|
Colapse all |
Post message
[OpenPKG-SA-2004.012] OpenPKG Security Advisory (fetchmail) 2004-04-08 OpenPKG (openpkg openpkg org) LNSA-#2004-0009: GNU Automake symbolic link vulnerability 2004-04-08 Vincenzo Ciaglia (ciaglia netwosix org) ************************************************************************ ************ Netwosix Linux Security Advisory #2004-0009 <http://www.netwosix.org> ------------------------------------------------------------------------ ------------ Package name: automake Summary: Automake s [ more ] [ reply ] New Worm/Virus April 8th 2004-04-08 Polazzo Justin (Justin Polazzo facilities gatech edu) Concerning the new worm type infection spreading around today (6:15am EST) the file is called ndemon.exe (.99k) and it puts itself into c:\winnt and c:winnt\system32. Registry entries HKLM\Software|Microsoft|CurrentVersion\Run and HKLM\Software|Microsoft|CurrentVersion\RunServices (Think it creates [ more ] [ reply ] Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache 2004-04-08 Ioannis Migadakis (jmig mail gr) [waraxe-2004-SA#014 - Cross-Site Scripting aka XSS in AzDGDatingLite] 2004-04-08 Janek Vind (come2waraxe yahoo com) SGI Advanced Linux Environment security update #17 2004-04-07 SGI Security Coordinator (agent99 sgi com) Cisco Security Advisory: Cisco IPSec VPN Services Module Malformed IKE Packet Vulnerability 2004-04-08 Cisco Systems Product Security Incident Response Team (psirt cisco com) [ GLSA 200404-08 ] GNU Automake symbolic link vulnerability 2004-04-08 Kurt Lieber (klieber gentoo org) [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a] 2004-04-08 Janek Vind (come2waraxe yahoo com) Re: Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow, Apr 7 2004 2:22AM 2004-04-08 Sym Security (secure symantec com) In Response to: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application: Symantec Virus Detection(Free ActiveX) Vendors: http://security.symantec.com/sscv6/vc_scan.asp?langid=ie&venid=sym&plfid =23&pkj=WJDORSJRFSKLUKUMXCC&vc_scanstate=2 Platforms: Windows Bu [ more ] [ reply ] McAfee Freescan ActiveX Information Disclosure [Additional Details & PoC] 2004-04-07 S G Masood (sgmasood yahoo com) Re: GNU Sharutils buffer overflow vulnerability 2004-04-07 Shaun Colley (shaunige yahoo co uk) Several guys kindly let me know about my fook up regarding the fix I posted for shar. Although it prevented the overflow, in some situations, it might cause another bug in shar (although I've never witnessed it despite testing the patched shar). Anyway, I've revised the patch with the kind sugge [ more ] [ reply ] [OpenPKG-SA-2004.011] OpenPKG Security Advisory (sharutils) 2004-04-07 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] RE: Kerio Personal Firewall 4 and IE 6 "Bug" 2004-04-07 Noah Dunker (ndunker jccc net) Indeed, the following code crashes IE6 6.0.2800.1106 128bit SP1 when you load it locally. Pulled from a webserver, however, it does not. Tags mangled intentionally [HTML] [BODY][IFRAME src="?"] [/IFRAME] [/BODY][/HTML] Locally, it brings up a recursive IFRAME that locks up IE, and it eventually [ more ] [ reply ] RE: Kerio Personal Firewall 4 and IE 6 "Bug" 2004-04-07 Noah Dunker (ndunker jccc net) (1 replies) Tested the IE iframe "bug" on Windows 2000 with the following IE Versions: Standard install of IE off my Windows 2000 CD (installed on one machine earlier this week, no updates): 5.00.3700.1000 128bit SP4 After running Windows Update on another almost identical machine (last update was on Monday) [ more ] [ reply ] Metasploit Framework 2.0 Released! 2004-04-07 H D Moore (sflist digitaloffense net) The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. After nearly six months of development, version 2.0 is being released to the public. This release includes 18 exploits and 27 payloads; many of these exploits are either the only ones pu [ more ] [ reply ] Solaris vfs_getvfssw() local kernel exploit 2004-04-07 Sam (Sam 0x557 org) full-disclosureHey, everyone. i m comming :D, it's a lame local root exploit for Solaris. exploit Solaris vfs_getvfssw() Loadable Kernel Module Path vulns, which found by Dave Aitel, you can find on this link. :P http://www.immunitysec.com/downloads/solaris_kernel_vfs.sxw.pdf Cheers, Sam Sam#0x [ more ] [ reply ] [OpenPKG-SA-2004.010] OpenPKG Security Advisory (tcpdump) 2004-04-07 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow 2004-04-07 Rafel Ivgi, The-Insider (theinsider 012 net il) [ GLSA 200404-07 ] ClamAV RAR Archive Remote Denial Of Service Vulnerability 2004-04-07 Kurt Lieber (klieber gentoo org) Re: IPv4 fragmentation --> The Rose Attack 2004-04-07 Ventsislav Genchev (vigour atlantis bg) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've just made some tests following the described example at: http://gandalf.home.digital.net/TestProc.txt To use different src addresses in the attack i've used the following example: #!/usr/bin/perl $src=$ARGV[1]; if($src=~ /^(\d+)\.(\d+)\.(\d+)\. [ more ] [ reply ] Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure 2004-04-07 Rafel Ivgi, The-Insider (theinsider 012 net il) Re: [waraxe-2004-SA#013 - Critical sql injection bug in PhpBB 2.0.8 and in older versions] 2004-04-07 T.J. Ferraro (tjtoocool phreaker net) The combination of the original post with the couple of follow ups that followed were quite effective. Putting the hash in the message instead of subject worked to show the whole hash. And I can't recall if it was discussed on this thread or not but creating the admin = base64_encode($aid:$md5ha [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
________________________________________________________________________
OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]
[ more ] [ reply ]