|
Colapse all |
Post message
Information leak in the Linux kernel ext2 implementation 2005-04-01 Arkoon Security Team (security arkoon net) Description: Information leak in the Linux kernel ext2 implementation References: CAN-2005-0400 Authors: Mathieu Lafon <mlafon (at) arkoon (dot) net [email concealed]> Romain Francoise <rfrancoise (at) arkoon (dot) net [email concealed]> Arkoon Security Team Advisory - March 25, 2005 http://arkoon.net/advisories/ext2-make-empty-le [ more ] [ reply ] [Hat-Squad Advisory] Bakbone NetVault Heap overflow Vulnerabilities 2005-04-01 Hat-Squad Security Team (bugtraq hat-squad com) Hat-Squad Advisory: BakBone NetVault Remote Heap and Local Buffer Overflow April 1, 2005 Product: BakBone NetVault Vendor URL: http://www.bakbone.com Version: NetVault 7.x, 6.x Vulnerability: Remote and Local Heap Buffer overflows Release Date:1 April 2005 Vendor Status: 17-3-2005: vendor n [ more ] [ reply ] Buffer Overflow within the RUMBA product 2005-04-01 Bahaa Naamneh (b_naamneh hotmail com) Buffer Overflow within the RUMBA product ---------------------------------------- Advisory Information: ===================== Application: RUMBA OFFICE Vendor Homepage: http://www.netmanage.com Versions: 7.3 (and earlier versions) Platforms: Windows (all) Severity: High Date: 15/01/05 Intr [ more ] [ reply ] iDEFENSE Security Advisory 03.31.05: PHP getimagesize() Multiple Denial of Service Vulnerabilities 2005-03-31 iDEFENSE Labs (labs-no-reply idefense com) PHP getimagesize() Multiple Denial of Service Vulnerabilities iDEFENSE Security Advisory 03.31.05 www.idefense.com/application/poi/display?id=222&type=vulnerabilities March 31, 2005 I. BACKGROUND PHP is a widely-used general-purpose scripting language that is especially suited for Web development [ more ] [ reply ] [SECURITY] [DSA 702-1] New ImageMagick packages fix several vulnerabilities 2005-04-01 joey infodrom org (Martin Schulze) [SECURITY] [DSA 703-1] New krb5 packages fix arbitrary code execution 2005-04-01 joey infodrom org (Martin Schulze) (PAPER) "Vision of danger: The Firefox Greasemonkey" 2005-03-31 Piotr Bania (bania piotr gmail com) Hi, For thoose who would like to read some about Firefox Greasemonkey. Here is the article: http://pb.specialised.info/all/articles/monkey.txt have phun. Peace, Piotr Bania -- -------------------------------------------------------------------- Piotr Bania - <bania.piotr (at) gmail (dot) com [email concealed]> - 0xCD, 0x19 [ more ] [ reply ] WindowsXP malformed .wmf files DoS 2005-03-31 liquid cyberspace org Here is an example of malformed .wmf file which will cause DoS. Put this file in arbitrary folder (be sure that file has .wmf extension, otherwise this wouldn't work). Open that folder with Windows Explorer, and just move mouse over malformed file. CPU usage will rise to 100%, and stay that way. [ more ] [ reply ] RE: eBay Account Phishing with eBay Redirect - Ebay fixed this + related XSS hole 2005-03-31 Rager, Anton (Anton) (arager avaya com) It appears that Ebay finally removed this redirector CGI. In the process they eliminated/fixed another flaw with that same CGI that allowed XSS attacks. I reported this issue to Ebay around the time this redirection CGI originally hit bugtraq, but never heard back on resolution. The redirector CGI [ more ] [ reply ] [HV-HIGH] Microsoft Jet DB engine vulnerabilities 2005-03-31 vuln hexview com (1 replies) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Microsoft Jet DB engine vulnerabilities Classification: =============== Level: low-med-[HIGH]-crit ID: HEXVIEW*2005*03*31*1 URL: http://www.hexview.com/docs/20050331-1.txt Overview: ========= Microsoft Jet database is a lightweight database widely use [ more ] [ reply ] Re: [HV-HIGH] Microsoft Jet DB engine vulnerabilities 2005-04-01 Thor (Hammer of God) (thor hammerofgod com) Reverse shell using netcat on AS/400 2005-03-31 Shalom Carmel (shalom venera com) (1 replies) Reverse shell using netcat on AS/400 Overview ------------ Netcat, dubbed the TCP/IP "Swiss Army knife", is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. An indispensable tool, netcat stars in network hacking manuals as one of the most vers [ more ] [ reply ] Security holes in the iTunes Music Store 2005-03-31 Charles M. Hannum (abuse spamalicious com) While inspecting the iTMS protocol with sniffers and PyMusique, I have found what appear to be three security issues: 1) Although signup/user info, authorization, shopping cart and purchase transactions are all sent via SSL, other transactions (such as searches and album info requests) are not. [ more ] [ reply ] MDKSA-2005:063 - Updated htdig packages fix vulnerability 2005-03-31 Mandrakelinux Security Team (security linux-mandrake com) MX Shop 1.1.1 and MX Kart 1.1.2 are vulnerable to multiple SQL injection vulnerabilities 2005-04-01 dcrab (dcrab hackerscenter com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dcrab 's Security Advisory http://icis.digitalparadox.org/~dcrab http://www.hackerscenter.com/ Severity: Medium Title: MX Shop 1.1.1 and MX Kart 1.1.2 are vulnerable to multiple SQL injection vulnerabilities Date: 1/04/2005 Vendor: InterAKT Vendor W [ more ] [ reply ] Bay Technical Associates telnet server logon bypass 2005-03-31 nolimit bugtraq (nolimit bugtraq gmail com) (1 replies) Vulnerability found by Flare@CiSO Greets to nolimit, COREiSO, #news, and class101. Versions Tested: RPC-3 Telnet Host - Revision F 3.05, (C) 1998 This is a basic login-bypass vulnerability found in the RPC-3 Telnet Host v 3.05 made by "Bay Technical Associates". This telnet daemon is used by many [ more ] [ reply ] Re: Bay Technical Associates telnet server logon bypass 2005-03-31 Michael Brennen (mbrennen fni com) [ GLSA 200503-37 ] LimeWire: Disclosure of sensitive information 2005-03-31 Thierry Carrez (koon gentoo org) MDKSA-2005:064 - Updated libexif packages fix vulnerability 2005-03-31 Mandrakelinux Security Team (security linux-mandrake com) MDKSA-2005:062 - Updated ipsec-tools packages fix vulnerability 2005-03-31 Mandrakelinux Security Team (security linux-mandrake com) RE: Portcullis Security Advisory 05-011 ACPI 1.6 BIOS 2005-03-31 Paul J Docherty (PJD portcullis-security com) Perhaps you are! The MBR is not being corrupted, it is intact and perfectly in order (if an MBR RFC existed it would be fully compliant). Whilst I agree, with privileged access you can DoS a system in many ways, all the ones you note would be obvious to a user and can be recovered from using common [ more ] [ reply ] Vendor Response to Portculis Advisory 05-002: Spectrum Cash Receipting System 2005-03-31 Paul J Docherty (PJD portcullis-security com) Portcullis have received a response from the vendor to the advisory we released on January 24 2005. For completeness the vendor response has been included in its entirety, and demarked via <VENDOR RESPONSE> TEXT <VENDOR RESPONSE> markers. Portcullis Security Advisory Spectrum Cash Receipting Syst [ more ] [ reply ] cPanel/WHM demo account problems 2005-03-30 Richard Stanway (bugtraq secur1ty net) (1 replies) Background ---------- cPanel & WebHost Manager (WHM) is a next generation web hosting control panel system. Both cPanel & WHM are extremely feature rich as well as include an easy to use web based interface (GUI). The cPanel demo account feature creates a restricted username/password to the cPanel w [ more ] [ reply ] |
|
Privacy Statement |
If you read the changelog you would have noticed this was fixed over a month ago.
http://layer1.cpanel.net/ChangeLog.cgi?output=html
Laziness is no excuse for not reporting vulnerabilities to a vendor first. If you can sign up to bu
[ more ] [ reply ]