BugTraq Mode:
(Page 1548 of 1748)  < Prev  1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553  Next >
phpnuke 6.9 search module exploit. 2004-02-12
pokley (pokleyzz scan-associates net)
this is exploit from search module for phpnuke 6.9 and below (possibly 7.x)

[ more ]  [ reply ]
FW: CA Response: eTrust InoculateIT/Antivirus 6.0 for Linux vulnerability 2004-02-12
Jensen, Greg (Greg Jensen ca com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A typo was quickly identified in the URL below from my original
posting yesterday. Please use the following URL instead, if any
eTrust Antivirus or InoculateIT customers are wanting to report any
problems they feel may be related to this, or wish to

[ more ]  [ reply ]
aimSniff.pl file "deletion" (local) 2004-02-12
Martin (broadcast mail ptraced net)
Advisory attached.

[ more ]  [ reply ]
MDKSA-2004:010 - Updated mutt packages fix remote crash 2004-02-12
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrake Linux Security Update Advisory
_______________________________________________________________________

Package name: mutt
Advisory ID:

[ more ]  [ reply ]
RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-12
peter huang ossecurity ca
From the MS04-07 bulletin, Windows 9x is not mentioned. Someone has asked
whether Windows 98 is vulnerable to this attack or not. It could be that
Windows 98/ME are vulnerable to this attack through the installation of
Office suite.

The following link refers to the msasn1.dll on Windows ME. But, Wi

[ more ]  [ reply ]
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer 2004-02-11
Darren Reed (avalon caligula anu edu au)
In some mail from der Mouse, sie said:
>
> > Signed applications and signed DLLs and signed drivers [...] coming
> > to a Unix near you SOONER rather than later.
>
> > Or is that the kind of thing you disable upon installation because it
> > gets in the way of you being able to install whatever "y

[ more ]  [ reply ]
Re: Update - CheckPoint Vulnerabilities 2004-02-12
Nicob (nicob nicob net)
On Wed, 2004-02-11 at 19:51, Mark Litchfield wrote:
> Whilst examining what was going on in the world of security, I came across
> an update by Checkpoint in regards to some recently reported vulnerabilities
> in their products, specifically CheckPoint FW-1 and CheckPoint VPN-1.
>
> For more info -

[ more ]  [ reply ]
Re: Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access The Forbidden Directory ("/WEB-INF/") 2004-02-12
Oliver Schneider (Borbarad gmxpro net)
> Right. On Unix "WEB-INF" and "WEB-INF.." are two different, legal file
> names. On Windows, trailing dots seem to be ignored, so "WEB-INF" and
> "WEB-INF.." are just two names for the same file. This also works if the
> filename already has an extension, so for example "foo.html" and
> "foo.html..

[ more ]  [ reply ]
CA Response: eTrust InoculateIT/Antivirus 6.0 for Linux vulnerability 2004-02-12
Jensen, Greg (Greg Jensen ca com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Computer Associates has been investigating the vulnerability claims
from the recent Bugtraq posting, related to eTrust Antivirus 6.0 for
Linux. Though it is too early to determine the accuracy of this
claim, and the platforms it may cover, Computer As

[ more ]  [ reply ]
Re: Why are postmasters distributing the MyDoom virus? 2004-02-10
Georg Schwarz (geos epost de)

> It looks like some postmasters are in the virus distribution business pretty
> much like the MyDoom virus itself. Perhaps these postmasters need to review
> their bounce message policies and remove all attached files from messages
> being bounced.

the mails probably bounced (were rejected by th

[ more ]  [ reply ]
Re: Update - CheckPoint Vulnerabilities 2004-02-12
Mark Litchfield (mark ngssoftware com)
I am not, nor is NGS a partner of Checkpoint, so we were not privy to the
'partners security' bulletin.. I would be interested however in seeing the
full posting by Checkpoint.

Mark

----- Original Message -----
From: "Nicob" <nicob (at) nicob (dot) net [email concealed]>
To: "Mark Litchfield" <mark (at) ngssoftware (dot) com [email concealed]>
Cc: <bugt

[ more ]  [ reply ]
MDKSA-2004:011 - Updated NetPBM packages fix a number of temporary file bugs. 2004-02-12
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrake Linux Security Update Advisory
_______________________________________________________________________

Package name: netpbm
Advisory ID:

[ more ]  [ reply ]
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer 2004-02-11
der Mouse (mouse Rodents Montreal QC CA)
>> Depends. Does it include the tools necessary to sign my own code?
>> If not, yes, I will disable it, to the point of running a different
>> OS if necessary.
> So you will disable a function that provides you with a trusted,
> secure, computing base because you cannot sign things yourself ?

Yes.

[ more ]  [ reply ]
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer 2004-02-11
Darren Reed (avalon caligula anu edu au)
In some mail from der Mouse, sie said:
>
> > How does anyone know that you're not a virus/worm writer ?
>
> Anyone? Well, _I_ do.
>
> Anyone else? The same way they know that of anyone: look at my record.

That's not good enough. Sooner or later, the software industry is
going to have to change

[ more ]  [ reply ]
Re: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11
Timothy J.Miller (cerebus sackheads org)
On Feb 10, 2004, at 4:16 PM, Tim Eddy wrote:

> Marc,
>
> If we remove the default exemptions for Kerberos & RSVP from IPSEC with
> the "NoDefaultExempt" registry key, this still passes IKE. Therefore is
> IKE vulnerable to the ASN bug?

Very likely, as IKE data is marshaled into ASN.1 format. The

[ more ]  [ reply ]
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer 2004-02-11
der Mouse (mouse Rodents Montreal QC CA)
> That's not good enough. Sooner or later, the software industry is
> going to have to change and declare that "no warranty" software
> should be confined to isolated systems.

It is not the software industry's place to decide that; that is for
software consumers to decide...or not.

> Tell me, can

[ more ]  [ reply ]
Re: Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access The Forbidden Directory ("/WEB-INF/") 2004-02-11
Peter J. Holzer (hjp wsr ac at)
On 2004-02-05 19:12:54 -0000, Wang Yun wrote:
> Analyze:
> ========
> 1.Apache think "/WEB-INF../" unequal to "/WEB-INF/" So find this Directory by itself.
> 2."/WEB-INF/" Directory not Forbidden in Apache Config files.
> 3."d:\resin\doc\>cd WEB-INF.." legit in Windows Systems.

On 2004-02-09 13:4

[ more ]  [ reply ]
RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11
Drew Copley (dcopley eeye com)


> -----Original Message-----
> From: Rainer Gerhards [mailto:rgerhards (at) hq.adiscon (dot) com [email concealed]]
> Sent: Wednesday, February 11, 2004 1:11 AM
> To: Tina Bird
> Cc: BUGTRAQ (at) securityfocus (dot) com [email concealed]
> Subject: RE: EEYE: Microsoft ASN.1 Library Length Overflow
> Heap Corruption
>
<snip>

> But I think the bottom

[ more ]  [ reply ]
[ GLSA 200402-03 ] Monkeyd Denial of Service vulnerability 2004-02-11
Tim Yamin (plasmaroo gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200402-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
~

[ more ]  [ reply ]
[ GLSA 200402-04 ] Gallery <= 1.4.1 and below remote exploit vulnerability 2004-02-11
Tim Yamin (plasmaroo gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200402-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
~

[ more ]  [ reply ]
Re: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11
Peter Pentchev (roam ringlet net)
On Wed, Feb 11, 2004 at 09:16:40AM +1100, Tim Eddy wrote:
> Marc,
>
> If we remove the default exemptions for Kerberos & RSVP from IPSEC with
> the "NoDefaultExempt" registry key, this still passes IKE. Therefore is
> IKE vulnerable to the ASN bug?

It would appear that it is indeed. The Internet

[ more ]  [ reply ]
OpenLinux: slocate local user buffer overflow 2004-02-11
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenLinux: slocate local user buffer overflow
Advisory number: CSSA-2004-001.0
Issue date: 2004 February 10
Cross reference: sr88603

[ more ]  [ reply ]
Re: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11
Sam Schinke (sschinke myrealbox com)
Hello Marc,

Tuesday, February 10, 2004, 12:47:29 PM, you wrote:
MM> For example we setup a totally IPSEC secured network and we broke
MM> into that network via our ASN bug which is called by the Kerberos.
MM> We also have written exploits that take advantage of ASN via
MM> NTLMv2 authentica

[ more ]  [ reply ]
[ GLSA 200402-02 ] XFree86 Font Information File Buffer Overflow 2004-02-11
Tim Yamin (plasmaroo gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200402-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
~

[ more ]  [ reply ]
Re: Samba 3.x + kernel 2.6.x local root vulnerability 2004-02-11
Urban Widmark (urban teststation com)
On Tue, 10 Feb 2004, Frank Louwers wrote:

> I think his point is this:
>
> Image you have a user account luser on box foo. You do not have root on
> foo. However, you do have root on box bar. If you are allowed to
> smbmount stuff on foo as user luser, (which is a BadThing(tm), but
> default behav

[ more ]  [ reply ]
Update - CheckPoint Vulnerabilities 2004-02-11
Mark Litchfield (mark ngssoftware com)
Whilst examining what was going on in the world of security, I came across
an update by Checkpoint in regards to some recently reported vulnerabilities
in their products, specifically CheckPoint FW-1 and CheckPoint VPN-1.

For more info - http://www.checkpoint.com/corporate/iss.html

Mark

[ more ]  [ reply ]
AIM worm spreading around? 2004-02-11
Moshe Jacobson (moshe runslinux net)
I have had little success in finding information on the AIM worm that
seems to be going around now.

It affects the official AOL Instant Messenger client only, it seems.
Once you click on this link (and there are different endings to the
URL each time, in place of the YUAF):

http://www.wgutv.co

[ more ]  [ reply ]
Re: [Full-Disclosure] Another Low Blow From Microsoft: MBSA Failure! 2004-02-11
Valdis Kletnieks vt edu
On Tue, 10 Feb 2004 20:14:08 PST, morning_wood <se_cur_ity (at) hotmail (dot) com [email concealed]> said:

> did you try exploit code to verify? that should dispel any ambiguity
> across scanner reports, it would be real easy to load your network
> hosts into a batch file or shell script and see how many "roots" you get.

Giv

[ more ]  [ reply ]
Re: [Full-Disclosure] DreamFTP Server 1.02 Buffer Overflow 2004-02-11
Berend-Jan Wever (SkyLined edup tudelft nl)
Hi all,

badpack3t wasn't totally wrong when he called it a BoF because the
formatstring can cause BoFs. Anyway, it's a nice little formatstring to
exploit, with multiple possible attack vectors. I found it easiest to
overwrite the exception handler code (since it's RWE) and then cause an
exception.

[ more ]  [ reply ]
RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11
Alun Jones (alun texis com)
> -----Original Message-----
> From: Rainer Gerhards [mailto:rgerhards (at) hq.adiscon (dot) com [email concealed]]
> Sent: Tuesday, February 10, 2004 3:36 PM
>
> I think Microsoft is using wording to keep the typical end user in a
> warm and cozy state.

How so, exactly? It _is_ marked as a Critical Security Update. What a

[ more ]  [ reply ]
(Page 1548 of 1748)  < Prev  1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus