|
Colapse all |
Post message
pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security 2004-10-26 Dragos Ruiu (dr kyx net) MailCarrier 2.51 SMTP server Buffer Overflow [PoC included] 2004-10-26 Jérôme ATHIAS (jerome athias caramail com) ABOUT : MailCarrier is a full-featured mail server with the latest security and anti-spam functions. It supports SSL communication and SMTP/POP3 authentication methods based on SASL and NTLM that do not transmit message and/or password in clear text. Many spam mails can be blocked through inqu [ more ] [ reply ] inetutils tftp client, DNS resolving bofs 2004-10-26 infamous41md hotpop com Subject: GNU tftp client remote buffer overflows. ++++++++++++++++++++++++++++++++++++++++++++ Product: The tftp client that comes with the inetutils package. It's found on all unices I know of. ++++++++++++++++++++++++++++++++++++++++++++ Vulnerable: inetutils-1.4.2 was the only version aud [ more ] [ reply ] [ GLSA 200410-24 ] MIT krb5: Insecure temporary file use in send-pr.sh 2004-10-25 Thierry Carrez (koon gentoo org) OpenSSL 0.9.7e released (fwd from mark (at) openssl (dot) org [email concealed]) 2004-10-26 je sekure net From: Mark J Cox <mark (at) openssl (dot) org [email concealed]> Date: Mon, 25 Oct 2004 14:49:49 +0100 (BST) To: openssl-announce (at) openssl (dot) org [email concealed], openssl-users (at) openssl (dot) org [email concealed], openssl-dev (at) openssl (dot) org [email concealed] Subject: OpenSSL 0.9.7e released Reply-To: openssl-dev (at) openssl (dot) org [email concealed] OpenSSL version 0.9.7e released ============================ [ more ] [ reply ] SUSE Security Announcement: xpdf, gpdf, kpdf, pdftohtml, cups (SUSE-SA:2004:039) 2004-10-26 Thomas Biege (thomas suse de) libxml2 remote buffer overflows (not in xml parsing code though) 2004-10-26 infamous41md hotpop com ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++ Subject: libXML remotely exploitable buffer overflows. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++ Product Description: Libxml2 is the XML C parser and toolkit developed for the G [ more ] [ reply ] libgd integer overflow 2004-10-26 infamous41md hotpop com ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++ Subject: GD Graphics Library integer overflow leading to heap overflow. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +++++++ Product Description: An ANSI C library for the dynamic creation [ more ] [ reply ] RE: Critical Vulnerability in Altiris Deployment Server architecture 2004-10-25 Brooks, Shane (SBrooks orangelake com) This is the response we received from Altiris when we submitted this issue to their people - please respond with your comments/thoughts: <snip> Subject: Design flaw in Altiris Deployment Server - Attacker can take over all clients on a network with Admininstrator Rights and Remote Control abili [ more ] [ reply ] Bug in hotmail 2004-10-24 security (security kalamiteit nl) hi all, i am not a person that posts to bugtraq really, but more a person that reads from it! well the thing is, I was checking my hotmail account, as i saw an e-mail from an old friend of mine, i saw an attachement, so i was already in doubt (but i was using gentoo anyways .. so not realy affra [ more ] [ reply ] Re: Update: Web browsers - a mini-farce (MSIE gives in) 2004-10-25 gabrield89 hotmail com In-Reply-To: <20041023001154.F23256 (at) dekadens.coredump (dot) cx [email concealed]> > >Last but not least, MSIE gives in: > >> Only MSIE appears to be able to consistently handle [*] malformed >> input well, suggesting this is the only program that underwent >> rudimentary security QA testing with a similar fuzz [ more ] [ reply ] Re: How to Break Windows XP SP2 + Internet Explorer 6 SP2 2004-10-25 michael evanchik (mcbain aol com) In-Reply-To: <200410200335.i9K3Zi72007862 (at) web186.megawebservers (dot) com [email concealed]> I have created a PoC