|
Colapse all |
Post message
Re: Format string bug in EpicGames Unreal engine 2004-03-11 Sebastian Käppler (sebastiankaeppler web de) Announcing full functional adore-ng rootkit for 2.6 Kernel 2004-03-11 stealth (stealth segfault net) Hi, At http://stealth.7350.org/rootkits/adore-ng-0.41.tgz you find the complete port of adore-ng for the Linux kernel 2.6. All of the stuff you know from earlier kernel 2.4 versions such as socket-, process- and file-hiding, syslog- and [uw]tmp filtering has been ported. Additionally since version [ more ] [ reply ] Re: Norton AntiVirus 2002 fails to scan files with ... [2'nd... UPDATED] Message-ID: 20040306040833.28300 2004-03-11 Sym Security (symsecurity symantec com) In Response to: Norton AntiVirus 2002 fails to scan files with ... [2'nd... UPDATED] Date: Mar 6 2004 4:08AM Author: Bipin Gautam. <door_hunt3r blackcodemail com> Message-ID: <20040306040833.28300.qmail (at) www.securityfocus (dot) com [email concealed]> Bipin Gautam submitted: In-Reply-To: <20040305183533 [ more ] [ reply ] Re: Outlook mailto: URL argument injection vulnerability MS04-009 (Now CRITICAL) ! 2004-03-11 K-OTiK Security (Special-Alerts k-otik com) In-Reply-To: <20040310123503.GC9654 (at) jouko.iki (dot) fi [email concealed]> >Date: Wed, 10 Mar 2004 14:35:05 +0200 >From: Jouko Pynnonen <jouko (at) iki (dot) fi [email concealed]> >To: bugtraq (at) securityfocus (dot) com [email concealed] >Subject: Outlook mailto: URL argument injection vulnerability > [...] >If the "Outlook today" view isn't the default view in Outlook, [ more ] [ reply ] [SECURITY] [DSA 461-1] New calife packages fix buffer overflow 2004-03-11 Matt Zimmerman (mdz debian org) RE: Outlook mailto: URL argument injection vulnerability 2004-03-11 Shaun Colley (shaunige yahoo co uk) Hello Bugtraq, For those interested in testing the impact of this vulnerability, I have written a simple, non-malicious PoC for this issue: http://www.nettwerked.co.uk/code/outlooksploit.html If you'd rather not visit an unverified link, here's the code: ###outlooksploit.html <!-- Outlook mai [ more ] [ reply ] Unreal engine updates and Battle Mages advisory 2004-03-11 Luigi Auriemma (aluigi altervista org) I have an update about the methods used to test the format string vulnerability in the Unreal engine I reported yesterday. I have solved a problem in the windows version of my proof-of-concept unrfs-poc (now version 0.1.1): http://aluigi.altervista.org/poc/unrfs-poc.zip The following instead i [ more ] [ reply ] [RHSA-2004:093-01] Updated sysstat packages fix security vulnerabilities 2004-03-10 bugzilla redhat com [SECURITY] [DSA 460-1] New sysstat packages fix insecure temporary file creation 2004-03-10 Matt Zimmerman (mdz debian org) [SECURITY] [DSA 459-1] New kdelibs, kdelibs-crypto packages fix cookie traversal bug 2004-03-10 Matt Zimmerman (mdz debian org) Re: LAN SUITE Web Mail 602Pro Multiple Vulnerabilities 2004-03-10 Brandon Sturgeon (brandon software602 com) In-Reply-To: <000501c3fdfc$7f0202d0$0b3016ac@fucku> >Directory Listing: >----------------------- >Upon refering to index.html directory listing of the folder is printed: >http://<host>/index.html - directory listing >http://<host>/cgi-bin/ >http://<host>/users/ This is a user configuratio [ more ] [ reply ] With regards to the Adobe Acrobat Reader advisory (#NISR03022004) 2004-03-10 NGSSoftware Insight Security Research (nisr nextgenss com) Hello all, I've been inundated with e-mails asking whether operating systems other than Windows are affected by XFDF overflow. Whilst I did not state that Windows is the only OS affected, and I should have done, I thought it was clear, incorrectly, that Adobe Acrobat Reader for Windows was indeed [ more ] [ reply ] [RHSA-2004:102-01] Updated gdk-pixbuf packages fix denial of service vulnerability 2004-03-10 bugzilla redhat com [RHSA-2004:075-01] Updated kdelibs packages resolve cookie security issue 2004-03-10 bugzilla redhat com GNU Anubis 3.6.2 remote root exploit 2004-03-10 Claes M Nyberg (md0claes mdstud chalmers se) -- Begin anubisexp.c /* * anubisexp.c * * GNU Anubis 3.6.2 remote root exploit by CMN * * <cmn at darklab.org>, <cmn at 0xbadc0ded.org> * Bug found by Ulf Harnhammar. * * 2004-03-10 */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <signal.h> #include <string.h> #incl [ more ] [ reply ] MDKSA-2004:020 - Updated gdk-pixbuf packages fix BMP-handling vulnerability 2004-03-10 Mandrake Linux Security Team (security linux-mandrake com) MDKSA-2004:022 - Updated kdelibs packages fix cookie theft vulnerability 2004-03-10 Mandrake Linux Security Team (security linux-mandrake com) MDKSA-2004:021 - Updated mozilla packages fix multiple vulnerabilities 2004-03-10 Mandrake Linux Security Team (security linux-mandrake com) [SECURITY] [DSA 458-1] New python2.2 packages fix buffer overflow 2004-03-10 Matt Zimmerman (mdz debian org) Outlook mailto: URL argument injection vulnerability 2004-03-10 Jouko Pynnonen (jouko iki fi) OVERVIEW ======== Microsoft Outlook contains a vulnerability which allows execution of arbitrary code when a victim user views a web page or an e-mail message created by an attacker. DETAILS ======= During Outlook installation, a mailto: URL handler is registered to the system. When a mail [ more ] [ reply ] MDKSA-2004:019 - Updated python packages fix buffer overflow vulnerability 2004-03-10 Mandrake Linux Security Team (security linux-mandrake com) Establishing contact with Nullsoft 2004-03-09 Peter Winter-Smith (peter4020 hotmail com) Hi Guys, Would anyone happen to know of an email address which I can use to get directly in contact with any of the developers of Nullsoft's Winamp media player? I have tried both 'support (at) winamp (dot) com [email concealed]' and 'jonathan (at) winamp (dot) com [email concealed]', neither of which have given me a response so far (aside from the auto- [ more ] [ reply ] |
|
Privacy Statement |
It seems that all servers running the MOD "TacticalOps" for UT1 are not affected by the vulnerability. I ran a local test server and got the following output:
"PreLogin failure: Player Class: %n%n%n.s_Player_T is not valid! - reinstall
[ more ] [ reply ]