BugTraq Mode:
(Page 1541 of 1748)  < Prev  1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546  Next >
[SECURITY] [DSA 443-1] New xfree86 packages fix multiple vulnerabilities 2004-02-20
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 443-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
February 19th, 2004

[ more ]  [ reply ]
OpenLinux: Multiple vulnerabilities were discovered in the saned daemon 2004-02-19
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenLinux: Multiple vulnerabilities were discovered in the saned daemon
Advisory number: CSSA-2004-005.0
Issue date: 2004 February 1

[ more ]  [ reply ]
OpenLinux: Fetchmail 6.2.4 and earlier remote dennial of service 2004-02-19
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenLinux: Fetchmail 6.2.4 and earlier remote dennial of service
Advisory number: CSSA-2004-004.0
Issue date: 2004 February 19
Cros

[ more ]  [ reply ]
OpenLinux: Bind: cache poisoning BIND 8 prior to 8.3.7 and BIND 8.4.x prior 8.4.2 2004-02-19
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenLinux: Bind: cache poisoning BIND 8 prior to 8.3.7 and BIND 8.4.x prior 8.4.2
Advisory number: CSSA-2004-003.0
Issue date: 2004

[ more ]  [ reply ]
OpenLinux: mpg123 remote denial of service and heap-based buffer overflow 2004-02-19
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenLinux: mpg123 remote denial of service and heap-based buffer overflow
Advisory number: CSSA-2004-002.0
Issue date: 2004 February

[ more ]  [ reply ]
PGP signatures on recent NetBSD Security Advisories 2004-02-19
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security-Officer recently published 4 Security Advisories.

We have received a number of notes from people that the PGP signatures
on these were bad. This has been corrected, and re-signed copies
published at:

ftp://ftp.NetBSD.org/pub/NetBSD/security/adv

[ more ]  [ reply ]
RE: APC 9606 SmartSlot Web/SNMP management card "backdoor" - Telnet can't be disabled. 2004-02-19
Miskell, Craig (Craig Miskell agresearch co nz)
The device appears to need a "restart for this change to take effect"
(to quote a phrase from another OS). We have a 9604 (which,
incidentally, appears to have the same default password, although the
details once logged in are different), and telnet wasn't disabled until
I had logged in via telnet

[ more ]  [ reply ]
RE: Second critical mremap() bug found in all Linux kernels 2004-02-18
tlarholm pivx com
The mremap() fix in the diff file for the 2.4.24-ow1 kernel patch dates
from January 8, 2004 (
http://www.openwall.com/linux/linux-2.4.24-ow1.tar.gz ).

The exact same code fix in the 2.4.23-ow2 kernel patch dates from
December 18, 2003 (
http://www.openwall.com/linux/linux-2.4.23-ow2.tar.gz ).

Kud

[ more ]  [ reply ]
RE: Remote Administrator 2.x: highly possible remote hole or backdoor 2004-02-18
LordInfidel directionweb com
From reading the thread on famatech's site, this looks more like a weak
password issue, which is true of "ANY" piece of software
using simple password authentication.

Basically, If Radmin is listening on it's default port tcp/4899, and you are
not using the built in IP Filter and/or you are not usi

[ more ]  [ reply ]
NetBSD Security Advisory 2004-002: Inconsistent IPv6 path MTU discovery handling 2004-02-19
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2004-002
=================================

Topic: Inconsistent IPv6 path MTU discovery handling

Version: NetBSD-current: source prior to February 5, 2004
netBSD 1.6.2: not affected (fixed)
NetBSD 1.6.1: affected
NetBSD 1.6

[ more ]  [ reply ]
Re: [RHSA-2004:065-01] Updated kernel packages resolve security vulnerabilities 2004-02-18
Ulrich Keil (ulrich der-keiler de)
bugzilla (at) redhat (dot) com [email concealed] wrote:

> Paul Starzetz discovered a flaw in return value checking in mremap()
> in the Linux kernel versions 2.4.24 and previous that may allow a local
> attacker to gain root privileges. No exploit is currently available;
> ...

There is an Proof-of-concept exploit available:

[ more ]  [ reply ]
NetBSD Security Advisory 2004-003: OpenSSL 0.9.6 ASN.1 parser vulnerability 2004-02-19
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2004-003
=================================

Topic: OpenSSL 0.9.6 ASN.1 parser vulnerability

Version: NetBSD-current: sources prior to 2003/07/24
NetBSD 1.6.1: affected
NetBSD 1.6: affected
NetBSD-1.5.3: affected
NetBSD-1.

[ more ]  [ reply ]
EEYE: ZoneLabs SMTP Processing Buffer Overflow 2004-02-19
Marc Maiffret (mmaiffret eeye com)
ZoneLabs SMTP Processing Buffer Overflow

Release Date:
February 18, 2004

Date Reported:
February 13, 2004

Severity:
Medium (Local Privilege Escalation/Remote Code Execution)

Vendor:
ZoneLabs Inc.

Software Affected:
ZoneAlarm 4.0 and above
ZoneAlarm Pro 4.0 and above
ZoneAlarm Plus 4.0 and abov

[ more ]  [ reply ]
LiveJournal XSS 2004-02-19
Joshua Miller (jpmiller tds net)


LiveJournal (www.livejournal.org), an open source software package used to create popular Internet journals such as LiveJournal (www.livejournal.com) and DeadJournal (www.deadjournal.com), is vulnerable to an XSS vulnerability which allows an attacker to execute script code in a user's browser.

[ more ]  [ reply ]
SUSE Security Announcement: Linux Kernel (SuSE-SA:2004:005) 2004-02-18
thomas suse de (Thomas Biege)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: Linux Kernel
Announcement-ID: SuSE-SA:2004:005
Date: Wedne

[ more ]  [ reply ]
NetBSD Security Advisory 2004-004: shmat reference counting bug 2004-02-19
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2004-004
=================================

Topic: shmat reference counting bug

Version: NetBSD-current: source prior to February 6th, 2004
NetBSD 1.6.1: affected
NetBSD 1.6: affected
NetBSD-1.5.3: affected
NetBSD-1.5.2:

[ more ]  [ reply ]
NetBSD Security Advisory 2004-001: Insufficient packet validation in racoon IKE daemon 2004-02-19
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2004-001
=================================

Topic: Insufficient packet validation in racoon IKE daemon

Version: NetBSD-current: source prior to January 17, 2004
NetBSD 1.6.2: not affected (fixed)
NetBSD 1.6.1: affected
NetB

[ more ]  [ reply ]
Cisco Security Advisory: Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities 2004-02-19
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS
15600 Vulnerabilities

Revision 1.0

For Public Release 2004 February 19 1700 UTC (GMT)

--------------------------------------------------

[ more ]  [ reply ]
APC 9606 SmartSlot Web/SNMP management card "backdoor" - Telnet can't be disabled. 2004-02-19
David Monosov (david monosov futureinquestion net) (1 replies)
To your attention: This comes from limited experience with one version of
the 9606 firmware (v3.0.3) on MasterSwitch 9xxx series, tested across many
of the devices:

Although provided an option to disable telnet administratively via the Web
interface as well as the Telnet interface itself - telnet d

[ more ]  [ reply ]
iMail 8.05 LDAP service remote exploit 2004-02-19
Iván Rodriguez Almuiña (kralor coromputer net)
iMail 8.05 LDAP service remote exploit can be found at:
http://www.coromputer.net

Iván Rodriguez Almuiña
aka kralor
kralor (at) coromputer (dot) net [email concealed]
http://www.coromputer.net

[ more ]  [ reply ]
RE: Multiple WinXP kernel vulns can give user mode programs kernel mode privileges 2004-02-19
first last (randnut hotmail com)
>From: "Alun Jones" <alun (at) texis (dot) com [email concealed]>
>Umm... yes. And?
>
>May I quote from the Windows 2000 Server Resource Kit?
>
>"Debug programs
>"(SeDebugPrivilege)
>"Allows the user to attach a debugger to any process. This privilege
>provides access to sensitive and critical operating system components.
>By

[ more ]  [ reply ]
APC Security Advisory - Static factory password vulnerability 2004-02-19
security advisory apcc com


-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

APC Security Advisory - Static factory password vulnerability

Who should read this:

Customers with products that have APC's hardware-based network

management cards installed. APC products that use these cards to

attach to the network via a

[ more ]  [ reply ]
(Page 1541 of 1748)  < Prev  1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus