|
Colapse all |
Post message
MDKSA-2004:137-1 - Updated libxpm4 packages correct issues with previous update 2004-11-30 Mandrake Linux Security Team (security linux-mandrake com) [SHK-001]Payflow Link Default Config may lead to Hidden Field Modification 2004-11-29 M. Shirk (shirkdog_list hotmail com) [Shirkdog Security Advisory SHK-001] Title: ------- Payflow Link Default Config may lead to Hidden Field Modification Description of Application: ------------------------------------ http://verisign.com/products-services/payment-processing/online-payment/ payflow-link/index.html (careful with the l [ more ] [ reply ] Password Disclosure for SMB Shares in KDE's Konqueror 2004-11-29 Daniel Fabian (df sec-consult com) ------------------------------------------------------------------------ - | Password Disclosure for SMB Shares in KDE's Konqueror | ------------------------------------------------------------------------ - Date: Nov. 29, 2004 Author: Daniel Fabian Product: KDE, Konquerer Vendor: KDE [ more ] [ reply ] Privilege escalation flaw in MDaemon 7.2. 2004-11-29 Reed Arvin (reedarvin gmail com) (1 replies) Summary: A privilege escalation flaw exists in MDaemon 7.2 (http://www.mdaemon.com). Details: A privilege escalation technique can be used to gain SYSTEM level access while interacting with the MDaemon tray icon. Vulnerable Versions: MDaemon 7.2 Solutions: The vendor was notified of t [ more ] [ reply ] [SECURITY] [DSA 602-1] New libgd2 packages fix arbitrary code execution 2004-11-29 joey infodrom org (Martin Schulze) [ GLSA 200411-38 ] Sun and Blackdown Java: Applet privilege escalation 2004-11-29 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Multiple buffer overlows in WS_FTP Server Version 5.03, 2004.10.14. 2004-11-29 Reed Arvin (reedarvin gmail com) Summary: Multiple buffer overflows exists in WS_FTP Server Version 5.03, 2004.10.14 (http://www.ipswitch.com/). Details: Multiple buffer overflows exist in WS_FTP Server Version 5.03, 2004.10.14. There are four vulnerable commands that can be used to cause these buffer overflows. Three of the [ more ] [ reply ] [SECURITY] [DSA 601-1] New libgd1 packages fix arbitrary code execution 2004-11-29 joey infodrom org (Martin Schulze) Macromedia provided wrong "Solution" in mpsb02-08 2004-11-28 Liu Die Yu (liudieyu umbrella name) there exists a sentence in the "Solution" part of mpsb02-08 located at http://www.macromedia.com/devnet/security/security_zone/mpsb02-08.html ----- For example, if the main page is served from macromedia.com, the wrapper page could be served from external.macromedia.com, and this would prevent any [ more ] [ reply ] ncpfs buffer overflow 2004-11-29 Karol Wiêsek (appelast drumnbass art pl) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 There is buffer overflow in ncplogin and ncpmap in nwclient.c. static void strcpy_cw(wchar_t *w, const char* s) { ~ while ((*w++ = *(const nuint8*)s++) != 0); } NWDSCCODE NWDSCreateContextHandleMnt(NWDSContextHandle* ctx, const NWDSChar * tree [ more ] [ reply ] Address Bar Spoofing on Double Byte Character Set Locale Vulnerability (CAN-2004-0844) Patched in MS04-038 2004-11-29 Liu Die Yu (liudieyu umbrella name) Resending ... Overview ======== On "Double Byte Character Set Locale" systems(Chinese, Japanese, etc), there exists a spoofing vulnerability within Microsoft Internet Explorer that enables attackers to fake the Address field. Exploit ======= http://umbrella.name/originalvuln/msie/DieSlowlyThisTime [ more ] [ reply ] Players overflow in Serious engine UDP (was Alpha Black Zero, 29 Sep 2004) 2004-11-28 Luigi Auriemma (aluigi autistici org) [OpenPKG-SA-2004.051] OpenPKG Security Advisory (imapd) 2004-11-29 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] Microsoft Help ActiveX Control Related Topics Local Content Accessing Vulnerability 2004-11-27 Paul (paul greyhats cjb net) Greyhats Security Group is back and we're ready to kick the crap out of sp2 :). Looks like all the vulnerabilities previously posted by us have been patched. Good work, Microsoft. We're not through yet, though. Here's proof that no matter how many millions of dollors you spend on security, there w [ more ] [ reply ] [ GLSA 200411-36 ] phpMyAdmin: Multiple XSS vulnerabilities 2004-11-27 Luke Macken (lewk gentoo org) Setiri + Invisible browsers != browsers 2004-11-27 Haroon Meer (haroon sensepost com) Hi.. About 2 years ago, we demo'd Setiri, a win32 trojan that tunneled data off networks through the use of Invisible Internet Explorer instances. This allowed us to avoid sticky issues like authentication / etc and worked nicely against personal firewalls configured to allow out IE traffic. [ more ] [ reply ] [CLA-2004:900] Conectiva Security Announcement - sun-jre 2004-11-26 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : sun-jre SUMMARY : Java plugin vulnerability D [ more ] [ reply ] [ GLSA 200411-35 ] phpWebSite: HTTP response splitting vulnerability 2004-11-26 Matthias Geerdsen (vorlon gentoo org) Java version downgrading proof-of-concept 2004-11-26 auto333584 hushmail com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 In reference to this: http://www.securityfocus.com/archive/1/382281/2004-11-23/2004-11- 29/0 <html> <title> Java Version Downgrade proof-of-concept </title> <body> Demonstration uses the following vulnerability: <br> http://www.securityfocus.com/bid/ [ more ] [ reply ] Re: Winamp - Buffer Overflow In IN_CDDA.dll [Unpatched] 2004-11-27 K-OTiK Security (Special-Alerts k-otik com) In-Reply-To: <BAY101-F277D543B4547323CCB31D8A9BA0 (at) phx (dot) gbl [email concealed]> Winamp 5.06 is also vulnerable and exploitable...thus this flaw is still unpatched. you can test it using this code : http://www.k-otik.com/exploits/20041124.winampm3u.c.php Regards K-OTik Security Research & Monitoring Team 24/7 [ more ] [ reply ] Phpbb id: 10701 update and Attachmodule add-on Directory Traversal 2004-11-26 zee psybnc it Phpbb: All vulnerable all except 2.0.11 Attachment module: All version vulnerable Howdark update opened wide my eyes with his nice exploit: Bugtraq id: 10701 ----- viewtopic.php?t=1&highlight=%2527 ----- Looking at the code I saw that was possible inject any type of Sql query with a multi [ more ] [ reply ] PnTresMailer code browser 6.03 Vulnerabilities 2004-11-26 John Cobb (johnc nobytes com) Hello All, PnTresMailer code browser 6.03 is open to information disclosure. Authors Site: http://canvas.anubix.net +-[Examples:]-----+ [1] www.victimsite.com/codebrowserpntm.php?foldertohighlight=pnTresMailer&fi leto highlight=w00t Warning: highlight_file(codebrowserPnTM/pnTresMailer/w00t): [ more ] [ reply ] php 4.3.7 memory limit POC exploit 2004-11-26 Gyan chawdhary (gunnu45 hotmail com) Hi all, Attached is an old POC I had written for the php memory limit vuln. It works well on php 4.3.7 with 2.0.49 apache. But its not an elegant solution. http://www.felinemenace.org/~gyan/phpnolimit.c have fun, Gyan _________________________________________________________________ Choose wh [ more ] [ reply ] FluxBox crash vulnerability 2004-11-26 Quith (quith linux-hell net) Name: FluxBox Homepage: http://www.fluxbox.org Author: Quith <quith[at]linux-hell[dot]net> Date: Fri Nov 26 15:07:30 UTC 2004 ISSUE: FluxBox is a popular window manager for X, working under Linux/Unix operating systems. It's based on BlackBox and has 100% theme/style compability. (Xman [ more ] [ reply ] phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure 2004-11-26 Cyrille Barthelemy (cb-lse ifrance com) Title: phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure Affects: - <= 1.2.1 Effect: Cross Site Attack (session hijacking, ...) Id: cbsa-0006 Release Date: 2004/11/26 Author: Cyrille Barthelemy <cb-publicbox (at) ifrance (dot) com [email concealed]> -- 1. Introduction ------------------------ phpCMS is a content ma [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: libxpm4
Advisory ID:
[ more ] [ reply ]