BugTraq Mode:
(Page 1548 of 1748)  < Prev  1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553  Next >
OpenLinux: slocate local user buffer overflow 2004-02-11
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenLinux: slocate local user buffer overflow
Advisory number: CSSA-2004-001.0
Issue date: 2004 February 10
Cross reference: sr88603

[ more ]  [ reply ]
Re: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11
Sam Schinke (sschinke myrealbox com)
Hello Marc,

Tuesday, February 10, 2004, 12:47:29 PM, you wrote:
MM> For example we setup a totally IPSEC secured network and we broke
MM> into that network via our ASN bug which is called by the Kerberos.
MM> We also have written exploits that take advantage of ASN via
MM> NTLMv2 authentica

[ more ]  [ reply ]
[ GLSA 200402-02 ] XFree86 Font Information File Buffer Overflow 2004-02-11
Tim Yamin (plasmaroo gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200402-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
~

[ more ]  [ reply ]
Update - CheckPoint Vulnerabilities 2004-02-11
Mark Litchfield (mark ngssoftware com)
Whilst examining what was going on in the world of security, I came across
an update by Checkpoint in regards to some recently reported vulnerabilities
in their products, specifically CheckPoint FW-1 and CheckPoint VPN-1.

For more info - http://www.checkpoint.com/corporate/iss.html

Mark

[ more ]  [ reply ]
AIM worm spreading around? 2004-02-11
Moshe Jacobson (moshe runslinux net)
I have had little success in finding information on the AIM worm that
seems to be going around now.

It affects the official AOL Instant Messenger client only, it seems.
Once you click on this link (and there are different endings to the
URL each time, in place of the YUAF):

http://www.wgutv.co

[ more ]  [ reply ]
Re: [Full-Disclosure] DreamFTP Server 1.02 Buffer Overflow 2004-02-11
Berend-Jan Wever (SkyLined edup tudelft nl)
Hi all,

badpack3t wasn't totally wrong when he called it a BoF because the
formatstring can cause BoFs. Anyway, it's a nice little formatstring to
exploit, with multiple possible attack vectors. I found it easiest to
overwrite the exception handler code (since it's RWE) and then cause an
exception.

[ more ]  [ reply ]
Denial of Service in Ratbag's game engine 2004-02-11
Luigi Auriemma (aluigi altervista org)

#######################################################################

Luigi Auriemma

Application: Game engine and games developed by Ratbag
http://www.ratbaggames.com
Games/Ver: - Dirt Track Racing <= 1.03
- Dirt Track Rac

[ more ]  [ reply ]
RE: Another Low Blow From Microsoft: MBSA Failure! 2004-02-10
Eric McCarty (eric lawmpd com)
MBSA detects Patches that have been applied. You installed the patch,
MBSA said the patch was there. Sounds relatively logical to me. I don't
see the failure there.

"The patch management script failed to reboot those few hundred systems"

This is your problem, not MBSA.

Eric C. McCarty
Systems Ad

[ more ]  [ reply ]
Internet Explorer and Microsoft clipboard poor security policy 2004-02-11
bool gte net


Overview:

Sensitive information can be unknowingly disclosed through use malicious web coding that exploits Internet Explorer and Microsoft clipboard. Recently, a brief test was run at a large corporation investigating means of execution and resulting security implications. Within this document

[ more ]  [ reply ]
RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-11
Rainer Gerhards (rgerhards hq adiscon com)
> > And that the server is more likely to be attacked is just
> an assumption
> > - in the days of class A vuln sweeps and random worm scans, I don't
> > think that servers are at most risk. In fact, I think the
> unprotected
> > home machines are...
> >
> Yes, but...
>
> In order to trigger the

[ more ]  [ reply ]
XFree86 vulnerability exploit 2004-02-11
Bender (bender2 sdf lonestar org)
Hello

Below you can find a exploit for latest bug in XFree86 sofware.
Tested on some versions of RedHat Linux (mainly 7.0).

regards
Bender

/* For educational purposes only */
/* Brought to you by bender2 (at) lonestar (dot) org [email concealed] 11.10.2004 */

#include <fcntl.h>

#define NOP

[ more ]  [ reply ]
SGI Advanced Linux Environment security update #10 2004-02-11
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : SGI Advanced Linux Environment security update #10
Number : 20040201-01-U
Date : February 11, 2004
Referenc

[ more ]  [ reply ]
ISS Security Brief: Microsoft ASN.1 Integer Manipulation Vulnerabilities 2004-02-11
X-Force (xforce iss net)
-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Brief
February 11, 2004

Microsoft ASN.1 Integer Manipulation Vulnerabilities

Synopsis:

Microsoft has release Security Bulletin MS04-007 to address vulnerabilities
in the ASN.1 parsing component of the Windows Operating System

[ more ]  [ reply ]
RE: Samba 3.x + kernel 2.6.x local root vulnerability 2004-02-10
John Airey rnib org uk
> -----Original Message-----
> From: Michal Medvecky [mailto:M.Medvecky (at) sh.cvut (dot) cz [email concealed]]
> Sent: 09 February 2004 21:23
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Samba 3.x + kernel 2.6.x local root vulnerability
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> "share" - smb server
> "slovaki

[ more ]  [ reply ]
Re: Decompression Bombs 2004-02-10
Bipin Gautam. (door_hunt3r blackcodemail com)
In-Reply-To: <7DB0958915FDD611961400A0C98F18464E8DB1 (at) WINTRIX.thermeon (dot) com [email concealed]>

I feel.. softwares should check the actual intrigity of data first... before extracting the archive insted completely trusting on the header information.

[this will indeed show down the decompression process to some exte

[ more ]  [ reply ]
RE: Hacking USB Thumbdrives, Thumprint authentication 2004-02-10
David Cross ngc com
Fingerprint data is difficult to hash since the comparators are fuzzy in nature. Basically you are dealing with vectors or distances between minutiae (points of interest) and their direction including slant/curve. Minutiae readings will differ slightly with each print sampling. For accuracy each

[ more ]  [ reply ]
Denial of Service in Monkey httpd <= 0.8.1 2004-02-11
Luigi Auriemma (aluigi altervista org)

#######################################################################

Luigi Auriemma

Application: Monkey httpd
http://monkeyd.sourceforge.net
Versions: <= 0.8.1
Platforms: GNU/Linux
Bug: Denial of Service
Risk: high
Exploitatio

[ more ]  [ reply ]
(Page 1548 of 1748)  < Prev  1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus