BugTraq Mode:
(Page 1426 of 1748)  < Prev  1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431  Next >
[ GLSA 200411-17 ] mtink: Insecure tempfile handling 2004-11-09
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200411-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
EEYE: Kerio Personal Firewall Multiple IP Options Denial of Service 2004-11-09
Marc Maiffret (mmaiffret eeye com)
Kerio Personal Firewall Multiple IP Options Denial of Service

Release Date:
November 9, 2004

Date Reported:
October 30, 2004

Severity:
High (Remote Denial of Service)

Vendor:
Kerio

Systems Affected:
Kerio Personal Firewall 4.1.1 and prior

Overview:
eEye Digital Security has discovered a severe

[ more ]  [ reply ]
[SECURITY] [DSA 591-1] New libgd2 packages fix arbitrary code execution 2004-11-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 591-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
November 9th, 2004

[ more ]  [ reply ]
[SECURITY] [DSA 589-1] New libgd1 packages fix arbitrary code execution 2004-11-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 589-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
November 9th, 2004

[ more ]  [ reply ]
Security Contact for T-Mobile? 2004-11-09
Jake Appelbaum (jacob appelbaum net)
Hello,

I am looking for a security contact within the USA wing of T-Mobile. All
attempts to contact the team via telephone are seemingly futile.

Does anyone have this information?

--
Jake Appelbaum <jacob (at) appelbaum (dot) net [email concealed]>

[ more ]  [ reply ]
[USN-20-1] Ruby CGI module vulnerability 2004-11-08
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-20-1 November 08, 2004
ruby1.8 vulnerability
CAN-2004-0983
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The

[ more ]  [ reply ]
Re: [HV-LOW] Symantec LiveUpdate issues may cause DoS 2004-11-09
secure symantec com


Symantec is aware of this posting. Symantec engineers are reviewing the issue. If it is validated we will respond accordingly.

According to HexView's advisory, Symantec was notified 2004-11-03 and did not respond prior to HexView's posting.

However, HexView's initial notification to Syman

[ more ]  [ reply ]
[SECURITY] [DSA 590-1] New gnats packages fix arbitrary code execution 2004-11-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 590-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
November 9th, 2004

[ more ]  [ reply ]
Vulnerabilities in JAF CMS 2004-11-09
y3dips (at) www.securityfocus (dot) com [email concealed],[ echo|staff ]@securityfocus.com (at) www.securityfocus (dot) com [email concealed] (y3dips echo or id)


ECHO_ADV_08$2004

------------------------------------------------------------------------
---

Vulnerabilities in JAF CMS

------------------------------------------------------------------------
---

Author: y3dips

Date: November, 4th 2004

Location: Indonesia, Jakar

[ more ]  [ reply ]
Re: Update: Web browsers - a mini-farce (MSIE gives in) 2004-11-09
Heikki Kortti (hkortti codenomicon com)

It's been interesting to follow the discussion after Michal's original
submission. Those readers who are familiar with the PROTOS style of
testing and the results of that research will know how effective
protocol-based invalid input testing has proven to be in catching at
least a majority of common

[ more ]  [ reply ]
BoF in Windows 2000: ddeshare.exe 2004-11-09
Jack C (jack crepinc com) (2 replies)
Hello all,

I found a static buffer overflow in ddeshare.exe on my Windows 2000,
latest updates/service packs box tonight. It appears as though no bounds
checking is performed on the share name before it is copied to the variable.

Exploiting:
Start up c:\winnt\system32\ddeshare.exe. Click shares

[ more ]  [ reply ]
Re: BoF in Windows 2000: ddeshare.exe 2004-11-09
Valdis Kletnieks vt edu
Re: BoF in Windows 2000: ddeshare.exe 2004-11-09
Berend-Jan Wever (skylined edup tudelft nl)
Re: New URL spoofing bug in Microsoft Internet Explorer 2004-11-08
roozbeh afrasiabi (roozbeh_afrasiabi yahoo com)
In-Reply-To: <005401c4bd36$6fdf3800$d9ebb9d9@oemcomputer>

Here is another way of spoofing the status bar:

<a> tag + <object> tag

<!--A HREF=http://www.yahoo.com><!--OBJECT classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000"

codebase="http://download.macromedia.com/pub/shockwave

[ more ]  [ reply ]
MDKSA-2004:128 - Updated ruby packages fix remote DoS vulnerability 2004-11-08
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: ruby
Advisory ID:

[ more ]  [ reply ]
Evidence Mounts that the Vote Was Hacked 2004-11-08
Atom 'Smasher' (atom suspicious org) (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- --
...atom

_________________________________________
PGP key - http://atom.smasher.org/pgp.txt
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
-------------------------------------------------

"God save the queen
a

[ more ]  [ reply ]
Re: Evidence Mounts that the Vote Was Hacked 2004-11-09
Jay D. Dyson (jdyson treachery net)
[CLA-2004:886] Conectiva Security Announcement - xpdf 2004-11-08
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : xpdf
SUMMARY : Fixes for xpdf vulnerabilities

[ more ]  [ reply ]
[CLA-2004:888] Conectiva Security Announcement - libtiff3 2004-11-08
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : libtiff3
SUMMARY : Fixes for libtiff vulnerab

[ more ]  [ reply ]
Re: [Full-Disclosure] MSIE <IFRAME> and <FRAME> tag NAME property bufferoverflow PoC exploit (was: python does mangleme (with IE bugs!)) 2004-11-08
Menashe Eliezer (menashe finjan com)
In-Reply-To: <BAY10-DAV29UqLpHkat00000751 (at) hotmail (dot) com [email concealed]>

The published exploit is working also with the <EMBED> tag, and not just with the <IFRAME> and the <FRAME> tags.

Finjan's advisory can be found at: http://www.finjan.com/SecurityLab/AttackandExploitReports/alert_show.asp
?attack_release_i

[ more ]  [ reply ]
[SECURITY] [DSA 586-1] New ruby packages fix denial of service 2004-11-08
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 586-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
November 8th, 2004

[ more ]  [ reply ]
[HV-LOW] Symantec LiveUpdate issues may cause DoS 2004-11-04
vuln hexview com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Symantec LiveUpdate issues may cause DoS

Classification:
===============
Level: [LOW]-med-high-crit
ID: HEXVIEW*2004*11*04*1
URL: http://www.hexview.com/docs/20041104-1.txt

Overview:
=========
Symantec LiveUpdate is an application designed to provide

[ more ]  [ reply ]
[ GLSA 200411-14 ] Kaffeine, gxine: Remotely exploitable bufferoverflow 2004-11-07
Luke Macken (lewk gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200411-14:01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200411-12 ] zgv: Multiple buffer overflows 2004-11-07
Luke Macken (lewk gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200411-12:01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
up-imapproxy DoS vulnerabilities 2004-11-07
Timo Sirainen (tss iki fi)
Intro
-----

up-imapproxy is an IMAP proxy which keeps connections open after client has
logged out, and reuses it when client connects back. This is mostly useful
for webmail-type clients.

Summary
-------

There are various bugs in up-imapproxy which can crash it. Since
up-imapproxy runs in a sin

[ more ]  [ reply ]
[ GLSA 200411-15 ] OpenSSL, Groff: Insecure tempfile handling 2004-11-08
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200411-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Offline WPA-PSK auditing tool (coWPAtty) 2004-11-08
Joshua Wright (jwright hasborg com)
A while back, Robert Moskowitz published a paper titled "Weakness in
Passphrase Choice in WPA Interface" [1] that described a dictionary
attack against wireless networks using the TKIP protocol with a
pre-shared key (PSK).

Even though the WPA-PSK authentication mechanism was intended to be used

[ more ]  [ reply ]
(Page 1426 of 1748)  < Prev  1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus