BugTraq Mode:
(Page 1340 of 1748)  < Prev  1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345  Next >
TSLSA-2005-0015 - postgresql 2005-04-25
Trustix Security Advisor (tsl trustix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Security Advisory #2005-0015

Package name: postgresql
Summary: Buffer overflows
Date: 2005-04-25
Affected versions: Trustix Se

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted 2005-04-23
Antoine Martin (antoine nagafix co uk)
On Sat, 2005-04-23 at 09:02 -0400, Stephen Frost wrote:
> * Antoine Martin (antoine (at) nagafix.co (dot) uk [email concealed]) wrote:
> > Basically, multiple input data that have the same output hash, which is
> > of no use when what you are trying to find is the input.
> > Finding collisions quicker for a known input is one t

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted 2005-04-23
Stephen Frost (sfrost snowman net)
* Antoine Martin (antoine (at) nagafix.co (dot) uk [email concealed]) wrote:
> Basically, multiple input data that have the same output hash, which is
> of no use when what you are trying to find is the input.
> Finding collisions quicker for a known input is one thing, but that is
> not going to reduce the search space, not ev

[ more ]  [ reply ]
Multiple Sql injection and XSS in CartWIZ ASP Cart 2005-04-24
dcrab (dcrab hackerscenter com)


Dcrab 's Security Advisory
[Hsc Security Group] http://www.hackerscenter.com/
[dP Security] http://digitalparadox.org/

Get Dcrab's Services to audit your Web servers, scripts, networks, etc. Learn more at http://www.digitalparadox.org/services.ah

Severity: High
Title: Multiple Sql injection and

[ more ]  [ reply ]
E-Cart v1.1 Remote Command Execution 2005-04-23
Nicolas Montoza (xonico gmail com)
============================================================
Title: E-Cart v1.1 Remote Command Execution
Vulnerability discovery: SoulBlack - Security Research -
http://soulblack.com.ar
Date: 20/04/2005
Severity: High. Remote Users Can Execute Arbitrary Code.
Affected version: <= E-Cart 2004 v1.1
Ve

[ more ]  [ reply ]
Local file detection found through Adobe Reader ActiveX control 2005-04-23
Hyperdose Security (robfly hyperdose com)
Hyperdose Security Advisory

Name: Local file detection found through Adobe Reader ActiveX control
Systems Affected: Adobe Reader 7.0 and earlier
Severity: Low
Author: Robert Fly - robfly (at) hyperdose (dot) com [email concealed]
Advisory URL: http://www.hyperdose.com/advisories/H2005-06.txt

--Adobe Description--
From Adobe

[ more ]  [ reply ]
artmedic_links5 remote file access exploit 2005-04-23
Adam n30n Simuntis (n30n satfilm net pl)


You can read details of this vulnerability here: http://www.securityfocus.com/archive/1/367144

Very simple source of exploit, enjoy.

/*
* artmedic_links5 remote file access exploit
* Adam Simuntis <n30n (at) o2 (dot) pl [email concealed]>
*/

#include <stdio.h>
#include <stdlib.h>
#include <arpa/inet.h>
#include <sys/

[ more ]  [ reply ]
ACSblog bug 2005-04-23
farhad koosha (farhadkey yahoo com)


*/ WWW.BAHADORLOVER.COM \*

ACSblog :
A asp weblog with manageable code blocks and logical structure make it easy for the novice to get into the code and customize it to your site. Full-featured enough for expert bloggers

vendor:www.asppress.com

Where is the bug ?

inc_login_check.asp

<% if re

[ more ]  [ reply ]
-==phpBB 2.0.14 Multiple Vulnerabilities==- 2005-04-23
HaCkZaTaN (hck_zatan hotmail com)


/*
--------------------------------------------------------
[N]eo [S]ecurity [T]eam [NST]® - Advisory #14 - 17/04/05
--------------------------------------------------------
Program: phpBB 2.0.14
Homepage: http://www.phpbb.com
Vulnerable Versions: phpBB 2.0.14 & Lower versions
Risk: Low Risk!!
I

