BugTraq Mode:
(Page 1342 of 1748)  < Prev  1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347  Next >
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Stephen Frost (sfrost snowman net)
* Tom Lane (tgl (at) sss.pgh.pa (dot) us [email concealed]) wrote:
> "Jim C. Nasby" <decibel (at) decibel (dot) org [email concealed]> writes:
> > Simply put, MD5 is no longer strong enough for protecting secrets. It's
> > just too easy to brute-force. SHA1 is ok for now, but it's days are
> > numbered as well. I think it would be good to alter SHA1 (or so

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encryptedpasswords 2005-04-21
Tino Wildenhain (tino wildenhain de)
Am Mittwoch, den 20.04.2005, 16:23 -0500 schrieb Jim C. Nasby:
> On Wed, Apr 20, 2005 at 05:03:18PM -0400, Tom Lane wrote:
...
> Simply put, MD5 is no longer strong enough for protecting secrets. It's
> just too easy to brute-force. SHA1 is ok for now, but it's days are
> numbered as well. I think i

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Joshua D. Drake (jd commandprompt com)
> Simply put, MD5 is no longer strong enough for protecting secrets. It's
> just too easy to brute-force. SHA1 is ok for now, but it's days are
> numbered as well. I think it would be good to alter SHA1 (or something
> stronger) as an alternative to MD5, and I see no reason not to use a
> random sal

[ more ]  [ reply ]
[SECURITY] [DSA 701-2] New samba packages fix correct sporadic crash 2005-04-21
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 701-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 21st, 2005

[ more ]  [ reply ]
Re: Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-21
Josh Berkus (josh agliodbs com)
David, Stephen,

> I noted that this was a problem back in August, 2002:
>
> http://archives.postgresql.org/pgsql-admin/2002-08/msg00253.php
>
> Then, as now, the developers weren't very concerned.

Well, from our perspective, a random salt only protects against a very narrow
range of attack types

[ more ]  [ reply ]
MDKSA-2005:074 - Updated gnome-vfs2 packages fix vulnerability 2005-04-21
Mandriva Security Team (security mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Update Advisory
_______________________________________________________________________

Package name: gnome-vfs2
Advisory ID:

[ more ]  [ reply ]
directory traversal in Yawcam 0.2.5 2005-04-21
Donato Ferrante (fdonato autistici org)

Donato Ferrante

Application: Yawcam
http://www.yawcam.com

Version: 0.2.5

Bug: directory traversal

Date: 21-Apr-2005

Author: Donato Ferrante
e-mail: fdonato (at) autistici (dot) org [email concealed]
web: www.autistici.org

[ more ]  [ reply ]
MDKSA-2005:076 - Updated xli packages fix multiple vulnerabilities 2005-04-21
Mandriva Security Team (security mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Update Advisory
_______________________________________________________________________

Package name: xli
Advisory ID:

[ more ]  [ reply ]
[SECURITY] [DSA 713-1] New junkbuster packages fix several vulnerabilities 2005-04-21
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 713-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 21st, 2005

[ more ]  [ reply ]
[PLSN-0004] - Buffer overflow in PostgreSQL 2005-04-21
Peachtree Linux Security Team (security peachtree burdell org)
------------------------------------------------------------------------
---
Peachtree Linux Security Notice PLSN-0004
April 20, 2005

Buffer overflow in PL/PGSQL parser allowing database users to run arbitrary
code as pgsql user
CAN-2005-0245, CAN-2005-0247
------------------------------------------

[ more ]  [ reply ]
[PLSN-0002] - Multiple vulnerabilities in Gaim 2005-04-21
Peachtree Linux Security Team (security peachtree burdell org)
------------------------------------------------------------------------
---
Peachtree Linux Security Notice PLSN-0002
April 20, 2005

Multiple remote vulnerabilities in Gaim
CAN-2005-0965, CAN-2005-0966, CAN-2005-0967, CAN-2005-0208, CAN-2005-0473,
CAN-2005-0472
-------------------------------------

[ more ]  [ reply ]
Re: Microsoft Windows image rendering DoS vuln 2005-04-20
patrick (mccpat gmail com)
Andrew wrote:

> Alpha-Pi-Omicron Pi-Alpha-Nu-Tau-Omicron-C?
> Kappa-Alpha-Kappa-Omicron-Delta-Alpha-Iota-Mu-Omicron-Nu-Omicron-C?
> __ ___ __ _____ _ _
> ___ _ _
> / / /___\/ // _ / /\ /(_) __ _| |__ / __\___ _ _

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Tom Lane (tgl sss pgh pa us)
Bruce Momjian <pgman (at) candle.pha.pa (dot) us [email concealed]> writes:
> That's what I told him. I think his concern about pre-computed hashes
> is the only real issue, and give 'postgres' is usually the super-user, I
> can see someone pre-computing md5 postgres hashes and doing quick
> comparisons, perhaps as a root kit

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Tom Lane (tgl sss pgh pa us)
"Jim C. Nasby" <decibel (at) decibel (dot) org [email concealed]> writes:
> Simply put, MD5 is no longer strong enough for protecting secrets. It's
> just too easy to brute-force. SHA1 is ok for now, but it's days are
> numbered as well. I think it would be good to alter SHA1 (or something
> stronger) as an alternative to MD5,

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Jim C. Nasby (decibel decibel org)
On Wed, Apr 20, 2005 at 06:03:18PM -0400, Tom Lane wrote:
> Well, I have no particular problem with offering SHA1 as an alternative
> hash method for those who find MD5 too weak ... but I still question the
> value of putting any random salt in the table. AFAICS you would have to
> send that salt a

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Bruce Momjian (pgman candle pha pa us)
Tom Lane wrote:
> "Jim C. Nasby" <decibel (at) decibel (dot) org [email concealed]> writes:
> > Simply put, MD5 is no longer strong enough for protecting secrets. It's
> > just too easy to brute-force. SHA1 is ok for now, but it's days are
> > numbered as well. I think it would be good to alter SHA1 (or something
> > stronger)

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Tom Lane (tgl sss pgh pa us)
Stephen Frost <sfrost (at) snowman (dot) net [email concealed]> writes:
> The md5 hash which is generated for and stored in pg_shadow does not
> use a random salt but instead uses the username which can generally be
> determined ahead of time (especially for the 'postgres' superuser
> account).

So?

The fact that we en

[ more ]  [ reply ]
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Jim C. Nasby (decibel decibel org)
On Wed, Apr 20, 2005 at 05:03:18PM -0400, Tom Lane wrote:
> > This would allow for the pregeneration of the entire md5
> > keyspace using that 'salt' and then quick breakage of the hash once
> > it's retrieved by the attacker.
>
> Considering the size of the possible keyspace, this is pretty

[ more ]  [ reply ]
Linux vsyscalls may be used as attack vectors 2005-04-20
Clad Strife (thadeum gmail com)
I send (again !) this e-mail including in attachment an advisory
explaining how vsyscalls may be used as powerful attack vectors on
Linux 2.6.x kernels.

I received many mailer daemon replies for delivery failures in
multiple boxes with my last e-mail. I hope this one will be okay.
Please, confirm.

[ more ]  [ reply ]
cpio directory traversal vulnerability 2005-04-20
Imran Ghory (imranghory gmail com)
================================
cpio directory traversal vulnerability
================================

Software: cpio
Version: cpio 2.6
Software URL: <http://www.gnu.org/software/cpio/>
Platform: Unix, Linux.
Vulnerability type: Input validation
Severity: Medium, local vuln, Can result in privil

[ more ]  [ reply ]
Re: Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
David F. Skoll (dfs roaringpenguin com)
Stephen Frost wrote:

> The md5 hash which is generated for and stored in pg_shadow does not
> use a random salt but instead uses the username which can generally be
> determined ahead of time (especially for the 'postgres' superuser
> account).

I noted that this was a problem back in Augus

[ more ]  [ reply ]
Re: Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Stephen Frost (sfrost snowman net)
* David F. Skoll (dfs (at) roaringpenguin (dot) com [email concealed]) wrote:
> Stephen Frost wrote:
> > The md5 hash which is generated for and stored in pg_shadow does not
> > use a random salt but instead uses the username which can generally be
> > determined ahead of time (especially for the 'postgres' superuser
> >

[ more ]  [ reply ]
PMsoftware mini http server remote stack overflow exploit (IHSTeam) 2005-04-20
c0d3r ihsteam com
/*
PMsoftware mini http server remote stack overflow exploit
author : c0d3r "kaveh razavi" c0d3rz_team (at) yahoo (dot) com [email concealed] c0d3r (at) ihsteam (dot) com [email concealed]
package : PMsoftware Web Server version 1.0
advisory :http://www.securiteam.com/windowsntfocus/5TP0B2KFGA.html
..........
see the attachment

[ more ]  [ reply ]
Re: Vulnerability in Coppermine Photo Gallery 1.3.* 2005-04-21
nibbler999 users sf net
In-Reply-To: <20050418122434.10438.qmail (at) www.securityfocus (dot) com [email concealed]>

This issue has been addressed in Coppermine 1.3.3. The release announcement can be found here - http://coppermine.sourceforge.net/board/index.php?topic=17134.0

Thankyou for bringing this to our attention.

Nibbler
Coppermine Dev Team.

[ more ]  [ reply ]
gzip directory traversal vulnerability 2005-04-20
Imran Ghory (imranghory gmail com)
================================
gzip directory traversal vulnerability
================================

Software: gzip
Version: 1.2.4, 1.3.3
Software URL: <http://www.gzip.org>
Platform: Unix, Linux.
Vulnerability type: Input validation
Severity: Medium, local vuln, requires user using gunzip -N

[ more ]  [ reply ]
Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords 2005-04-20
Stephen Frost (sfrost snowman net)
Greetings,

There appears to be some deficiencies in both the documentation of the
'md5' authentication methology (in pg_hba.conf) and in the md5 hash
generation which is stored in pg_shadow.

The md5 hash which is generated for and stored in pg_shadow does not
use a random salt but instea

[ more ]  [ reply ]
Linux vsyscalls may be used as attack vectors 2005-04-19
Clad Strife (thadeum gmail com)
Greets to David ;)

[ more ]  [ reply ]
Shoutbox SCRIPT <= 3.0.2 Administrative MD5 Username and Password Retrieval [x0n3-h4ck] 2005-04-19
CorryL (corryl sitoverde com)
-=[--------------------ADVISORY-------------------]=-
-=[
]=-
-=[ Shoutbox SCRIPT <= 3.0.2 ]=-
-=[
]=-
-=[ Aut

[ more ]  [ reply ]
Ecommerce-Carts SQL injection vulnerability ( IHSTeam ) 2005-04-19
c0d3r ihsteam com
********************************************
IHS Iran Hackers Sabotage Public advisory
by : c0d3r "Kaveh Razavi" c0d3r (at) ihsteam (dot) com [email concealed]
********************************************

----------------------------------------------------------

advisory url :
http://www.ihssecurity.com/cms/modules/mydownlo

[ more ]  [ reply ]
Secure Science Corporation Application Software Advisory 055 2005-04-20
SSC Advisory Notice (bugtraq securescience net)
Please see attached Advisory.

Secure Science Corporation
securescience.net
bugtraq (at) securescience (dot) net [email concealed]

[ more ]  [ reply ]
(Page 1342 of 1748)  < Prev  1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus