|
Colapse all |
Post message
FreeBSD Security Advisory FreeBSD-SA-05:04.ifconf 2005-04-15 FreeBSD Security Advisories (security-advisories freebsd org) Enumeration of AS/400 users and their status via POP3 2005-04-14 Shalom Carmel (shalom venera com) Enumeration of AS/400 users and their status via POP3 Overview ------------ The POP3 service is installed on all modern AS/400 and iSeries servers, and is turned on by default, even in cases when email serving was not set up. To access a POP3 server, you must authenticate and provide a user an [ more ] [ reply ] [USN-112-1] PHP4 vulnerabilities 2005-04-14 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-112-1 April 14, 2005 php4 vulnerabilities CAN-2005-1042, CAN-2005-1043 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty [ more ] [ reply ] [USN-111-1] Squid vulnerability 2005-04-14 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-111-1 April 14, 2005 squid vulnerability CAN-2005-0718 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) The fo [ more ] [ reply ] Re: bzip2 TOCTOU file-permissions vulnerability 2005-04-14 Steve Grubb (linux_4ever yahoo com) In-Reply-To: <20050402183613.GA26660 (at) securityfocus (dot) com [email concealed]> Since no one's posted a fix...here's a stab at it. -Steve Grubb =============== diff -urb bzip2-1.0.2.orig/bzip2.c bzip2-1.0.2/bzip2.c --- bzip2-1.0.2.orig/bzip2.c 2005-04-14 08:45:35.013302280 -0400 +++ bzip2-1.0.2/bzip2.c 2005-04-14 09 [ more ] [ reply ] Re: gzip TOCTOU file-permissions vulnerability 2005-04-14 Steve Grubb (linux_4ever yahoo com) In-Reply-To: <7389fc4b05040412574f819112 (at) mail.gmail (dot) com [email concealed]> Since no one has posted a fix...here's a stab at it. -Steve Grubb ================ diff -ur gzip-1.3.5.orig/gzip.c gzip-1.3.5/gzip.c --- gzip-1.3.5.orig/gzip.c 2005-04-14 09:25:04.941018504 -0400 +++ gzip-1.3.5/gzip.c 2005-04-14 09: [ more ] [ reply ] Trusted Site Cross Site Scripting Elevation of Privilege in Musicmatch 2005-04-14 Hyperdose Security (robfly hyperdose com) Hyperdose Security Advisory Name: Trusted Site Cross Site Scripting Elevation of Privilege in Musicmatch Systems Affected: Musicmatch v10.00.2047 or earlier (according to Yahoo v9.00.5059 and earlier are also affected) Severity: Moderate Author: Robert Fly - robfly (at) hyperdose (dot) com [email concealed] Advisory URL: http [ more ] [ reply ] Trojan file issue in Musicmatch software 2005-04-14 Hyperdose Security (robfly hyperdose com) Hyperdose Security Advisory Name: Arbitrary file overwrite in Musicmatch Systems Affected: Musicmatch v10.00.2047 or earlier (according to Yahoo v9.00.5059 and earlier are also affected) Severity: Moderate Author: Robert Fly - robfly (at) hyperdose (dot) com [email concealed] Advisory URL: http://www.hyperdose.com/advisories [ more ] [ reply ] RE: gzip TOCTOU file-permissions vulnerability 2005-04-14 Mark Senior (Mark Senior gov ab ca) (2 replies) > From: Derek Martin [mailto:code (at) pizzashack (dot) org [email concealed]] > Sent: April 13, 2005 08:50 > > > The open() call is at fault here. If instead of being called > with a mode of RW_USER, it is called with the final intended > access mode, there is no need to later call chmod(), and the > problem is avert [ more ] [ reply ] Multiple multiple sql injection/errors and xss vulnerabilities in OneWorldStore 2005-04-14 dcrab (dcrab hackerscenter com) Dcrab 's Security Advisory [Hsc Security Group] http://www.hackerscenter.com/ [dP Security] http://digitalparadox.org/ Get Dcrab's Services to audit your Web servers, scripts, networks, etc. Learn more at http://www.digitalparadox.org/services.ah Severity: High Title: Multiple multiple sql injec [ more ] [ reply ] BCS Asia 2005 Slides and pictures 2005-04-14 Anthony Zboralski (bcs2005 bellua com) Dear Bugtraq readers, Just a brief note to tell you that the proceedings and pictures from the conference are online. http://www.bellua.com/bcs2005/asia05.archive.html http://www.bellua.com/bcs2005/asia05.pictures/ The event was opened by keynote speeches from the Minister of Communications a [ more ] [ reply ] Computer Associates BrightStor ARCserve Backup and BrightStor Enterprise Backup UniversalAgent buffer overflow vulnerability 2005-04-14 Williams, James K (James Williams ca com) With the assistance of iDEFENSE, Computer Associates has identified a buffer overflow vulnerability in the BrightStor ARCserve Backup Universal Agent Service for Windows and the BrightStor Enterprise Backup Universal Agent Service for Windows. This service is a common component of Windows based [ more ] [ reply ] Security Contact for NetApp ? 2005-04-14 Fabrice Marie (fmarie gmail com) (1 replies) sumus[v0.2.2]: (httpd) remote buffer overflow exploit. 2005-04-14 Vade 79 (v9 fakehalo deadpig org) did a random audit of 'sumus' and found a unique/fun exploit situation... original exploit: http://fakehalo.us/xsumus.c ----------------------- example: xsumus ----------------------- # gcc xsumus.c -o xsumus # ./xsumus -h fedora.fakehalo.lan [*] sumus[v0.2.2]: (httpd) remote buffer overflow [ more ] [ reply ] All4WWW-Homepagecreator Remote Command Execution 2005-04-14 Francisco Alisson (dominusvis click21 com br) ################################################ # # Script: All4WWW-Homepagecreator # Version: v1.0a # Vendor: http://www.All4WWW.com # ################################################ I. Bug Code On index.php ... if(!$site) {$site="home";} include "$site.dat"; ... II. Exploit [vuln-host]/ [ more ] [ reply ] MDKSA-2005:071 - Updated gaim packages fix multiple vulnerabilities 2005-04-14 Mandriva Security Team (security mandriva com) Internet Explorer wininet.dll URL parsing memory corruption technical details 2005-04-14 3APA3A (3APA3A SECURITY NNOV RU) [ GLSA 200504-12 ] rsnapshot: Local privilege escalation 2005-04-13 Thierry Carrez (koon gentoo org) serendipity SQL Injection vulnerability 2005-04-13 kreon (kre0n mail ru) ADZ Security Team =================== Info Program: serentdipity web blog system Version: 0.8beta4 Module: exit.php Bug type: SQL Injection Vendor site: http://www.s9y.org/ Vendor Informed: Yes =================== Bug Info // code start //....... $links = serendipity_db_query("SELECT link FROM {$ [ more ] [ reply ] Windows kernel overflow fixed 2005-04-13 NGSSoftware Insight Security Research (nisr nextgenss com) John Heasman of NGSSoftware has discovered a high risk vulnerability in the Microsoft Windows kernel. The vulnerability (CAN-2005-0060) permits a logged-on user to escalate privileges to take full control of the system when Windows processes certain types of font. Microsoft has developed a patc [ more ] [ reply ] [ GLSA 200504-11 ] JunkBuster: Multiple vulnerabilities 2005-04-13 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Multiple Sql injection and XSS vulnerabilities in phpBB Plus v.1.52 and below and some of its modules. 2005-04-13 dcrab (dcrab hackerscenter com) Dcrab 's Security Advisory [Hsc Security Group] http://www.hackerscenter.com/ [dP Security] http://digitalparadox.org/ Get Dcrab's Services to audit your Web servers, scripts, networks, etc. Learn more at http://www.digitalparadox.org/services.ah Severity: Medium Title: Multiple Sql injection an [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
========================================================================
=====
FreeBSD-SA-05:04.ifconf Security Advisory
The FreeBSD Project
Topic: Ke
[ more ] [ reply ]