BugTraq Mode:
(Page 1345 of 1748)  < Prev  1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350  Next >
FreeBSD Security Advisory FreeBSD-SA-05:04.ifconf 2005-04-15
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-05:04.ifconf Security Advisory
The FreeBSD Project

Topic: Ke

[ more ]  [ reply ]
Enumeration of AS/400 users and their status via POP3 2005-04-14
Shalom Carmel (shalom venera com)
Enumeration of AS/400 users and their status via POP3

Overview
------------
The POP3 service is installed on all modern AS/400
and iSeries servers, and is turned on by default,
even in cases when email serving was not set up.

To access a POP3 server, you must authenticate and
provide a user an

[ more ]  [ reply ]
[USN-112-1] PHP4 vulnerabilities 2005-04-14
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-112-1 April 14, 2005
php4 vulnerabilities
CAN-2005-1042, CAN-2005-1043
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty

[ more ]  [ reply ]
[USN-111-1] Squid vulnerability 2005-04-14
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-111-1 April 14, 2005
squid vulnerability
CAN-2005-0718
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The fo

[ more ]  [ reply ]
Re: bzip2 TOCTOU file-permissions vulnerability 2005-04-14
Steve Grubb (linux_4ever yahoo com)
In-Reply-To: <20050402183613.GA26660 (at) securityfocus (dot) com [email concealed]>

Since no one's posted a fix...here's a stab at it.

-Steve Grubb

===============

diff -urb bzip2-1.0.2.orig/bzip2.c bzip2-1.0.2/bzip2.c
--- bzip2-1.0.2.orig/bzip2.c 2005-04-14 08:45:35.013302280 -0400
+++ bzip2-1.0.2/bzip2.c 2005-04-14 09

[ more ]  [ reply ]
Re: gzip TOCTOU file-permissions vulnerability 2005-04-14
Steve Grubb (linux_4ever yahoo com)
In-Reply-To: <7389fc4b05040412574f819112 (at) mail.gmail (dot) com [email concealed]>

Since no one has posted a fix...here's a stab at it.

-Steve Grubb

================

diff -ur gzip-1.3.5.orig/gzip.c gzip-1.3.5/gzip.c
--- gzip-1.3.5.orig/gzip.c 2005-04-14 09:25:04.941018504 -0400
+++ gzip-1.3.5/gzip.c 2005-04-14 09:

[ more ]  [ reply ]
Trusted Site Cross Site Scripting Elevation of Privilege in Musicmatch 2005-04-14
Hyperdose Security (robfly hyperdose com)
Hyperdose Security Advisory

Name: Trusted Site Cross Site Scripting Elevation of Privilege in Musicmatch
Systems Affected: Musicmatch v10.00.2047 or earlier (according to Yahoo
v9.00.5059 and earlier are also affected)
Severity: Moderate
Author: Robert Fly - robfly (at) hyperdose (dot) com [email concealed]
Advisory URL: http

[ more ]  [ reply ]
Trojan file issue in Musicmatch software 2005-04-14
Hyperdose Security (robfly hyperdose com)
Hyperdose Security Advisory

Name: Arbitrary file overwrite in Musicmatch
Systems Affected: Musicmatch v10.00.2047 or earlier (according to Yahoo
v9.00.5059 and earlier are also affected)
Severity: Moderate
Author: Robert Fly - robfly (at) hyperdose (dot) com [email concealed]
Advisory URL: http://www.hyperdose.com/advisories

[ more ]  [ reply ]
RE: gzip TOCTOU file-permissions vulnerability 2005-04-14
Mark Senior (Mark Senior gov ab ca) (2 replies)


> From: Derek Martin [mailto:code (at) pizzashack (dot) org [email concealed]]
> Sent: April 13, 2005 08:50
>
>
> The open() call is at fault here. If instead of being called
> with a mode of RW_USER, it is called with the final intended
> access mode, there is no need to later call chmod(), and the
> problem is avert

[ more ]  [ reply ]
Re: gzip TOCTOU file-permissions vulnerability 2005-04-15
devnull Rodents Montreal QC CA
Re: gzip TOCTOU file-permissions vulnerability 2005-04-14
Derek Martin (code pizzashack org)
Multiple vulnerabilities in Yager 5.24 2005-04-14
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Yager
http://www.yager-game.de
Versions: <= 5.24
Platforms: Windows
Bugs: A] nickname buffer-overflow
B] data block buffer-o

[ more ]  [ reply ]
Multiple multiple sql injection/errors and xss vulnerabilities in OneWorldStore 2005-04-14
dcrab (dcrab hackerscenter com)


Dcrab 's Security Advisory
[Hsc Security Group] http://www.hackerscenter.com/
[dP Security] http://digitalparadox.org/

Get Dcrab's Services to audit your Web servers, scripts, networks, etc. Learn more at http://www.digitalparadox.org/services.ah

Severity: High
Title: Multiple multiple sql injec

[ more ]  [ reply ]
BCS Asia 2005 Slides and pictures 2005-04-14
Anthony Zboralski (bcs2005 bellua com)
Dear Bugtraq readers,

Just a brief note to tell you that the proceedings and pictures from
the conference
are online.

http://www.bellua.com/bcs2005/asia05.archive.html
http://www.bellua.com/bcs2005/asia05.pictures/

The event was opened by keynote speeches from the Minister of
Communications a

[ more ]  [ reply ]
Computer Associates BrightStor ARCserve Backup and BrightStor Enterprise Backup UniversalAgent buffer overflow vulnerability 2005-04-14
Williams, James K (James Williams ca com)

With the assistance of iDEFENSE, Computer Associates has identified a
buffer overflow vulnerability in the BrightStor ARCserve Backup
Universal
Agent Service for Windows and the BrightStor Enterprise Backup Universal

Agent Service for Windows. This service is a common component of Windows

based

[ more ]  [ reply ]
Re: serendipity SQL Injection vulnerability 2005-04-14
sebastian nohn net
In-Reply-To: <20050413202205.7e0c8bb1 (at) xaero.tvpro (dot) net [email concealed]>

>Program: serentdipity web blog system
>Version: 0.8beta4
>Module: exit.php
>Bug type: SQL Injection
>Vendor site: http://www.s9y.org/
>Vendor Informed: Yes

The vendor has NOT been informed.

[ more ]  [ reply ]
Security Contact for NetApp ? 2005-04-14
Fabrice Marie (fmarie gmail com) (1 replies)
Hi,

Google didn't find any security contact for netapp..
Anybody knows who I should be emailing ?

Thanks.

Fabrice.

[ more ]  [ reply ]
Re: Security Contact for NetApp ? 2005-04-14
Antonio Varni (antonio varni gmail com)
sumus[v0.2.2]: (httpd) remote buffer overflow exploit. 2005-04-14
Vade 79 (v9 fakehalo deadpig org)


did a random audit of 'sumus' and found a unique/fun exploit
situation...

original exploit:
http://fakehalo.us/xsumus.c

----------------------- example: xsumus -----------------------

# gcc xsumus.c -o xsumus
# ./xsumus -h fedora.fakehalo.lan
[*] sumus[v0.2.2]: (httpd) remote buffer overflow

[ more ]  [ reply ]
All4WWW-Homepagecreator Remote Command Execution 2005-04-14
Francisco Alisson (dominusvis click21 com br)


################################################
#
# Script: All4WWW-Homepagecreator
# Version: v1.0a
# Vendor: http://www.All4WWW.com
#
################################################

I. Bug Code
On index.php

...
if(!$site) {$site="home";}
include "$site.dat";
...

II. Exploit
[vuln-host]/

[ more ]  [ reply ]
MDKSA-2005:071 - Updated gaim packages fix multiple vulnerabilities 2005-04-14
Mandriva Security Team (security mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Update Advisory
_______________________________________________________________________

Package name: gaim
Advisory ID:

[ more ]  [ reply ]
Internet Explorer wininet.dll URL parsing memory corruption technical details 2005-04-14
3APA3A (3APA3A SECURITY NNOV RU)

Vendor: Microsoft
Software: Internet Explorer 6.0, 5.5, 5.01
Problem: Memory corruption, code execution
Remote: Yes
Risk Level: Medium to low (hard to exploit)
Authors: Axle (ICQ 755756) bug discovery
3APA3A, http://www.security.nnov.ru/ bug

[ more ]  [ reply ]
[ GLSA 200504-12 ] rsnapshot: Local privilege escalation 2005-04-13
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200504-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
serendipity SQL Injection vulnerability 2005-04-13
kreon (kre0n mail ru)
ADZ Security Team
===================
Info

Program: serentdipity web blog system
Version: 0.8beta4
Module: exit.php
Bug type: SQL Injection
Vendor site: http://www.s9y.org/
Vendor Informed: Yes
===================
Bug Info

// code start
//.......
$links = serendipity_db_query("SELECT link FROM
{$

[ more ]  [ reply ]
Windows kernel overflow fixed 2005-04-13
NGSSoftware Insight Security Research (nisr nextgenss com)
John Heasman of NGSSoftware has discovered a high risk vulnerability in the
Microsoft Windows kernel. The vulnerability (CAN-2005-0060) permits a
logged-on user to escalate privileges to take full control of the system
when Windows processes certain types of font.

Microsoft has developed a patc

[ more ]  [ reply ]
[ GLSA 200504-11 ] JunkBuster: Multiple vulnerabilities 2005-04-13
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200504-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Multiple Sql injection and XSS vulnerabilities in phpBB Plus v.1.52 and below and some of its modules. 2005-04-13
dcrab (dcrab hackerscenter com)


Dcrab 's Security Advisory
[Hsc Security Group] http://www.hackerscenter.com/
[dP Security] http://digitalparadox.org/

Get Dcrab's Services to audit your Web servers, scripts, networks, etc. Learn more at http://www.digitalparadox.org/services.ah

Severity: Medium
Title: Multiple Sql injection an

[ more ]  [ reply ]
(Page 1345 of 1748)  < Prev  1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus