|
Colapse all |
Post message
[security bulletin] SSRT4741 rev.1 DCE for HP OpenVMS Potential RPC Buffer Overflow Attack VU#259796, VU#568148, VU#326746 2004-07-14 Boren, Rich (SSRT) (rich boren hp com) RE: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC 2004-07-14 Ferruh Mavituna (ferruh mavituna com) > Is the vulnerability mitigated by > today's Microsoft patch? Both of POCs are working well (at least in my system -W2K3 all patches-) after recent MS patches. Can anyone confirm this ? Ferruh.Mavituna http://ferruh.mavituna.com PGPKey : http://ferruh.mavituna.com/PGPKey.asc > -----Original Me [ more ] [ reply ] RE: HijackClick 3 2004-07-14 http-equiv (at) excite (dot) com [email concealed] (1 malware com) Thor Larholm ha scritto nel messaggio: > From: Drew Copley > > In fact, I don't think there has been a bug in about ten > > months (coincidentally) that does not rely on either Jelmer's > > adodb bug or your shell.application bug. > I'm sorry, but did everybody suddenly forget about codeBa [ more ] [ reply ] Advisory 11/2004: PHP memory_limit remote vulnerability 2004-07-13 Stefan Esser (s esser e-matters de) Advisory 12/2004: PHP strip_tags() bypass vulnerability 2004-07-13 Stefan Esser (s esser e-matters de) Ref: http://www.securityfocus.com/archive/1/367866, Jul 1 2004 1:19PM, Subj: Brightmail leaks other user's spam 2004-07-14 Sym Security (secure symantec com) Thomas Springer posted: Brightmail Spamfilter 6.0 offer a possibility to manage mails identified as spam in a http-driven "control-center" on the Brightmail-Server via links like http://SERVER:41080/brightmail/quarantine/viewMsgDetails.do?id=QMsgView- 3;3-0 Simply altering the last numbers in th [ more ] [ reply ] Microsoft Windows Task Scheduler '.job' Stack Overflow 2004-07-14 NGSSoftware Insight Security Research (nisr nextgenss com) Unchecked buffer in mstask.dll 2004-07-14 Brett Moore (brett moore security-assessment com) ======================================================================== = Unchecked buffer in mstask.dll = = MS Bulletin posted: = http://www.microsoft.com/technet/security/bulletin/MS04-022.mspx = = Affected Software: = Microsoft Windows 2000 Service Pack 4 = Microsoft Windows XP, Microsoft Windo [ more ] [ reply ] HtmlHelp - .CHM File Heap Overflow 2004-07-14 Brett Moore (brett moore security-assessment com) ======================================================================== = HtmlHelp - .CHM File Heap Overflow = = MS Bulletin posted: = http://www.microsoft.com/technet/security/bulletin/MS04-023.mspx = = Affected Software: = Microsoft Windows 98, 98SE, ME = Microsoft Windows NT 4.0 = Microsoft Win [ more ] [ reply ] RE: Re: HijackClick 3 2004-07-12 Drew Copley (dcopley eEye com) > -----Original Message----- > From: http-equiv (at) excite (dot) com [email concealed] [mailto:1 (at) malware (dot) com [email concealed]] > Sent: Monday, July 12, 2004 12:06 PM > To: bugtraq (at) securityfocus (dot) com [email concealed] > Cc: NTBugtraq (at) listserv.ntbugtraq (dot) com [email concealed] > Subject: Re: HijackClick 3 > <snip> > This is absolutely fantastic Paul, with a patented double-cli [ more ] [ reply ] RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!] 2004-07-13 Sym Security (secure symantec com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec is aware and currently investigating this issue. - - ------------------------------------------------------------------ Symantec Product Security Team Symantec takes the security of our products seriously and is a responsible disclosure compan [ more ] [ reply ] Find the tag continued 2004-07-13 James C. Slora, Jr. (james slora phra com) Takeoff from http-equiv's notes about closing > By design, unprocessable HTML tags and tag parameters are ignored during parsing. An amazing amount of worthless obfuscating stuff can be inserted before the closing > of a valid tag, and the parameters for the tag can be tough to find. Mail filteri [ more ] [ reply ] IE Shell URI Download and Execute, POC 2004-07-13 Ferruh Mavituna (ferruh mavituna com) Hello; Code is based on http://www.securityfocus.com/archive/1/367878 (POC by Jelmer) message. I just added a new feature "download" and then execute application. Also I use Wscript.Shell in Javascript instead of Shell.Application. 1- copy \\IPADDRESS\NULLSHAREDFOLDER\bad.exe (stealth) 2- Wait fo [ more ] [ reply ] Re: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13 Mind Warper (mindwarper linuxmail org) In-Reply-To: <20040713101632.21299.qmail (at) www.securityfocus (dot) com [email concealed]> Thanks to SecuriTeam for pointing out that the known path vulnerability does not work. Since I got default.nop, it seemed to me as if this is normal, but actually the last 3 letters are random. The NULL byte bug on the other hand st [ more ] [ reply ] RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!] 2004-07-13 Sym Security (secure symantec com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec Product Security Team Symantec takes the security of our products seriously and is a responsible disclosure company. You can view our response policies at http://www.symantec.com/security. We will work directly with anyone who believes they h [ more ] [ reply ] Microsoft Window Utility Manager Local Elevation of Privileges 2004-07-13 Vivek Rathod (Application Security, Inc.) (vrathod appsecinc com) (1 replies) Microsoft Window Utility Manager Local Elevation of Privileges July 13, 2004 Credit: This vulnerability was researched and discovered by Cesar Cerrudo. Risk Level: High Summary: A local elevation of privileges exists in the Windows Utility Manager which allows any user to take complete control [ more ] [ reply ] Re: Microsoft Window Utility Manager Local Elevation of Privileges 2004-07-14 Chris Paget (ivegotta tombom co uk) Re: MSIE Similar Method Name Redirection Cross Site/Zone Scripting Vulnerability 2004-07-13 http-equiv (at) excite (dot) com [email concealed] (1 malware com) <!-- How bad is this problem? Critical. With minimal effort, a malicious website owner could install viruses or spyware on the visitor's computer. --> this just opens up a whole big can of worms. Phried Phish Phor everyone. http://www.malware.com/pauls.html https is even phunner. phew. [ more ] [ reply ] @stake advisory: WebSTAR (5.3.2 and below) Multiple Vulnerabilities 2004-07-13 Advisories (advisories atstake com) RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability 2004-07-12 Drew Copley (dcopley eEye com) > -----Original Message----- > From: Polazzo Justin [mailto:Justin.Polazzo (at) facilities.gatech (dot) edu [email concealed]] > Sent: Monday, July 12, 2004 12:22 PM > To: Drew Copley > Cc: bugtraq (at) securityfocus (dot) com [email concealed] > Subject: RE: MSIE Download Window Filename + Filetype > Spoofing Vulnerability > > Should you not be able [ more ] [ reply ] Re: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13 Philliph (bugtraq regedit sk) In-Reply-To: <20040713101632.21299.qmail (at) www.securityfocus (dot) com [email concealed]> Re: Vulnerability No. 1: Mozilla stores cache data in directory with random name, so it definitely isn´t vulnerable (the directory is %appdata%\Mozilla\Profiles\_name_of_profile_\_random_name_\Cache ) Re: Vulnerability No. 2: [ more ] [ reply ] Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13 Mind Warper (mindwarper linuxmail org) (3 replies) Two Vulnerabilities in Mozilla may lead to remote compromise. =--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--= ---------------------- Vendor Information: ---------------------- Homepage : http://www.mozilla.org Vendor : informed on 11/06/04 Mailed advisory: 13/06/04 [ more ] [ reply ] RE: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13 Darren Pilgrim (dmp bitfreak org) RE: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13 Jelmer (jkuperus planet nl) Re: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13 Daniel Veditz (dveditz cruzio com) RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability 2004-07-12 Polazzo Justin (Justin Polazzo facilities gatech edu) Should you not be able to tile your gui any way you please? Someone may be thinking that you could put an image in front of the security box in order to trick users into clicking on "open" without knowledge. I noticed that you cant click on the buttons when the image is in front of them. Would yo [ more ] [ reply ] |
|
Privacy Statement |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
HP SECURITY BULLETIN
HPSBOV01056_1 REVISION: 1
TITLE: SSRT4741 Rev.1 DCE for HP OpenVMS Potential RPC
Buffer Overrun Attack
NOTICE: There are no restrictions for distribution of this
Bulletin provided that it remains complete a
[ more ] [ reply ]