for this http://www.michaelevanchik.com/kara/scrolll/notagain.txt and for those of you scared to click links these days , here is the contents Microsoft Internet Explorer ms-its scheme/CHM remote code ex [ more ] [ reply ] RE: Update: Web browsers - a mini-farce (MSIE gives in) 2004-10-25 David Brodbeck (DavidB mail interclean com) > -----Original Message----- > From: Michal Zalewski [mailto:lcamtuf (at) ghettot (dot) org [email concealed]] > ****************************************************************** > * This means that VIRTUALLY EVERY BROWSER IN USE TODAY is unable * > * to securely render HTML. Keeping in mind that not only web * > * browsi [ more ] [ reply ] Some Voters Say Machines Failed,Incorrect Choices Appear on Screens (fwd) 2004-10-25 Atom 'Smasher' (atom suspicious org) STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability 2004-10-25 advisory stgsecurity com STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability Revision 1.0 Date Published: 2004-10-22 (KST) Last Update: 2004-10-22 Disclosed by SSR Team (advisory (at) stgsecurity (dot) com [email concealed]) Summary ======== MoniWiki is a wiki web application used by many Korean Linux users. It has a cro [ more ] [ reply ] [CLA-2004:878] Conectiva Security Announcement - zlib 2004-10-25 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : zlib SUMMARY : Fix for denial of service vuln [ more ] [ reply ] Fake RedHat - Fedora Security Patch / Trojan Source Code & Analysis 2004-10-25 K-OTiK Security (Special-Alerts k-otik com) Emails that pretend to come from the Red Hat Security Team are circulating in the wild. These emails tell users to download and install malicious updates. These trojan updates contain malicious code designed to compromise the systems they are run on. Code and Analysis : http://www.k-otik.com/ [ more ] [ reply ] [BUGZILLA] Vulnerabilities in Bugzilla 2.16.6 and 2.18rc2 2004-10-25 David Miller (justdave bugzilla org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Bugzilla Security Advisory October 24, 2004 Summary ======= Bugzilla is a Web-based bug-tracking system, used by a large number of software projects. This advisory covers three security bugs that have recently been discovered and fixed in the Bugzil [ more ] [ reply ] python does mangleme (with IE bugs!) 2004-10-24 ned (nd felinemenace org) (1 replies) i've made a port of mangleme: http://felinemenace.org/~nd/htmler.py with a few extra quirks (such as file extentions/url types) it finds IE bugs after roughly 2.5 -> 3 hours and they are at: http://felinemenace.org/~nd/crash_ie/ They are not the null pointer dereference that Michal found (which c [ more ] [ reply ] Re: [Full-Disclosure] python does mangleme (with IE bugs!) 2004-10-25 Berend-Jan Wever (skylined edup tudelft nl) Re: Google Script Insertion Exploit 2004-10-23 Jérôme ATHIAS (jerome athias caramail com) In-Reply-To: <20041019163859.32238.qmail (at) www.securityfocus (dot) com [email concealed]> >The exploit is easiest to produce through a custom google search form which >are commonly seen, used and understood on the web, but you can also do it >through a simple link, this one works in IE: > >http://www.google.com/custom [ more ] [ reply ] rssh: pizzacode security alert 2004-10-23 Derek Martin (code pizzashack org) PIZZACODE SECURITY ALERT program: rssh risk: low[*] problem: string format vulnerability in log.c details: rssh is a restricted shell for use with OpenSSH, allowing only scp and/or sftp. For example, if you have a server which you only want to allow users to copy files off of via scp, without pro [ more ] [ reply ] |
|
Privacy Statement |
Advisory URL: http://pacsec.jp/advisories.html
Summary:
--------
IEEE1394 Specification allows client devices to directly access host
memory, bypassing operating system limitations. A malicious client device
can read and modify sensitive
[ more ] [ reply ]