|
Colapse all |
Post message
RE: Curious fileutils/coreutils behaviour. 2004-05-14 Michael Wojcik (Michael Wojcik microfocus com) (1 replies) RE: IE URL Issue Being Used In Phishing In the Wild [USBank] 2004-05-14 Drew Copley (dcopley eeye com) These guys got it and catalogued it nicely. Scroll down for full details. http://www.antiphishing.org/phishing_archive/05-13-04_US_Bank_(Found_err or).html They did everything but put up full source code. Http-equiv pointed out Dror Shalev has catalogued an Citibank version he found in the wild: [ more ] [ reply ] RE: Vulnerability Scanning on Windows 2003 localhost will crash RPC 2004-05-14 Drew Copley (dcopley eeye com) Nada here. I am sitting here in Retina's QA/Security lab with Windows 2003 Enterprise... I get scanned and scan all day long. Nada. > -----Original Message----- > From: farking (at) i-ownur (dot) info [email concealed] [mailto:farking (at) i-ownur (dot) info [email concealed]] > Sent: Thursday, May 13, 2004 8:10 PM > To: bugtraq (at) securityfocus (dot) com [email concealed] > Sub [ more ] [ reply ] Symantec Multiple Firewall DNS Response Denial-of-Service Exploit (PoC) 2004-05-14 houseofdabus HOD (houseofdabus inbox ru) Still Vulnerable in MSIE 2004-05-14 Greg Kujawa (greg kujawa diamondcellar com) With the latest vendor AV definitions and all of the Microsoft Security Updates my MSIE 6 application still was vulnerable to some apparent cross-site scripting exploit. I was hit with one of the many Agobot variants when exiting a site detailing some IE vulnerabilities (http://www.hnc3k.com). The [ more ] [ reply ] Curious fileutils/coreutils behaviour. 2004-05-13 David Malone (dwmalone cnri dit ie) While replacing sendmail on a system using GNU fileutils 4.something I encountered something that surprised me. I did a "make install" of our version of mmdf, which does a "cp blah /usr/sbin/sendmail ; chown mmdf /usr/sbin/sendmail ; chmod u+s /usr/sbin/sendmail" Now, /usr/sbin/sendmail was a symli [ more ] [ reply ] DOE updated cybersecurity //no code or 0day sploits// just info 2004-05-14 System Administrator (lowdownhaxor hotmail com) I thought you all would be intersted in this.. Secretary of Energy Launches Initiatives To Bolster Security at Nuclear Facilities Improvements To Impact Cybersystems, Guard Force Protection, and Consolidation of Nuclear Materials AIKEN, S.C. - Secretary of Energy Spencer Abraham announced a set of [ more ] [ reply ] Re: Showhelp() local CHM file execution 2004-05-14 roozbeh afrasiabi (roozbeh_afrasiabi yahoo com) In-Reply-To: <20040513091348.20686.qmail (at) www.securityfocus (dot) com [email concealed]> it seems its: weakness when handling "\\"causes two issues one being the execution of local chm files and the other is parsing of local htm pages stored in chm files which could be exploited using xss ! the poc i have given shows [ more ] [ reply ] [security bulletin] SSRT3613 rev.0 HP-UX B6848AB GTK+ Support Libraries - elevated privileges 2004-05-14 Boren, Rich (SSRT) (rich boren hp com) [security bulletin] SSRT4721 rev.0 HP-UX dtlogin unauthorized privileged access, DoS 2004-05-14 Boren, Rich (SSRT) (rich boren hp com) Vulnerability Scanning on Windows 2003 localhost will crash RPC 2004-05-14 farking i-ownur info I don't know whether this is real vulnerability or not. But my Windows Server 2003 Enterprise Edition with latest patch will crashing RPC after doing local vulnerability scanning using Retina or Shadow Security Scanner. This will force Windows 2003 to shutdown. Anyone experience this? p/s: f [ more ] [ reply ] IE URL Issue Being Used In Phishing In the Wild [USBank] 2004-05-13 Drew Copley (dcopley eeye com) One of our developers (Laurentiu Nicula) received an alarming type of phishing attack today. received: from UsBank.com ([82.33.97.75]) [82.33.97.75 = [ 82-33-97-75.cable.ubr10.azte.blueyonder.co.uk ] The email looks legitimate enough, but links to: http://validation-required.info/ The webpage [ more ] [ reply ] POA: Outlook Expresss 6.00 2004-05-13 http-equiv (at) excite (dot) com [email concealed] (1 malware com) Thursday, May 13, 2004 The following is exceptionally unusual. For many years post Outlook Express 4 has been an impossibility to target html or remote sites directly into the 'window' of an Outlook Express mail message. That means all links [your basic href] would invoke the browser accompan [ more ] [ reply ] [security bulletin] SSRT4722 rev.0 HP-UX Mozilla denial of service 2004-05-13 Boren, Rich (SSRT) (rich boren hp com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 HP SECURITY BULLETIN HPSBUX01036 REVISION: 0 SSRT4722 rev.0 HP-UX Mozilla denial of service ----------------------------------------------------------------- NOTICE: There are no restrictions for distribution of this Bulletin provided that i [ more ] [ reply ] SYM04-008, Symantec Client Firewall Remote Access and Denial of Service Issues 2004-05-13 Sym Security (secure symantec com) Symantec Security Advisory SYM04-008 12 May, 2004 Symantec Client Firewall Remote Access and Denial of Service Issues Revision History None Risk Impact High Overview eEye Digital Security notified Symantec Corporation of four vulnerability issues they discovered in the Symantec Client Firewa [ more ] [ reply ] Opera Telnet URI Handler Vulnerability also applies to other browsers 2004-05-13 Jannes (ddos arcor de) Hello, a new Security Advicory by iDEFENSE describes an Opera Telnet URI Handler File Creation/Truncation Vulnerability. <http://www.idefense.com/application/poi/display?id=104&type=vulnerabili ties> The described vulnerability also works on: - Konqueror (KDE <= 3.2.1) (and maybe other Browsers u [ more ] [ reply ] [SECURITY] [DSA 503-1] New mah-jong packages fix denial of service 2004-05-13 joey infodrom org (Martin Schulze) [slackware-security] apache (SSA:2004-133-01) 2004-05-12 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] apache (SSA:2004-133-01) New apache packages are available for Slackware 8.1, 9.0, 9.1, and -current to fix security issues. These include a possible denial-of-service attack as well as the ability to possible pipe shell escapes [ more ] [ reply ] EEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruption 2004-05-13 Marc Maiffret (mmaiffret eeye com) Symantec Multiple Firewall NBNS Response Remote Heap Corruption Release Date: May 12, 2004 Date Reported: April 19, 2004 Severity: High (Remote Kernel Code Execution) Vendor: Symantec Systems Affected: Symantec Norton Internet Security 2002 Symantec Norton Internet Security 2003 Symantec Norton [ more ] [ reply ] EEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflow 2004-05-13 Marc Maiffret (mmaiffret eeye com) Symantec Multiple Firewall Remote DNS KERNEL Overflow Release Date: May 12, 2004 Date Reported: April 19, 2004 Severity: High (Remote Kernel Access) Vendor: Symantec Systems Affected: Symantec Norton Internet Security 2002 Symantec Norton Internet Security 2003 Symantec Norton Internet Security [ more ] [ reply ] EEYE: Symantec Multiple Firewall DNS Response Denial-of-Service 2004-05-12 Marc Maiffret (mmaiffret eeye com) Symantec Multiple Firewall DNS Response Denial-of-Service Release Date: May 12, 2004 Date Reported: April 19, 2004 Severity: High (Remote Denial of Service) Vendor: Symantec Systems Affected: Symantec Norton Internet Security 2002 Symantec Norton Internet Security 2003 Symantec Norton Internet [ more ] [ reply ] EEYE: Symantec Multiple Firewall NBNS Response Processing Stack Overflow 2004-05-12 Marc Maiffret (mmaiffret eeye com) Symantec Multiple Firewall NBNS Response Processing Stack Overflow Release Date: May 12, 2004 Date Reported: April 19, 2004 Severity: High (Remote Kernel Code Execution) Vendor: Symantec Systems Affected: Symantec Norton Internet Security 2002 Symantec Norton Internet Security 2003 Symantec Nor [ more ] [ reply ] |
|
Privacy Statement |
> Sent: Thursday, May 13, 2004 12:49 PM
>
> Solaris, AIX, and FreeBSD all seem to have less suprising behaviour
> for chown and chmod and provide a "-h" flag for chowning a symlink
> rather than its target. Fileutils also has a "-h" flag, but it i
[ more ] [ reply ]