|
Colapse all |
Post message
[OpenPKG-SA-2004.031] OpenPKG Security Advisory (dhcpd) 2004-07-08 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] Norton AntiVirus Denial Of Service Vulnerability [Part: !!!] 2004-07-09 Bipin Gautam (visitbipin hotmail com) [GLSA 200407-06] libpng: Buffer overflow on row buffers 2004-07-08 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [ GLSA 200407-07 ] Shorewall : Insecure temp file handling 2004-07-08 Thierry Carrez (koon gentoo org) RE: Suggestion: erase data posted to the Web 2004-07-08 Michael Wojcik (Michael Wojcik microfocus com) (1 replies) > From: Andrew Daviel [mailto:advax (at) triumf (dot) ca [email concealed]] > Sent: Wednesday, July 07, 2004 2:30 PM > > A recent New Scientist article referred to the fact that > "sensitive data" may persist in computer memory, and be > swapped to disk and persist after a power-down. > > I had observed a while ago that text [ more ] [ reply ] Scob variant using IIS 6.0 or just upgrades ? 2004-07-07 Hubbard, Dan (dhubbard websense com) Our mining processes have uncovered more than 100 additional sites that are appear to have been breached and used as part of the "Scob" malcode. Unlike the other sites discovered these sites are NOT running IIS 5.0 and appear as though they are not using the IIS "footer" vulnerability. There are two [ more ] [ reply ] Suggestion: erase data posted to the Web 2004-07-07 Andrew Daviel (advax triumf ca) (2 replies) A recent New Scientist article referred to the fact that "sensitive data" may persist in computer memory, and be swapped to disk and persist after a power-down. http://www.newscientist.com/news/news.jsp?id=ns99995064 I had observed a while ago that text such as credit card numbers entered into a [ more ] [ reply ] Re: Suggestion: erase data posted to the Web 2004-07-07 Luciano Miguel Ferreira Rocha (strange nsk no-ip org) RE: Can we prevent IE exploits a priori? 2004-07-07 Drew Copley (dcopley eEye com) (1 replies) I have not seen evidence that either of these applications prevents new exploits. If anyone is making this claim, they should explain what technology they are using. The required fix is simply setting a kill bit on the vulnerable activex objects. Had this been done in September, none of these attac [ more ] [ reply ] Comersus Cart Improper Request Handling 2004-07-07 Thomas Ryan (tommy providesecurity com) Comersus Cart Improper Request Handling Release Date: July 6, 2004 Severity: Medium Vendor: Comersus Open Technologies Software: Tested on Comersus Cart 5.09 Previous versions may also be affected. Remote: Remotely executed from any web browser Technical Details: The unethical user is able to [ more ] [ reply ] FW: [security bulletin] SSRT4718 rev.0 HP Tru64 UNIX NTP Integer Overflow 2004-07-07 Boren, Rich (SSRT) (rich boren hp com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 HP SECURITY BULLETIN HPSBTU01043 REVISION: 0 SSRT4718 rev.0 HP Tru64 UNIX NTP Integer Overflow ----------------------------------------------------------------- NOTICE: There are no restrictions for distribution of this Bulletin provided that [ more ] [ reply ] Can we prevent IE exploits a priori? 2004-07-07 security-bugtraq marketshark net (1 replies) We all know that yet another critical IE vulnerability (download.ject [aka SCOB, finally patched by M$ after 10 months] caused some high profile groups (http://slate.msn.com/id/2103152/, http://www.theinquirer.net/?article=16922, slashdot.org/articles/04/07/02/1441242.shtml?tid=103&tid=113&tid=126 [ more ] [ reply ] Re: (IE/SCOB) Switching Software Because of Bugs: Some Facts About Software and Security bugs 2004-07-06 Thomas C. Greene (tcgreene verizon net) Drew, you make some valid points. However, i believe your conclusion is off the mark nonetheless. Admittedly, IE's vast installed user base and MS's arrogance regarding security (and many other matters) have influenced the number of bugs that come to light. No argument there. However, there *are* [ more ] [ reply ] Npds BB HTML Injection 2004-07-07 Benjamin Tolman (rituel voila fr) I release it very quickly ... So it can be improved : Code to put in a reply or in a topic : Your fake message</td></tr><tr><td valign="bottom"><hr noshade size="1" class="ONGL"> <a href="user.php?op=userinfo&uname=User" CLASS="NOIR" target=_blank><img src="images/forum/icons/profi [ more ] [ reply ] Comersus Cart Cross-Site Scripting Vulnerability 2004-07-07 Thomas Ryan (tommy providesecurity com) Comersus Cart Cross-Site Scripting Vulnerability Release Date: July 6, 2004 Severity: High Vendor: Comersus Open Technologies Software: Tested on Comersus Cart 5.09 Previous versions may also be affected. Remote: Remotely executed from any web browser Technical Details: The malicious user is a [ more ] [ reply ] Enterasys XSR Security Router Record Route Denial Of Service Vulnerability (More information) 2004-07-07 Frederico Queiroz (fqueiroz ish com br) The Enterasys Networks Security Response Team published an incident note about this thread. (ETS-i-2004-11036) Check it out for updated information: http://www.enterasys.com/support/security/incidents/2004/07/11036.html Frederico Queiroz Security Consultant/ISH Tecnologia Phone: +55-27-3334-8900 [ more ] [ reply ] MDKSA-2004:066 - Updated kernel packages fix multiple vulnerabilities 2004-07-07 Mandrake Linux Security Team (security linux-mandrake com) Eudora 6.1.2 attachment spoof 2004-07-06 psz maths usyd edu au (Paul Szabo) Eudora 6.1.2 for Windows was released on 21 June 2004. The release notes http://www.eudora.com/download/eudora/windows/6.1.2/RelNotes.txt say: > SECURITY > Fixed case where attachments could be spoofed via base64 encoded > (plain-text, inline) MIME parts. Not so. Harmless demo below. Cheers, Pau [ more ] [ reply ] Re: Registry Fix For Variant of Scob 2004-07-06 http-equiv (at) excite (dot) com [email concealed] (1 malware com) <!-- No reason to set the kill bit? Take a look at http://seclists.org/lists/fulldisclosure/2004/Jun/0318.html And I am quoting you now "You should be able to use this to compromise Windows XP SP2 through Internet Explorer despite the My Computer zone hardening since the Trusted Sites Zone [ more ] [ reply ] |
|
Privacy Statement |
July 7, 2004
Summary: Windows shell: scheme exposed in Mozilla
Products: Mozilla (Suite)
Mozilla Firefox
Mozilla Thunderbird
Fixed in: Mozilla (Suite) 1.7.1
Mozilla Firefox 0.9.2
Mozilla Thunderbird 0.7.2
Description
[ more ] [ reply ]