[ more ]  [ reply ]
Multiple Sql injection vulnerabilities in BK Forum v.4 2005-04-23
dcrab (dcrab hackerscenter com)


Dcrab 's Security Advisory
[Hsc Security Group] http://www.hackerscenter.com/
[dP Security] http://digitalparadox.org/

Get Dcrab's Services to audit your Web servers, scripts, networks, etc. Learn more at http://www.digitalparadox.org/services.ah

Severity: High
Title: Multiple Sql injection vuln

[ more ]  [ reply ]
New auto download / install / exploit URL? 2005-04-23
Gandalf The White (gandalf digital net)
Greetings and Salutations:

Just received the attached e-mail with the below suspicious URL. I did a
fetch on the URL and received the item after the part labeled:
------ Fetched URL

FYI. Looks like possibly a Microsoft Media player exploit?

Someone want to take the time to decode?

Ken

-------

[ more ]  [ reply ]
[SePro Bugtraq] WBB - WoltLab Burning Board <= 2.3.1 - XSS Vulnerability (22.04.05) 2005-04-22
deluxe security-project org


[SePro Bugtraq] WBB - WoltLab Burning Board <= 2.3.1 - XSS Vulnerability (22.04.05)

Vendor: WoltLab
URL: http://www.woltlab.de/
Version: <= 2.3.1
Type: XSS

Discovered by deluxe89

Description:
--------------------------------
The WoltLab Burning Board is a high customisable forum softw

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-05:05.cvs 2005-04-22
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-05:05.cvs Security Advisory
The FreeBSD Project

Topic: Mu

[ more ]  [ reply ]
BitDefender 8 - Race condition vulnerability 2005-04-23
SecuBox fRoGGz (unsecure writeme com)


-----------------------------
Product: BitDefender
Version: 8
Tested on: Windows 2000 SP4
Vulnerability: Race condition
-----------------------------

BACKGROUND
----------
BitDefender ensures the most advanced antivirus protection, as well as data
confidentiality, active content control and Inte

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encryptedpasswords 2005-04-22
Antoine Martin (antoine nagafix co uk)
On Thu, 2005-04-21 at 17:27 -0500, Bruno Wolff III wrote:
> On Wed, Apr 20, 2005 at 22:27:01 -0400,
> Stephen Frost <sfrost (at) snowman (dot) net [email concealed]> wrote:
> >
> > SHA2 would also be nice.
>
> I think the new hash functions are called SHA256 and SHA512.
> For Postgres' purposes the recent weaknesses found i

[ more ]  [ reply ]
Re: RealNetworks RealPlayer/RealOne Player/Helix Player Remote Heap Overflow 2005-04-21
Göran Sandahl (goran gsandahl net)
Hi,

Does this overflow affect versions of RealPlayer installable on mobile
platforms too (like Windows PocketPC, CE, mobile et cetera)?

Regards
Göran Sandahl

On Wednesday 20 April 2005 07:08, Piotr Bania wrote:
> RealNetworks RealPlayer/RealOne Player/Helix Player Remote Heap
> Overflow
> b

[ more ]  [ reply ]
Re: Microsoft Windows image rendering DoS vuln 2005-04-21
Jesse Morgan (jesse jesterpm net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I was using Firefox 1.0.2 when I first tried it, and I upgraded to
Firefox 1.0.3 the day I tried to recreate it myself. Maybe someone threw
a quick fix in before 1.0.3 was released? The vulnerability isn't
mentioned on the vulnerabilities page though.

[ more ]  [ reply ]
Microsoft Windows image rendering DoS vuln 2005-04-21
Luis Alberto Cortes Zavala (napa hackersoft net)


Mmm i don`t know, i test it and my pc crashed, it looks that get all my windows virtual memory, and any key didn´t works fine, so I have to make ?button reboot?. If someone knows how to make something with the flaw I hope comments..

