|
Prev week |
Colapse all |
Post message
SquirrelMail Security Advisory 2005-01-29 Jonathan Angliss (jon squirrelmail org) SquirrelMail Security Advisory ============================== SquirrelMail 1.4.4 has been released to resolve a number of security issues disclosed below. It is strongly recommended that all running SquirrelMail prior to 1.4.4 upgrade to the latest release. Remote File Inclusion ----------------- [ more ] [ reply ] RE: SECURITY.NNOV: Multiple applications fd_set structure bitmap array index overflow 2005-01-29 David LeBlanc (dleblanc exchange microsoft com) -----Original Message----- From: Damien Miller [mailto:djm (at) mindrot (dot) org [email concealed]] said: >This effectively limits select to a maximum of FD_SETSIZE descriptors on Windows. I don't think that this limitiation exists on other platforms. --------------------------- Note the bit where it says: #ifndef FD_SE [ more ] [ reply ] Re: SECURITY.NNOV: Multiple applications fd_set structure bitmap array index overflow 2005-01-28 Damien Miller (djm mindrot org) Re: Unrestricted I/O access vulnerability in INCA Gameguard 2005-01-28 David Roberts (david howden demon co uk) In-Reply-To: <000001c4fc2b$bfd81820$6101a8c0@sauron> On January 26 2005, NCsoft updated their Lineage 2 client for the North American and European market to include the GameGuard system. The GameGuard system includes an updated version of the NPPTNT2.SYS driver (2005.1.5.1). The updated driver no [ more ] [ reply ] RE: SECURITY.NNOV: Multiple applications fd_set structure bitmap array index overflow 2005-01-28 David LeBlanc (dleblanc exchange microsoft com) -----Original Message----- 3APA3A [mailto:3APA3A (at) security.nnov (dot) ru [email concealed]] wrote: > For Windows fd_set is a sockets array, not bitmask and FD_SETSIZE defines maximum number of sockets in this array. So, Windows application may be vulnerable only if it places a large number of sockets into same fd_set s [ more ] [ reply ] Winamp Exploit (POC) 5.08 Stack Overflow 2005-01-28 Rojodos (rojo2_bugtraq yahoo es) Hello :) I´ve coded an exploit about this vulnerability, using the advisory "NSFOCUS SA2005-01 : Buffer Overflow in WinAMP in_cdda.dll CDA Device Name" as a guide. The advisory is very good, so it´s very easy to code the exploit. This code: cda://AAAABBBBCCCCDDDDEEEEFFFFGGGGHHHnT _IJJJ?å3ÿW?ìÆEø [ more ] [ reply ] Multiple vulnerabilities in Icewarp Web Mail 5.3.0: New holes 2005-01-29 ShineShadow (ss_contacts hotmail com) ShineShadow Security Report 26012005-03 TITLE: Multiple vulnerabilities in Icewarp Web Mail 5.3.0 : New holes. BACKGROUND Merak Mail Server, with the revolutionary Merak Mail Server GroupWare Server, cutting-edge Merak Mail Server Instant Antispam and much more, is the fastest, most stable, se [ more ] [ reply ] Re: UEBIMIAU <= 2.7.2 MULTIPLES VULNERABILITIES 2005-01-28 pokley (pokleyzz scan-associates net) I have discover this bug indipendently on March 2004. Since Uebimiua team have a comment to change default temporary directory for security reason in their config file this seem not critical to me and decided not to inform the developer. In this case this bug may lead to remote command execut [ more ] [ reply ] [OpenPKG-SA-2005.004] OpenPKG Security Advisory (sasl) 2005-01-28 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] WebWasher Classic - HTTP CONNECT weakness 2005-01-28 Oliver Karow (Oliver Karow gmx de) WebWasher Classic - HTTP CONNECT weakness ========================================= WebWasher Classic ================= WebWasher Classic is a well known HTTP-URL/Popup/Script filtering proxy which is free for non commercial use. WebWasher Classic supports two modes, a client mode, where it only [ more ] [ reply ] [ GLSA 200501-39 ] SquirrelMail: Multiple vulnerabilities 2005-01-28 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Multiple vulnerabilities in Alt-N WebAdmin <= 3.0.2 2005-01-28 David Alonso Pérez (kamborio gmail com) WebAdmin is a web application to administer MDaemon and RelayFax. It can be run on its own or as an ISAPI application under Microsoft Internet Information Services (IIS). MDaemon is an e-mail server for Microsoft Windows. RelayFax is a fax server also for Microsoft Windows. Both applications have be [ more ] [ reply ] MDKSA-2005:024 - Updated evolution packages fix vulnerability 2005-01-27 Mandrakelinux Security Team (security linux-mandrake com) WarFTPD 1.82 RC9 DoS 2005-01-27 MC.Iglo (mc iglo gmx de) Hello, due to an access violation, specialy crafted CWD-Commands will exit the FTP server when running as a NT service. User needs to be logged on. Vendor's report can be found at http://support.jgaa.com/index.php?cmd=ShowReport&ID=02643 Solution: deny anonymous or untrusted logins or use patched [ more ] [ reply ] [ GLSA 200501-37 ] GraphicsMagick: PSD decoding heap overflow 2005-01-26 Thierry Carrez (koon gentoo org) [ GLSA 200501-38 ] Perl: rmtree and DBI tmpfile vulnerabilities 2005-01-26 Thierry Carrez (koon gentoo org) [SECURITY] [DSA 661-1] New f2c packages fix insecure temporary files 2005-01-27 joey infodrom org (Martin Schulze) [SIG^2 G-TEC] Magic Winmail Server v4.0 Multiple Vulnerabilities 2005-01-27 chewkeong security org sg SIG^2 Vulnerability Research Advisory Magic Winmail Server v4.0 Multiple Vulnerabilities by Tan Chew Keong Release Date: 27 Jan 2005 ADVISORY URL http://www.security.org.sg/vuln/magicwinmail40.html SUMMARY Magic Winmail Server (http://www.magicwinmail.net/) is an enterprise class mail serv [ more ] [ reply ] Ingate Firewall: Removed PPTP tunnels not deactivated 2005-01-27 Per Cederqvist (ceder ingate com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Product: Ingate Firewall Versions: 4.1.3 and earlier Tracking ID: 1826 Summary ======= Active PPTP tunnels in Ingate Firewall are not deactivated when a PPTP user is disabled. If a user has an active PPTP connection to an Ingate Firewall, and that us [ more ] [ reply ] NSFOCUS SA2005-01 : Buffer Overflow in WinAMP in_cdda.dll CDA Device Name 2005-01-27 NSFOCUS Security Team (security nsfocus com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 NSFOCUS Security Advisory(SA2005-01) Topic: Buffer Overflow in WinAMP in_cdda.dll CDA Device Name Release Date: 2005-01-27 CVE CAN ID: CAN-2004-1150 http://www.nsfocus.com/english/homepage/research/0501.htm Affected systems & software ============= [ more ] [ reply ] HKLM locking 2005-01-27 Vladimir Kraljevic (vladimir_kraljevic yahoo com) NOTE: Already posted to vuln-dev. Because I'm not receiving comments, I believe that this one is real. Dear list, please inspect the following, your input is welcome. Vendors (Microsoft and unspecified AV company) are contacted two months ago, I'm not satisfied with their response and here is the [ more ] [ reply ] DMA[2005-0127a] - 'Apple OSX batch family poor use of setuid' 2005-01-27 KF (Lists) (kf_lists digitalmunition com) NOVL-2005-10096251 GroupWise WebAccess Error modules loading(report) 2005-01-27 Ed Reed (ereed novell com) Re: logwatch and logrotate might create a blind spot in reporting 2005-01-26 The Tibetan Traveller (garnet aufait net) On Tue, 25 Jan 2005, Sami Pitko wrote: > There are some ways to make logwatch reports more reliable: > > * set "Archives = yes" in logwatch.conf. You might also want to tune > archive settings in /etc/log.d/conf/logfiles/ to prevent unnecessary > processing of really old archives. To cove [ more ] [ reply ] [CLA-2005:923] Conectiva Security Announcement - squid 2005-01-26 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : squid SUMMARY : Fixes for squid vulnerabiliti [ more ] [ reply ] Re: List of all admin accounts in phpBB 2005-01-26 Aaron Klein (klein aaron gmail com) Or just search your phpbb_users table in your database for users that have a user_level = 1. Those are admins. User_level of 0 coresponds to regular users and User_level of 2 are moderators. On Tue, 25 Jan 2005 23:48:20 +0100, Predrag Damnjanovic <bugtraq (at) mycity.co (dot) yu [email concealed]> wrote: > After discovering [ more ] [ reply ] |
|
Privacy Statement |
> Or just search your phpbb_users table in your database for users that
> have a user_level = 1. Those are admins. User_level of 0 coresponds
> to regular users and User_level of 2 are moderators.
Just on the comment of "phpbb_", it is always a good idea t
[ more ] [ reply ]