BugTraq Mode:
(Page 1374 of 1748)  < Prev  1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379  Next >
[FLSA-2005:1945] Updated sox packages fix buffer overflows 2005-02-20
Marc Deslauriers (marcdeslauriers videotron ca)
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated sox packages fix buffer overflows
Advisory ID: FLSA:1945
Issue date: 2005-02-20
Product: Red Hat Linux
Keywords: Bugfix
Cros

[ more ]  [ reply ]
[FLSA-2005:2058] Updated cdrtools packages fix a security issue 2005-02-20
Marc Deslauriers (marcdeslauriers videotron ca)
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated cdrtools packages fix a security issue
Advisory ID: FLSA:2058
Issue date: 2005-02-20
Product: Red Hat Linux
Keywords: Bugfix

[ more ]  [ reply ]
Windows Firewall Has A Backdoor 2005-02-19
Jay Calvert (jcalvert habaneronetworks com)


By adding a new key to the registry in HKEY_LOCAL_MACHINE/SYSTEM/Services/SharedAccess/Parameters/FirewallPolic
y/StandardProfile/AuthorizedApplications/List you can circumvent the whole purpose of the firewall with out the users interaction or knowledge. Spyware / Adware manufacturer's are alread

[ more ]  [ reply ]
ADP Elite System Max 9000 Series Login Vulnerability 2005-02-19
rootfiend safe-mail net


Adp Elite system is an invoice/purchase order suite very common in car dealerships. It's a telnet based system. When a user logs in via telnet, adp dumps the user into the program where the user can check on a vehicle's status, generate PO's and RO's, etc.... The program is rather large and runs o

[ more ]  [ reply ]
Gigafast/CompUSA router (model EE400-R) vulnerabilities 2005-02-20
Gary H. Jones II (gary pointblanksecurity com)
This router is/was widely sold in CompUSA stores. It is a Gigafast router,
re-branded as a CompUSA router.

All firmware versions are affected.
When reported to the manufacturer on 5/13/04, I had received a response
stating that the information would be passed on to firmware developer.
Almost a year

[ more ]  [ reply ]
Re: SHA-1 broken 2005-02-20
Michael Silk (michaelsilk gmail com) (1 replies)
Inline.

> -----Original Message-----
> From: exon [mailto:exon (at) home (dot) se [email concealed]]
> Sent: Saturday, 19 February 2005 8:58 PM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Re: SHA-1 broken
>
> Michael Silk wrote:
> > Michael,
> >
> > But wouldn't it render a login-based hashing system
> resistant to the
>

[ more ]  [ reply ]
Re: SHA-1 broken 2005-02-21
exon (exon home se)
[USN-84-1] Squid vulnerabilities 2005-02-21
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-84-1 February 21, 2005
squid vulnerabilities
CAN-2005-0194, CAN-2005-0446
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty

[ more ]  [ reply ]
Arkeia Network Backup Client Remote Access 2005-02-20
H D Moore (sflist digitaloffense net)
Anyone able to connect to TCP port 617 can gain read/write access to the
filesystem of any host running the Arkeia agent software. This appears to
be an intentional design decision on the part of the Arkeia developers. A
long-winded description of this issue, complete with screen shots,
demonstr

[ more ]  [ reply ]
[SECURITY] [DSA 674-3] New mailman packages really fix several vulnerabilities 2005-02-21
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 674-3 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 21st, 2005

[ more ]  [ reply ]
Re: [Full-Disclosure] Thomson TCW690 Denial Of Service Vulnerability 2005-02-19
Andres Tarasco (atarasco gmail com)
Seems to be the same vulnerability published time ago

http://www.securityfocus.com/bid/9091

On Sat, 19 Feb 2005 10:43:44 +0100, MurDoK <murdok.lnx (at) gmail (dot) com [email concealed]> wrote:
> I found a vulnerability in this cablemodem which a malicious user inside *LAN
> can reset it easily.
> This cablemodem model is gi

[ more ]  [ reply ]
Re: SHA-1 broken 2005-02-19
securityfocus microtechnical co uk (1 replies)
In-Reply-To: <011401c51541$fdafedb0$0400a8c0@p14n>

I think Thomas has a good point here. We must separate the academic mathematical arguement about collisions from it's application in the real world. It may be that there are collisions in both MD5 and SHA-1 but have they any actual bearing on the u

[ more ]  [ reply ]
Re: SHA-1 broken 2005-02-21
Paul Johnston (paul westpoint ltd uk)
(Page 1374 of 1748)  < Prev  1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus