|
Colapse all |
Post message
UPDATED OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSL Multiple Vulnerabilities 2004-08-31 please_reply_to_security sco com [SECURITY] [DSA 543-1] New krb5 packages fix several vulnerabilities 2004-08-31 joey infodrom org (Martin Schulze) [SECURITY] [DSA 458-2] New python2.2 packages really fix buffer overflow 2004-08-31 joey infodrom org (Martin Schulze) DOS@TFS 2004-08-31 CoolICE (CoolICE China com) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :Application: TYPSoft FTP Server :Vendors: www.typsoft.com :Version: <=1.11 :Platforms: Windows :Bug: D.O.S :Date: 2004-08-28 :Author: CoolICE :E_Mail: CoolICE#China.com :::::::::::::::::::::::::::::::::::::::::::::::::::::::: [ more ] [ reply ] Security Center and Windows XP clients in domain 2004-08-31 albatross tim it From the Symantec site: Q: Which Symantec products will the product update apply to? A: The product update applies to customers who use Symantec Client Security, Symantec AntiVirus Corporate Edition, and Symantec AntiVirus Enterprise Edition if their client systems are not members of a Win [ more ] [ reply ] Linux OpenExchange - cleartext rootpw in swap 2004-08-31 Rene (l0om excluded org) (1 replies) date: 31.08.2004 author: l0om - l0om [at] excluded dot org - www.excluded.org discovered in: SuSE Linux Openexchange Server 4 problem: cleartext rootpw in swap caused by fergotten "mlock" or wiping out memory hi, i have noticed my root password flying around on my swap in cleartext. [ more ] [ reply ] Re: Linux OpenExchange - cleartext rootpw in swap 2004-08-31 Rainer Duffner (rainer ultra-secure de) D-Link DCS-900 IP camera remote exploit that change the IP 2004-08-31 Jérôme ATHIAS (jerome athias caramail com) /* dlinkdown.c - miscname.com change ip address on all dlink dcs-900 cameras on the local network without authentication dlink dcs-900 ip cameras use a broadcast/listen method of configuration ... rather than a static ip addr out of the box, it listens for a 62976/udp broadcast pac [ more ] [ reply ] Possible root compromose with bsdmainutils 6.0.x < 6.0.15 (Debian testing/unstable) 2004-08-30 Steven Van Acker (deepstar ulyssis org) Hi, this advisory was sent to the maintainers of the bsdmainutils package in Debian testing/unstable. With their agreement, I have waited to send it to bugtraq untill now. To fix the vulnerability, upgrade your bsdmainutils package to version 6.0.15. This package is already in the unstable branch [ more ] [ reply ] [vulnwatch] WFTPD Pro Server 3.21 MLST Command Denial of Service Vulnerability 2004-08-29 lion (lion cnhonker net) [vulnwatch] WFTPD Pro Server 3.21 MLST Command Denial of Service Vulnerability www.cnhonker.com Security Advisory Advisory Name: WFTPD Pro Server 3.21 MLST Command Denial of Service Vulnerability Release Date: 08/30/2004 Affected version: WFTPD Pro Server 3.21 Release 3 Author: lion <lion@cnhonker [ more ] [ reply ] [vulnwatch] Titan FTP Server Long Command Heap Overflow Vulnerability 2004-08-29 lion (lion cnhonker net) [vulnwatch] Titan FTP Server Long Command Heap Overflow Vulnerability www.cnhonker.com Security Advisory Advisory Name: Titan FTP Server Long Command Heap Overflow Vulnerability Release Date: 08/30/2004 Affected version: Titan FTP Server <= 3.21 Author: lion <lion (at) cnhonker (dot) net [email concealed]> Overview: A vuln [ more ] [ reply ] Cross Site Scripting in XOOPS Version 2.x Dictionary module 2004-08-28 CyruxNET (cyruxnet cyruxnet org) ------------------------------------------------------------------------ -- Cross Site Scripting in XOOPS Version 2.x Dictionary module ------------------------------------------------------------------------ -- Type: Cross Site Scripting (XSS) Titule: Xoops Dictionary module (by nagl) Date: Aug [ more ] [ reply ] [SECURITY] [DSA 542-1] New Qt packages fix arbitrary code execution and denial of service 2004-08-30 joey infodrom org (Martin Schulze) RE: CDE libDtHelp LOGNAME Buffer Overflow Vulnerability 2004-08-26 Thor Larholm (tlarholm pivx com) Hi Sunil, Did iDefense stop posting vulnerabilities to Bugtraq as a matter of policy or has it just been an error? I can understand the business motivations for you to restrict information sharing, though I might disagree. Regards Thor Larholm Senior Security Researcher PivX Solutions 23 Corpora [ more ] [ reply ] [vulnwatch] WS_FTP Server Denial of Service Vulnerability 2004-08-29 lion (lion cnhonker net) [vulnwatch] WS_FTP Server Denial of Service Vulnerability www.cnhonker.com Security Advisory Advisory Name: WS_FTP Server Denial of Service Vulnerability Release Date: 08/30/2004 Affected version: WS_FTP Server 5.0.2 Author: lion <lion (at) cnhonker (dot) net [email concealed]> Overview: A vulnerability has been found in W [ more ] [ reply ] Re: 0day critical vulnerability/exploit targets Winamp users in the wild 2004-08-28 K-OTiK Security (Special-Alerts k-otik com) In-Reply-To: <20040826164943.17362.qmail (at) www.securityfocus (dot) com [email concealed]> Nullsoft has issued a fix for this critical vulnerability affecting Winamp 3.0, 5.0 and 5.0 Pro or newer. Nullsoft said that Winamp 5.05 resolves this exploit in two ways: - Winamp will now prompt all users with a confirmation wi [ more ] [ reply ] [ GLSA 200408-27 ] Gaim: New vulnerabilities 2004-08-27 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [ GLSA 200408-26 ] zlib: Denial of service vulnerability 2004-08-27 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Gaucho v1.4 Build 145 Buffer Overflow 2004-08-26 Jérôme ATHIAS (jerome athias caramail com) Gaucho version 1.4 Build 145 is vulnerable to a buffer overflow when receiving malformed emails from a POP3 server. This vulnerability is triggered if Gaucho receives from the POP3 server, a specially crafted email that has an abnormally long string in the Content-Type field of the email header. T [ more ] [ reply ] SGI ProPack 3: Kernel Update #3 - Security and other fixes 2004-08-26 SGI Security Coordinator (agent99 sgi com) MDKSA-2004:087 - Updated kernel packages fix multiple vulnerabilities 2004-08-27 Mandrake Linux Security Team (security linux-mandrake com) |
|
Privacy Statement |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
________________________________________________________________________
______
SCO Security Advisory
Subject: UPDATED OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSL Multiple Vulnerabilities
Advisory number: SCOSA-2004.10.1
Issue date: 2004 July
[ more ] [ reply ]