|
Colapse all |
Post message
RE: ISS Security Rip: Microsoft ASN.1 (Half a sploit) 2004-02-13 kradhatman hushmail com "Due to the nature of this vulnerability, reliable and successful remote exploitation is considered difficult." funny little men. there already a half working exploit for ASN. http://linuxfromscratch.org/~devine/MS04-007-dos.c -----Original Message----- From: X-Force [mailto:xforce (at) iss (dot) net [email concealed]] Sent [ more ] [ reply ] DallasCon 2004 Information Security Conference and Boot Camp 2004-02-12 Bruce Khodabakhsh (pkhoda comcast net) DallasCon Information Security Conference & Network Security Boot Camp April 27-May2, 2004 6 Days of the Latest Wireless & Information Security Topics in Dallas The 3rd annual DallasCon Information Security Conference is now gathering momentum and promises to be the premier security event [ more ] [ reply ] Immunix Secured OS 7.3 XFree86 update 2004-02-13 Immunix Security Team (security immunix com) ----------------------------------------------------------------------- Immunix Secured OS Security Advisory Packages updated: XFree86 Affected products: Immunix OS 7.3 Bugs fixed: CAN-2004-0083, CAN-2004-0084, CAN-2004-0106 Date: Thu Feb 12 2004 Advisory ID: IMNX-2004-73-002-01 Author: Seth [ more ] [ reply ] [RHSA-2004:048-01] Updated PWLib packages fix protocol security issues 2004-02-13 bugzilla redhat com [RHSA-2004:059-01] Updated XFree86 packages fix privilege escalation vulnerability 2004-02-13 bugzilla redhat com MDKSA-2004:013 - Updated mailman packages close various cross-site scripting vulnerabilities. 2004-02-13 Mandrake Linux Security Team (security linux-mandrake com) MDKSA-2004:012 - Updated XFree86 packages fix buffer overflow vulnerabilities 2004-02-13 Mandrake Linux Security Team (security linux-mandrake com) RE: W2K source "leaked"? 2004-02-13 tlarholm pivx com I know some people have been talking about this as being a false news story, but now there is confirmation from Redmond. http://www.komotv.com/stories/29778.htm Regards Thor Larholm Senior Security Researcher PivX Solutions 24 Corporate Plaza #180 Newport Beach, CA 92660 http://www.pivx.com th [ more ] [ reply ] Windows2000 who relase the code? 2004-02-13 bladi (bladi-sec novasec es) Hi if someone have the code and take a look on this file. ./private/security/msv_sspi/core ( its not source code or part of windows , so not ilegal) gdb -c ./private/security/msv_sspi/core Core was generated by `vi nlmain.c'. The file is realy old: Aug 3 2001 If you make an strings on it you [ more ] [ reply ] Microsoft Windows 2000 source code leaked 2004-02-12 Marc Bejarano (bugtraq beej org) we may see a big spike in vulns and corresponding exploits for windows, but only time will tell. neowin.net broke the story that the source code to windows 2000 has been leaked and is making the rounds in the usual places. their server is currently suffering from the slashdot effect, though. or [ more ] [ reply ] Windows 2000 Source Leak Verified. Get ready for the havoc. 2004-02-13 dotsecure hushmail com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Leak is verified. It has been extracted. The size unzipped, untarred, unrared is just about 692mb on NTFS partition. Dotsecure dotsecure (at) hushmail (dot) com [email concealed] -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/veri [ more ] [ reply ] RE: [Full-Disclosure] RE: W2K source "leaked"? 2004-02-12 Andre Ludwig (ALudwig Calfingroup com) I am still up in the air on if this is legit or not. If it is yes the bar has been lowered for simple exploits. It will also have the effect of empowering those skilled individuals into creative and more advanced attacks and exploits against the windows platform. From the source file listings float [ more ] [ reply ] RE: W2K source "leaked"? 2004-02-12 Drew Copley (dcopley eeye com) > -----Original Message----- > From: Gadi Evron [mailto:ge (at) egotistical.reprehensible (dot) net [email concealed]] > Sent: Thursday, February 12, 2004 1:49 PM > To: bugtraq (at) securityfocus (dot) com [email concealed] > Cc: full-disclosure (at) lists.netsys (dot) com [email concealed]; Thor Larholm > Subject: W2K source "leaked"? > > A couple of days ago a friend of mine dr [ more ] [ reply ] [SECURITY] [DSA 437-1] New cgiemail packages fix open mail relaying 2004-02-12 Matt Zimmerman (mdz debian org) RE: AIM worm spreading around? 2004-02-12 Tim Walraven (tim walraven ams com) Moshe - This is not a worm. It's adware. It's really not even deceptive. It merely takes advantage of the fact that users do not read the 'Security Warning' boxes that pop up when installing applications off of the web. If you go to the site and read the Terms of Service for this application, it [ more ] [ reply ] RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11 Boyce, Nick (nick boyce eds com) On 10.Feb.2004, Marc Maiffret wrote : > Systems Affected: > Microsoft Windows NT 4.0 (all versions) > Microsoft Windows 2000 (SP3 and earlier) > crosoft Windows XP (all versions) > > Software Affected: > Microsoft Internet Explorer > Microsoft Outlook > Microsoft Outlook Express > Third-party appl [ more ] [ reply ] |
|
Privacy Statement |
Software: vBulletin PHP Forum Version
Vendor: Jelsoft Enterprises Ltd
http://www.vbulletin.com
Versions: 3.0.0 Release Candidate 4
Platforms: Unix/Windows
Bug:
[ more ] [ reply ]