|
Colapse all |
Post message
Antivirus/Trojan/Spyware scanners DoS! 2004-06-13 Bipin Gautam (visitbipin hotmail com) Hello everybody, I doubt how many Antivirus/Trojan/Spyware scanners will choak to death while having a "manual scan" of this file. Please go ahead and give it a try. http://www.geocities.com/visitbipin/SERVER_dwn.zip I was woundering, what would be the results if such file gets stucked in [ more ] [ reply ] Linksys Web Camera Cross-site Scripting Vuln 2004-06-13 Tyler Guenter aka scriptX (scriptX_ hotmail com) Infosec News Blog 2004-06-13 m5754074 volubis com New information security web log: InfoSec News Blog aggregates information and news from 30+ security related RSS feeds. Only the best and most interesting make it. Updated daily. http://infosec.volubis.com/ Categories include the information security aspects of: * Business * Encryption * Gover [ more ] [ reply ] [SECURITY] [DSA 518-1] New kdelibs packages fix URI handler vulnerabilities 2004-06-14 joey infodrom org (Martin Schulze) Advisory 10/2004: Chora CVS/SVN Viewer remote vulnerability 2004-06-13 Stefan Esser (s esser e-matters de) COELACANTH: Phreak Phishing Expedition 2004-06-10 http-equiv (at) excite (dot) com [email concealed] (1 malware com) Thursday, June 10, 2004 The following was presented by 'bitlance winter' of Japan today: <a href="http://www.microsoft.com%2F redir=www.e- gold.com">test</a> Quite inexplicable from these quarters. Perhaps someone with server 'knowledge' can examine it. It carries over the address into the ad [ more ] [ reply ] Re: [SECURITY] [DSA 515-1] New lha packages fix several vulnerabilities; Re: 2004-06-10 GOTO Masanori (gotom debian or jp) Hi, At Tue, 8 Jun 2004 10:32:48 -0700, Matt Zimmerman wrote: > On Sun, Jun 06, 2004 at 04:28:56PM -0000, lw (at) wszia.edu (dot) pl [email concealed] wrote: > > In-Reply-To: <20040605203922.GW19402 (at) alcor (dot) net [email concealed]> > > > > i didn't bother to check deb package, but this patch: > > > http://security.debian.org/pool/updates/non-fre [ more ] [ reply ] Skype URI callto username overflow 2004-06-10 Hillel Himovich (hll netvision net il) Here is a cute little URI I found crashing skype on it's latest version (0.98.0.04). It's proboby a buffer overflow of some sort, so, a special crafted URI culd potentionally lead to remote code execution. (would probobly be extreamly hard doing it threw a URI, but still an option) callto://a [ more ] [ reply ] RE: Linksys WRT54G - Advice for european users 2004-06-09 Connor, Ethan M. W (emconnor hendersonbrothers com) The readme on the v2.07 US firmware (for v2 hardware) carries no such warning... Apparently they pay more attention to things like this in Europe! :) Actually, since my initial problems a few months back - just last week in fact - they released another version of 2.07 for the v1.1 hardware... Th [ more ] [ reply ] PHP escapeshellarg Windows Vulnerability 2004-06-06 Daniel Fabian (d fabian sec-consult com) SEC-CONSULT Security Advisory - PHP: Hypertext Preprocessor Vendor: PHP (http://www.php.net) Product: PHP 4.3.6 and below (verified in 4.3.5 which was current when the bug was discovered) Vendor status: vendor contacted (04-04-2004) Patch status: Problem fixed in 4.3.7 =========== DESCRIPTION === [ more ] [ reply ] Re: The Linksys WRT54G "security problem" doesn't exist 2004-06-06 caldcv students fccj org In-Reply-To: <20040605005326.24937.qmail (at) www.securityfocus (dot) com [email concealed]> > >Firmware Version: v1.42.2 >Current Time: Fri, 11 Jan 2002 10:34:54 >MAC Address: 00:0C:41:A9:F8:76 >Router Name: WRT54G > Upgraded to WRT54G 2.02.8, it solves the problem. I updated the firmware remotely thro [ more ] [ reply ] COELACANTH: After Math 2004-06-11 http-equiv (at) excite (dot) com [email concealed] (1 malware com) There is a sneaking suspicion that you can put the site contents in the so-called 'local zone' or 'my computer'. Since it validates the 'front end' of the address and ends up at the 'back end' this all would seem very similar to: <object data="ms-its:mhtml:file://C:foo.mhtml! http://www.malwar [ more ] [ reply ] COELACANTH: After Math 2004-06-11 http-equiv (at) excite (dot) com [email concealed] (1 malware com) There is a sneaking suspicion that you can put the site contents in the so-called 'local zone' or 'my computer'. Since it validates the 'front end' of the address and ends up at the 'back end' this all would seem very similar to: <object data="ms-its:mhtml:file://C:foo.mhtml! http://www.malwar [ more ] [ reply ] [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3] 2004-06-11 Janek Vind (come2waraxe yahoo com) [OpenPKG-SA-2004.027] OpenPKG Security Advisory (cvs) 2004-06-11 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] MDKSA-2004:056-1 - Updated krb5 packages fix buffer overflow vulnerabilities 2004-06-09 Mandrake Linux Security Team (security linux-mandrake com) SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition 2004-06-11 http-equiv (at) excite (dot) com [email concealed] (1 malware com) We wrap this up with a full-on ssl site spoof. It seems limited how far you can 'shove' the real domain out of the way, but just enough to make it convincing so we adapt the window to 'cover' it up. Interestingly [with apologies to e-gold for playing with their site], they have a secured conne [ more ] [ reply ] [OpenPKG-SA-2004.029] OpenPKG Security Advisory (apache) 2004-06-11 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] Eudora SPAM Issues.. 2004-06-11 ICI Security Team (Security InfiniteConsulting net) I have a client who is seeing large amounts of spam originate inside their organization. I have traced the spam to Windows machines running Eudora 6.1.1 (latest) in paid mode. Apparently, spam messages come in, something is executed in these spam messages, and copies/duplicates (with forged names/he [ more ] [ reply ] MS web designers -- "What Security Initiative?" 2004-06-12 Nick FitzGerald (nick virus-l demon co uk) The MS Security Initiative is an utter sham. I commented on the uselessness of the "new, improved" MS Security Bulletin web pages when they were "upgraded" to .mspx form. In doing so I rather rudely pinned the blame for the unusability of the new Security Bulletin pages on the MSRC staff -- as [ more ] [ reply ] [FMADV] Subversion <= 1.04 Heap Overflow 2004-06-12 ned (nd felinemenace org) Poem: There once was some open src code, that claimed it would lighten your load, it took a little fuzzing, and i came out buzzing, as it crashed in svn:// mode. Introduction (from Subversion.tigris.org): The goal of the Subversion project is to build a version control system that is a compelling [ more ] [ reply ] Re: Potential Security Flaw in Symantec Gateway Security 360R 2004-06-12 ed p (firewall1e netscape net) (1 replies) In-Reply-To: <BCEBFFBB.ED1%devnull (at) cox (dot) net [email concealed]> I have tested this thoughrouly and reproduced the symptoms of the reported issue. When Enforce VPN is enabled for internal wireless traffic on the appliance something interesting happens. The appliance changes the virtual lan mac addresss to that of the [ more ] [ reply ] RE: SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition 2004-06-11 Drew Copley (dcopley eEye com) (2 replies) As a addendum, perhaps, though I wouldn't doubt someone might make some nice proof of concept code for this... A similiar issue of this kind was found in IE a few years ago - remember of course - it is IE's fault that they are not properly parsing this, regardless of what they need to parse... so t [ more ] [ reply ] RE: [Full-Disclosure] RE: SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition 2004-06-12 Jelmer (jkuperus planet nl) RE: SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition 2004-06-12 Nick FitzGerald (nick virus-l demon co uk) SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition 2004-06-11 http-equiv (at) excite (dot) com [email concealed] (1 malware com) We wrap this up with a full-on ssl site spoof. It seems limited how far you can 'shove' the real domain out of the way, but just enough to make it convincing so we adapt the window to 'cover' it up. Interestingly [with apologies to e-gold for playing with their site], they have a secured conne [ more ] [ reply ] |
|
Privacy Statement |
--- [Vulnerable Products] ---
Only tested on...
* Norton Antivirus 2002
* Norton Antivirus 2003
* Mcafee VirusScan 6
* Network Associates (McAfee) VirusScan Enterprise 7.1
* Windows Xp default ZIP manager [report's wrong size of compress ZIP
files.]
[ more ] [ reply ]