|
Colapse all |
Post message
Ipswitch WhatsUp Gold Remote Buffer Overflow Vulnerability - [Full-Disclosure] iDEFENSE Security Advisory 08.25.04 2004-08-25 Jérôme ATHIAS (jerome athias caramail com) CDE libDtHelp LOGNAME Buffer Overflow Vulnerability 2004-08-25 Jérôme ATHIAS (jerome athias caramail com) Anonymous Surfing Via Gmail Login Window - Poor Sanitization 2004-08-25 Punabi MC (punj4b1_mc yahoo com) Anonymous Surfing Via Gmail Login Window - Poor Sanitization User can do anonymous surfing (apart form other cool tricks) from Gmail login window. The window is small, still checking your mails via google is phun. :) 1. Open https://gmail.google.com/?dest=http%3A%2F%2Fblablabla. 2. The login window [ more ] [ reply ] RE: Unsecure file permission of ZoneAlarm pro. 2004-08-22 Simon Zuckerbraun (szucker sst-pr-1 com) Bipin, what you're bringing up is a very interesting point. It turns out that, despite the lax NTFS permissions, the safePrograms.xml file is apparantly quite well protected from tampering. The TrueVector driver, which runs kernel-mode, holds a lock on the file that prevents any other process fr [ more ] [ reply ] Computer Network Defence Vulnerability Alert State 2004-08-25 Andy Cuff (lists securitywizardry com) Hi All, As a great believer in being able to track emerging vulnerabilities with minimal effort, I have created another "Alert State" image. http://securitywizardry.com/radar.htm However, I have tried to make it a lot more granular dividing the image up into OS and Applications and reducing the ale [ more ] [ reply ] Squirrelmail chpasswd local root bruteforce exploit 2004-08-24 Jérôme ATHIAS (jerome athias caramail com) Re: NETGEAR DG834G SPECIAL FEATURES 2004-08-24 Paul James (prj earthlabs co uk) In-Reply-To: <20040812173908.5199.qmail (at) www.securityfocus (dot) com [email concealed]> My DG834 (non-wireless) also appears vulnerable to the ZEBRA problem, but only on port 2602. How does one go about changing this password from the default? And what does this ZEBRA service offer? Unable to find documentation on t [ more ] [ reply ] RE: Running renamed executables with CMD.EXE 2004-08-24 Michael Wojcik (Michael Wojcik microfocus com) > From: Geoff Vass [mailto:geoff (at) cadzow.com (dot) au [email concealed]] > Sent: Saturday, 21 August, 2004 07:43 > [Your messages would be easier to read if you kept them to a reasonable line length.] > A while ago I "discovered" that CMD.EXE would launch renamed > executables. I > felt that this was a security problem [ more ] [ reply ] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Secure Access Control Server 2004-08-25 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Secure Access Control Server Revision 1.1 Last Updated 2004 August 25 1630 UTC (GMT) For Public Release 2004 August 25 1600 UTC (GMT) - ------------------------------------------------------ [ more ] [ reply ] Kaspersky Labs says Electronic Jihad on the Internet quite possible tomorrow 2004-08-25 Steve (stevemeeters excite com) The Russian news agency, Novosti, has reported Kaspersky Labs has warned about a large-scale virus attack on the Internet that might be delivered by Islamic terrorists on August 26. http://en.rian.ru/rian/index.cfm?prd_id=160&msg_id=4759214&startrow=11&d ate=2004-08-24&do_alert=0 Anyone have [ more ] [ reply ] IRM 010: Top Layer Attack Mitigator IPS 5500 Denial of Service 2004-08-25 Advisories (advisories irmplc com) ------------------------------------------------------------------------ ---- IRM Security Advisory No. 010 Top Layer Attack Mitigator IPS 5500 Denial of Service Vulnerability Type / Importance: DoS / High Problem discovered: July 22nd 2004 Vendor contacted: July 23rd 2004 Advisory published [ more ] [ reply ] Vulnerability: OpenBSD 3.5 Kernel Panic. 2004-08-25 Vafa Izadinia (vafa hush ai) Hi, I have posted this vulnerability note to CERT and gotten no response. It is remotely exploitable, but since it requires commands to be executed as root on the gateway machine, it is unlikely to cause any unplanned disruption. OpenBSD was contacted, and they provided a patch within 12 hours. [ more ] [ reply ] ANNOUNCE: VulnDisco RADIUS protocol testsuite v1.0 2004-08-24 Evgeny Demidov (demidov gleg net) Hello, We are proud to announce the release of the VulnDisco RADIUS protocol testsuite to the public. This testsuite is a part of VulnDisco testsuite, which is available to VulnDisco clients. The purpose of this testsuite is to evaluate RADIUS protocol implementations from the security point o [ more ] [ reply ] bug found 2004-08-25 Mathieu Lacroix (Daemonz videotron ca) NetworkEverywhere router Model NR041 (latest firmware rev 1.2 Release 03) suffers a "script injection over dhcp" vulnerability. The NR041 does not filter DHCP HOSTNAME options coming from its clients. Because of that, we can inject a web script into the web based administrative interface and w [ more ] [ reply ] Easy File Sharing Webserver v1.25 Vulnerabilities 2004-08-24 GulfTech Security (security gulftech org) ########################################################## # GulfTech Security Research August, 24th 2004 ########################################################## # Vendor : EFS Software Inc. # URL : http://www.sharing-file.com # Version : Easy File Sharing Webserver v1.25 # Risk [ more ] [ reply ] PHP Code Snippet Library Multiple Cross-Site Scripting (XSS) Vulnerabilities 2004-08-24 Nikyt0x Argentina (nikyt0x hotmail com) [Nikkyt0x Advisory] #0000-0001 [PHP Code Snippet Library Multiple Cross-Site Scripting (XSS) Vulnerabilities] Software: PHP Code Snippet Library Vendor: http://www.php-csl.com/ Date: 24/08/2004 Author: Nikyt0x [ nikyt0x (at) hotmail (dot) com [email concealed] ] Site: http://nikyt0x.webcindario.com Advisory UR [ more ] [ reply ] [ GLSA 200408-23 ] kdelibs: Cross-domain cookie injection vulnerability 2004-08-24 Joshua J. Berry (condordes gentoo org) [SECURITY] [DSA 541-1] New icecast-server packages fix cross site scripting 2004-08-24 joey infodrom org (Martin Schulze) Re: [ GLSA 200408-19 ] courier-imap: Remote Format String Vulnerability 2004-08-24 ktha hush com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi! I think that the isprint() check is NOT limiting the exploitation of this bug at all. You can still exploit this vulnerability by overwriting stack frames (you can read more about it here: http://www.phrack.org/show.php?p=59&a=7) and by using the s [ more ] [ reply ] Possible Security Issues In LiveWorld Products 2004-08-24 GulfTech Security (security gulftech org) ########################################################## # GulfTech Security Research August, 23rd 2004 ########################################################## # Vendor : LiveWorld, Inc. # URL : http://www.liveworld.com # Version : Multiple Products # Risk : Cross Site Scriptin [ more ] [ reply ] Microsoft updates documentation on Windows time synchronization 2004-08-24 3APA3A (3APA3A SECURITY NNOV RU) |
|
Privacy Statement |
Ipswitch WhatsUp Gold Remote Buffer Overflow Vulnerability
iDEFENSE Security Advisory 08.25.04
http://www.idefense.com/application/poi/display?type=vulnerabilities
August 25, 2004
I. BACKGROUND
Ipswitch WhatsUp Gold is a Microsoft Windows based network monitoring
application. More info
[ more ] [ reply ]