I seen source code, for me looks that ypu have to put a lot

[ more ]  [ reply ]
[ GLSA 200504-23 ] Kommander: Insecure remote script execution 2005-04-22
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200504-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200504-22 ] KDE kimgio: PCX handling buffer overflow 2005-04-22
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200504-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200504-21 ] RealPlayer, Helix Player: Buffer overflow vulnerability 2005-04-22
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200504-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Stephen Frost (sfrost snowman net)
* Mike Fratto (mfratto (at) nwc (dot) com [email concealed]) wrote:
> Since the salt is known, it has no effect on the "keyspace" because you
> don't have to guess it. If there was no salt, then pre-computing a
> dictionary is a much smaller task.

That's the whole point of the discussion- the way Postgres's pg_shadow
stuff w

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Jim Knoble (jmknoble pobox com)
Circa 2005-04-21 dixit Mike Fratto:

:
: > I thought the idea of the salt was to aid in expanding the
: > keyspace. Even though the salt is known (in traditional Unix
: > passwd/shadow/master.passwd databases,
:
: I am pretty sure the intent the salt is to make pre-computation of a
: dictionar

[ more ]  [ reply ]
[PLSN-0003] - Remote exploits in MPlayer 2005-04-21
Peachtree Linux Security Team (security peachtree burdell org)
------------------------------------------------------------------------
---
Peachtree Linux Security Notice PLSN-0003
April 20, 2005

Remote buffer overflow and possible code execution in mplayer
http://www.mplayerhq.hu/homepage/design7/news.html#vuln10
http://www.mplayerhq.hu/homepage/design7/news.

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Bruno Wolff III (bruno wolff to)
On Wed, Apr 20, 2005 at 22:27:01 -0400,
Stephen Frost <sfrost (at) snowman (dot) net [email concealed]> wrote:
>
> SHA2 would also be nice.

I think the new hash functions are called SHA256 and SHA512.
For Postgres' purposes the recent weaknesses found in SHA1 and MD5
aren't a big deal.

[ more ]  [ reply ]
RE: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Mike Fratto (mfratto nwc com)

> The salt isn't always known... I don't know how an
> unprivledged user on a system w/ /etc/shadow could get at it
> anyway. I'm sure alot of people would be very anxious to
> know if you know of a way to do that...

The salt is known, just not by an unpriveledged user. But if you can access

[ more ]  [ reply ]
RE: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Mike Fratto (mfratto nwc com)

> That's the whole point of the discussion- the way Postgres's
> pg_shadow stuff works the salt is known and *because* of that
> it might as well not exist since it means that you can
> pre-compute the keyspace.

I see your point. I don't know anything about postgres. I don't use it. But
if so

[ more ]  [ reply ]
RE: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Mark Senior (Mark Senior gov ab ca)
It also slows down cracking numerous passwords in parallel using a
dictionary/heuristic approach a la john the ripper - without a salt, you
can calculate the hash of each password guess once, and then scan
through an entire shadow file for the hash. With salts, you have to
hash each guess once per

[ more ]  [ reply ]
Multiple vulnerabilities in Argosoft Mail Server 1.8.7.6 2005-04-22
ShineShadow (ss_contacts hotmail com)


ShineShadow Security Report 22042005-04

TITLE: Multiple vulnerabilities in Argosoft Mail Server Pro 1.8.7.6.

BACKGROUND

ArGoSoft Mail Server is fully functional SMTP/POP3/Finger (Pro version also has IMAP module) server for Windows 95/98/NT/2000, which will let you turn your computer into the

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted 2005-04-22
Michael Samuel (michael miknet net)
On Thu, 21 Apr 2005 11:32 pm, Rod Taylor wrote:
> On Thu, 2005-04-21 at 11:06 +0200, Tino Wildenhain wrote:
>
> One advantage of a random salt would be that the username can be changed
> without having to reset the password at the same time.

And the main advantage is that if you have an account wit

[ more ]  [ reply ]
(Page 1340 of 1748)  < Prev  1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus