BugTraq Mode:
(Page 1486 of 1748)  < Prev  1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491  Next >
Security Advisory: FreeBSD local DoS 2004-06-24
Marceta Milos (root marcetam net)
Security Advisory: FreeBSD local DoS

Systems affected:

FreeBSD 5.1-RELEASE/Alpha. Other versions are probably vulnerable.
FreeBSD 5.1-RELEASE/IA32 is _not_ vulnerable.

Not sure about other FreeBSD/arch but they could be vulnerable too.

Risk: low

Date: 24 June 2004

Legal notice:

1. This Adviso

[ more ]  [ reply ]
Microsoft and Security 2004-06-25
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Where is Microsoft now "protecting their customers" as they love
to bray? Should not someone in authority of this public company
step forward and explain themselves at this time?

All of sudden panic is being created across the WWW with "IIS
Exploit Infecting Web Site Visitors With Malware", "M

[ more ]  [ reply ]
Symantec DeepSight Threat Management System Analysis: Client-side Exploitation 2004-06-25
David Ahmad (da securityfocus com)
Good day,

Symantec has made two reports available to the public, listed at
the end of this post. These documents describe instances of
client-side exploitation. At least one instance appears to
involve an attacker with criminal intent targeting an individual
at a financial institution.

I'm g

[ more ]  [ reply ]
Mac OS X stores login/Keychain/FileVault passwords on disk 2004-06-25
Matt Johnston (matt ucc asn au)
It seems that Mac OS X (10.3.4 tested) doesn't bother clearing memory
containing sensitive data, or using mlock() to avoid swapping.

A quick grep of the swapfiles will show up various morsels:

rez:~> sudo strings -8 /var/vm/swapfile0 |grep -A 4 -i longname
longname
password
<user's password here>

[ more ]  [ reply ]
Zone Labs response to "ZoneAlarm Pro 'Mobile Code' Bypass Vulnerability" 2004-06-23
Zone Labs Product Security (Product-Security zonelabs com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ZoneAlarm Pro, Security Suite and Integrity products which employ
Mobile Code Protection/ID Lock features do not inspect encrypted
traffic. If mobile code is downloaded via a Secure Sockets Layer
(SSL) session, it will not be inspected by these pro

[ more ]  [ reply ]
Security Advisory : FreeBSD local DoS 2004-06-23
Marceta Milos (root marcetam net)
Security Advisory : FreeBSD local DoS

Systems affected:

FreeBSD 5.1-RELEASE/Alpha. Other versions are probably vulnerable.
FreeBSD 5.1-RELEASE/IA32 is _not_ vulnerable.

Not sure about other FreeBSD/arch but they could be vulnerable too.

Risk: low

Date: 23 June 2004

Legal notice:

1. This Advis

[ more ]  [ reply ]
[security bulletin] SSRT4741 rev.0 DCE for HP Tru64 UNIX Potential RPC Buffer Overrun Attack 2004-06-24
Boren, Rich (SSRT) (rich boren hp com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBTU01051 REVISION: 0

SSRT4741 rev.0 DCE for HP Tru64 UNIX Potential
RPC Buffer Overrun Attack
--------------------------------------------------------------

NOTICE:
There are no restrictions for distribution of thi

[ more ]  [ reply ]
Vulnerability Alert Services 2004-06-23
Andy Cuff (lists securitywizardry com)
Good Day,
I don't want this email to detract from the great value of this Bugtraq list
but suspect most of us from time to time are too busy to monitor the list
constantly (surely not!) With this in mind I have just updated the vendor
agnostic list of subscription based vulnerability alert services

[ more ]  [ reply ]
ZWS Newsletter & Mailing List Manager 2004-06-24
GaMeS GaMeS (bzh_mrim yahoo fr)


hello , i'm a frenchy boy and excuse me for my bad english...

i decover a bug in the newsletter ZWS ,

http://www.target.com/newsletter/admin.php?f=list_user&uname=test&ulevel
=1

with this , you can list all user register in the newsletter with respective password.

after u log with a ac

[ more ]  [ reply ]
WIndows XP UPNP exploit ArgoXP.c 2004-06-24
jocanor jocanor (jocanor2002 hotmail com)


/*

***************** EXPLOIT CODED BY JOCANOR *****************

**************PRIVATE DO NOT DISTRIBUTE*********************

this is a new and functional exploit for de vulnerability

affects to windows xp, at the service UPNP, port 5000.

this exploit is a part of ASQ12 project, same a

[ more ]  [ reply ]
[ GLSA 200406-18 ] gzip: Insecure creation of temporary files 2004-06-24
Kurt Lieber (klieber gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200406-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200406-19 ] giFT-FastTrack: remote denial of service attack 2004-06-24
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200406-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Rlpr Advisory 2004-06-24
jaguar felinemenace org
_,'| _.-''``-...___..--';)
/_ \'. __..-' , ,--...--'''
<\ .`--''' ` /'
`-';' ; ; ;
__...--'' ___...--_..' .;.'
fL (,__....----'''

[ more ]  [ reply ]
New ssharp version available 2004-06-24
stealth (stealth segfault net)
Moin,

After some hin und her I was able to put the new ssharp version
online which now also properly MiMs the PuTTY SSH client:

http://stealth.openwall.net/SSH

I also put the new adore-ng online which contains small
fixes for Fedora and the LKM build process on 2.6 Kernels:

http://stealth.openwa

[ more ]  [ reply ]
RE: Is predictable spam filtering a vulnerability? (silently dropping messages) 2004-06-23
David Brodbeck (DavidB mail interclean com) (1 replies)


> -----Original Message-----
> From: David F. Skoll [mailto:dfs (at) roaringpenguin (dot) com [email concealed]]

> This is indeed a problem, and it's a loophole that needs to be closed.
> There needs to be a way for an SMTP server to correlate a bounce
> message with a sent message, and reject the bounce message if it
> wasn

[ more ]  [ reply ]
vBulletin HTML Injection Vuln 2004-06-24
Cheng Peng Su (apple_soup msn com)


Advisory Name : vBulletin HTML Injection Vulnerability

Release Date : June 24,2004

Application : vBulletin

Test On : 3.0.1 or others?

Vendor : Jelsoft(http://www.vbulletin.com/)

Discover : Cheng Peng Su(apple_soup_at_msn.com)

Intro:

From vendor's we

[ more ]  [ reply ]
Spammer jailed 2004-06-23
Ralph W. Reid (rreid sunset net)
Those of you who do not like getting spam might appreciate this
excerpt from the, "Amateur Radio Newsline, June 18, 2004,"
newsletter available at
<a href="http://www.arnewsline.org/">this site.</a>
This conviction should be a heads-up for anyone who is considering
similar techniques to distribute t

[ more ]  [ reply ]
RE: Unusual Activity in Ad-aware 6 Personal, Build 6.181 2004-06-22
fedhead (fedhead rogers com)
I have tracked it down and Dave, your assessment seems to be correct for my
situation. Ad-aware was scanning an old Palm Attachment folder I had in my
profile which stored the attachments of e-mails I had synced with my Palm,
including my Bugtraq e-mail which contained Jelmer's zip of this IE exploi

[ more ]  [ reply ]
SUSE Security Announcement: dhcp-server (SuSE-SA:2004:019) 2004-06-23
Thomas Biege (security suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: dhcp/dhcp-server
Announcement-ID: SuSE-SA:2004:019
Date: T

[ more ]  [ reply ]
[SNS Advisory No.76] Printing from Internet Explorer Lets Users to Cause DoS 2004-06-23
snsadv lac co jp (snsadv)
------------------------------------------------------------------------
--
SNS Advisory No.76
Printing from Internet Explorer Lets Users to Cause DoS

Problem first discovered on: Fri, 28 May 2004
Published on: Wed, 23 Jun 2004
------------------------------------------------------------------------

[ more ]  [ reply ]
(Page 1486 of 1748)  < Prev  1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus