY bbcode input validation Severity: High CastleCops: http://castlecops.com/t123194-.html CVE: CAN-2005-1193 phpBB Security ID#: 266 Bugtraq ID#: 13545 Secunia #: 15298 US-CERT VU#: 113196 SecurityTracker #: 1013918 Vulnerable: viewtopic.php, privmsg.php for phpBB 2.0.14 (pos [ more ] [ reply ] XCon¡¯2005 CALL FOR PAPER 2005-06-03 alert7 (at) xfocus (dot) org [email concealed] (bugs whitecell org) hi all: http://xcon.xfocus.org/cfp.html XCon¡¯2005: XCon is an Information Security Conference organized by the XFocus Security Team which brings together information security enthusiasts and professionals from all parts of , and the world. This year¡¯s event will be held in Beijing, , Augus [ more ] [ reply ] [SECURITY] [DSA 732-1] New mailutils packages fix several vulnerabilities 2005-06-03 joey infodrom org (Martin Schulze) RE: Backdoor in Fortinet´s firewall Fortigate 2005-06-02 Matt Gibson (Mattg blueedgetech ca) I fail to see how this is a "backdoor". This is how one would reset their master password on the device. Physical access always trumps all other forms of security. Cisco routers can have their password reset if you gain physical access to them as well. And (if nothing else), this method is not n [ more ] [ reply ] [security bulletin] SSRT5962 rev.0 HP OpenView Radia mgmt - Remote access and DoS 2005-06-02 Boren, Rich (SSRT) (rich boren hp com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 HP SECURITY BULLETIN HPSBMA01143 REVISION: 0 SSRT5962 rev.0 - HP OpenView Radia Management Applications - Radia Notify Daemon Remote Unauthorized Access to Data and Denial of Service (DoS) NOTICE: There are no restrictions for distribution of t [ more ] [ reply ] SEC-CONSULT SA20050602-2 :: Exhibit Engine Blind SQL Injection 2005-06-02 Bernhard Müller (bmu sec-consult com) SEC-CONSULT SA20050602-1 :: Arbitrary File Inclusion in phpCMS 1.2.x 2005-06-02 Bernhard Müller (bmu sec-consult com) HP Radia Notify Daemon: Multiple Buffer Overflow Vulnerabilities 2005-06-01 John Cartwright (johnc grok org uk) HP Radia Notify Daemon: Multiple Buffer Overflow Vulnerabilities John Cartwright <johnc (at) grok.org (dot) uk [email concealed]> 1st June 2005 Introduction ------------ Hewlett-Packard's (formerly Novadigm) Radia contains a component known as the Radia Notify Daemon. This RADEXECD component is a small server process that lis [ more ] [ reply ] Backdoor in Fortinet´s firewall Fortigate 2005-06-01 Johan Andersson (andersson one se) (1 replies) If you have console access to this box, you are able to get root access or more by using the Username: maintainer Password: pbcpbn[here should you type the serialnr. of the box, the characters should be in Capital letters.] FortiOS: 2.x Regards Johan Andersson Atea Security, Sweden Phone: +46-709 [ more ] [ reply ] Re: Backdoor in Fortinet´s firewall Fortigate 2005-06-02 Michael J McCafferty (mike m5computersecurity com) (1 replies) PHP Execution Vulnerability in CuteNews 2005-06-02 John Cantu (john cantu gmail com) There is a vulnerability in the latest (and to the best of my knowledge, all prior versions of) CuteNews from CutePHP.com. CuteNews does not properly sanitize user input when an administrative account edits the template files. CuteNews takes HTML code from a web form and outputs it to a template fi [ more ] [ reply ] |
|
Privacy Statement |
Release Date:
June 6, 2005
Date Reported:
June 6, 2005
Severity:
Medium? (if you can exploit it, email me. ;-])
Vendor:
AOL
Systems Affected:
AIM 5.9.3797 for Windows 98/ME/2K/XP (5.96 MB) and all prior versions.
Affected Platforms:
# Win
[ more ] [ reply ]