BugTraq Mode:
(Page 1433 of 1748)  < Prev  1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438  Next >
pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security 2004-10-26
Dragos Ruiu (dr kyx net)
Firewire/IEEE 1394 Considered Harmful to Physical Security

Advisory URL: http://pacsec.jp/advisories.html

Summary:
--------

IEEE1394 Specification allows client devices to directly access host
memory, bypassing operating system limitations. A malicious client device
can read and modify sensitive

[ more ]  [ reply ]
MailCarrier 2.51 SMTP server Buffer Overflow [PoC included] 2004-10-26
Jérôme ATHIAS (jerome athias caramail com)


ABOUT :

MailCarrier is a full-featured mail server with the latest security and anti-spam functions. It supports SSL communication and SMTP/POP3 authentication methods based on SASL and NTLM that do not transmit message and/or password in clear text. Many spam mails can be blocked through inqu

[ more ]  [ reply ]
inetutils tftp client, DNS resolving bofs 2004-10-26
infamous41md hotpop com
Subject:

GNU tftp client remote buffer overflows.

++++++++++++++++++++++++++++++++++++++++++++

Product:

The tftp client that comes with the inetutils package. It's found on all unices
I know of.

++++++++++++++++++++++++++++++++++++++++++++

Vulnerable:

inetutils-1.4.2 was the only version aud

[ more ]  [ reply ]
[ GLSA 200410-26 ] socat: Format string vulnerability 2004-10-25
Luke Macken (lewk gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200410-24 ] MIT krb5: Insecure temporary file use in send-pr.sh 2004-10-25
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
OpenSSL 0.9.7e released (fwd from mark (at) openssl (dot) org [email concealed]) 2004-10-26
je sekure net

From: Mark J Cox <mark (at) openssl (dot) org [email concealed]>
Date: Mon, 25 Oct 2004 14:49:49 +0100 (BST)
To: openssl-announce (at) openssl (dot) org [email concealed], openssl-users (at) openssl (dot) org [email concealed],
openssl-dev (at) openssl (dot) org [email concealed]
Subject: OpenSSL 0.9.7e released
Reply-To: openssl-dev (at) openssl (dot) org [email concealed]

OpenSSL version 0.9.7e released
============================

[ more ]  [ reply ]
[ GLSA 200410-22 ] MySQL: Multiple vulnerabilities 2004-10-24
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
SUSE Security Announcement: xpdf, gpdf, kpdf, pdftohtml, cups (SUSE-SA:2004:039) 2004-10-26
Thomas Biege (thomas suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: xpdf, gpdf, kdegraphics3-pdf, pdftohtml, cups
Announcement-ID: SUSE-SA:2004:039

[ more ]  [ reply ]
libxml2 remote buffer overflows (not in xml parsing code though) 2004-10-26
infamous41md hotpop com
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++

Subject:

libXML remotely exploitable buffer overflows.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++

Product Description:

Libxml2 is the XML C parser and toolkit developed for the G

[ more ]  [ reply ]
libgd integer overflow 2004-10-26
infamous41md hotpop com
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++

Subject:

GD Graphics Library integer overflow leading to heap overflow.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++

Product Description:

An ANSI C library for the dynamic creation

[ more ]  [ reply ]
RE: Critical Vulnerability in Altiris Deployment Server architecture 2004-10-25
Brooks, Shane (SBrooks orangelake com)

This is the response we received from Altiris when we submitted this issue to their people - please respond with your comments/thoughts:

<snip>
Subject:

Design flaw in Altiris Deployment Server - Attacker can take over all clients on a network with Admininstrator Rights and Remote Control abili

[ more ]  [ reply ]
Bug in hotmail 2004-10-24
security (security kalamiteit nl)
hi all,
i am not a person that posts to bugtraq really, but more a person that
reads from it!
well the thing is, I was checking my hotmail account, as i saw an e-mail
from an old friend of mine, i saw an attachement, so i was already in
doubt (but i was using gentoo anyways .. so not realy affra

[ more ]  [ reply ]
Two Vulnerabilities in OpenWFE Web Client 2004-10-24
Joxean Koret (joxeankoret yahoo es)


------------------------------------------------------------------------
---

Two Vulnerabilities in OpenWFE

------------------------------------------------------------------------
---

Author: Jose Antonio Coret (Joxean Koret)

Date: 2004

Location: Basque Country

----

[ more ]  [ reply ]
Re: Update: Web browsers - a mini-farce (MSIE gives in) 2004-10-25
gabrield89 hotmail com
In-Reply-To: <20041023001154.F23256 (at) dekadens.coredump (dot) cx [email concealed]>

>

>Last but not least, MSIE gives in:

>

>> Only MSIE appears to be able to consistently handle [*] malformed

>> input well, suggesting this is the only program that underwent

>> rudimentary security QA testing with a similar fuzz

[ more ]  [ reply ]
Re: How to Break Windows XP SP2 + Internet Explorer 6 SP2 2004-10-25
michael evanchik (mcbain aol com)
In-Reply-To: <200410200335.i9K3Zi72007862 (at) web186.megawebservers (dot) com [email concealed]>

I have created a PoC for this http://www.michaelevanchik.com/kara/scrolll/notagain.txt

and for those of you scared to click links these days , here is the contents

Microsoft Internet Explorer ms-its scheme/CHM remote code ex

[ more ]  [ reply ]
Mozilla Firefox (tested on 0.9.3) html-code crash. 2004-10-25
ducch apple (admin elroyfam com)


Viewing a page with the content:

<HTML><INPUT^@AAAAAAAAAA>

Would cause Firefox to crash.

[ more ]  [ reply ]
RE: Update: Web browsers - a mini-farce (MSIE gives in) 2004-10-25
David Brodbeck (DavidB mail interclean com)
> -----Original Message-----
> From: Michal Zalewski [mailto:lcamtuf (at) ghettot (dot) org [email concealed]]

> ******************************************************************
> * This means that VIRTUALLY EVERY BROWSER IN USE TODAY is unable *
> * to securely render HTML. Keeping in mind that not only web *
> * browsi

[ more ]  [ reply ]
Some Voters Say Machines Failed,Incorrect Choices Appear on Screens (fwd) 2004-10-25
Atom 'Smasher' (atom suspicious org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

"I pushed [Kerry's] name, but a green check mark appeared before President
Bush's name"

- --
...atom

_________________________________________
PGP key - http://atom.smasher.org/pgp.txt
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7

[ more ]  [ reply ]
STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability 2004-10-25
advisory stgsecurity com


STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability

Revision 1.0

Date Published: 2004-10-22 (KST)

Last Update: 2004-10-22

Disclosed by SSR Team (advisory (at) stgsecurity (dot) com [email concealed])

Summary

========

MoniWiki is a wiki web application used by many Korean Linux users.

It has a cro

[ more ]  [ reply ]
[CLA-2004:878] Conectiva Security Announcement - zlib 2004-10-25
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : zlib
SUMMARY : Fix for denial of service vuln

[ more ]  [ reply ]
Fake RedHat - Fedora Security Patch / Trojan Source Code & Analysis 2004-10-25
K-OTiK Security (Special-Alerts k-otik com)


Emails that pretend to come from the Red Hat Security Team are circulating in the wild. These emails tell users to download and install malicious updates. These trojan updates contain malicious code designed to compromise the systems they are run on.

Code and Analysis :

http://www.k-otik.com/

[ more ]  [ reply ]
[BUGZILLA] Vulnerabilities in Bugzilla 2.16.6 and 2.18rc2 2004-10-25
David Miller (justdave bugzilla org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Bugzilla Security Advisory
October 24, 2004

Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers three security bugs that have recently been
discovered and fixed in the Bugzil

[ more ]  [ reply ]
python does mangleme (with IE bugs!) 2004-10-24
ned (nd felinemenace org) (1 replies)
i've made a port of mangleme:
http://felinemenace.org/~nd/htmler.py
with a few extra quirks (such as file extentions/url types)

it finds IE bugs after roughly 2.5 -> 3 hours and they are at:
http://felinemenace.org/~nd/crash_ie/

They are not the null pointer dereference that Michal found (which
c

[ more ]  [ reply ]
Re: [Full-Disclosure] python does mangleme (with IE bugs!) 2004-10-25
Berend-Jan Wever (skylined edup tudelft nl)
Re: Google Script Insertion Exploit 2004-10-23
Jérôme ATHIAS (jerome athias caramail com)
In-Reply-To: <20041019163859.32238.qmail (at) www.securityfocus (dot) com [email concealed]>

>The exploit is easiest to produce through a custom google search form which

>are commonly seen, used and understood on the web, but you can also do it

>through a simple link, this one works in IE:

>

>http://www.google.com/custom

[ more ]  [ reply ]
rssh: pizzacode security alert 2004-10-23
Derek Martin (code pizzashack org)
PIZZACODE SECURITY ALERT

program: rssh
risk: low[*]
problem: string format vulnerability in log.c
details:

rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want to
allow users to copy files off of via scp, without pro

[ more ]  [ reply ]
(Page 1433 of 1748)  < Prev  1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus