BugTraq Mode:
(Page 1560 of 1748)  < Prev  1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565  Next >
RFC: content-filter and AV notifications (Was: Re: RFC: virus handling) 2004-01-29
Andrey G. Sergeev (AKA Andris) (andris aernet ru)
Hello!

Wed Jan 28 2004 18:45:39 Thomas Zehetbauer <thomasz (at) hostmaster (dot) org [email concealed]> wrote:

TZ> Looking at the current outbreak of the Mydoom.A worm I would like
TZ> to share and discuss some thoughts:

[...]

TZ> 1.) Virus Detected Notifications
TZ> After filtering out the messages generated by the worm i

[ more ]  [ reply ]
Re: Remote exploit in Gallery 1.3.1, 1.3.2, 1.3.3, 1.4 and 1.4.1 2004-01-28
Matus UHLAR - fantomas (uhlar fantomas sk)
This mail is meaned to blame, not to flame...

On 27.01 14:29, Bharat Mediratta wrote:
> Starting in release 1.3.1, Gallery includes code to simulate the
> behaviour of register_globals in environments where that setting
> is disabled. We do this by extracting the values of the various
> $HTTP_ glo

[ more ]  [ reply ]
Re: RFC: virus handling 2004-01-29
Sascha Wilde (wilde agentur-sec de)
On Wed, Jan 28, 2004 at 04:45:39PM +0100, Thomas Zehetbauer wrote:

> 1.2.1.) Standardization
> To allow filtering of these messages they should always carry the text
> 'possible virus found' in the subject optionally extended by the name of
> the virus or the test conducted (eg. heuristics).

I wou

[ more ]  [ reply ]
outbreak warning: new Myydoom.B is out 2004-01-28
Gadi Evron (ge egotistical reprehensible net)
You can find information on Symantec's web page.

Blocking: same port as last time, 3127.

Gadi Evron

[ more ]  [ reply ]
MDKSA-2004:006-1 - Updated gaim packages fix multiple vulnerabilities 2004-01-30
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrake Linux Security Update Advisory
_______________________________________________________________________

Package name: gaim
Advisory ID:

[ more ]  [ reply ]
Advisory ! 2004-01-31
Mr Serbia (serbian_sniper hotmail com)
-------------------------------------------------

thePHOTOtool SQL Injection Vulnerability By KingSerb

-------------------------------------------------

Please Forgive my spelling or any mistakes i have made, Its my first
discovery of a
vulnerablity so please understand, and use this file for ed

[ more ]  [ reply ]
http://www.smashguard.org 2004-01-30
Hilmi Ozdoganoglu (cyprian purdue edu)

SmashGuard is a hardware-based solution developed at Purdue
University to prevent Buffer-Overflow Attacks realized by overwriting the
Function Return Address (patent-pending). The design of SmashGuard is a
kernel patch that supports CPUs modified to support SmashGuard protection.

For d

[ more ]  [ reply ]
Re: RFC: virus handling 2004-01-28
3APA3A (3APA3A SECURITY NNOV RU)
Dear Thomas Zehetbauer,

--Wednesday, January 28, 2004, 6:45:39 PM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:

TZ> Looking at the current outbreak of the Mydoom.A worm I would like to
TZ> share and discuss some thoughts:

Most of your ideas are already covered by RFC1892/RFC3462. The only
proble

[ more ]  [ reply ]
RE: virus handling 2004-01-28
Rainer Gerhards (rgerhards hq adiscon com)
I agree with most in this post, but not with 3), the ISP actions.

This is not doable for an ISP, not from a ressource (manpower) point of
view and even hardly from a contractual basis. And, no, I am not with an
ISP.

Other than that, I really think the AV vendors should do this. Also, I
hardly can

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-04:01.mksnap_ffs 2004-01-30
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-04:01.mksnap_ffs Security Advisory
The FreeBSD Project

Topic: mk

[ more ]  [ reply ]
Serv-U exploit 2004-01-30
Berend-Jan Wever (SkyLined edup tudelft nl)
Hi,

Attached is my Serv-U "SITE CHMOD" exploit. Should be pretty script kiddie
friendly.

Cheers,

SkyLined

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP 8.0 - not licensed for commercial use: www.pgp.com
Comment: Berend-Jan Wever - skylined (at) edup.tudelft (dot) nl [email concealed]

mQGiBD//MyARBADnHLyg2lUBEddhdWAVBx

[ more ]  [ reply ]
Cisco Security Advisory: Buffer Overrun in Microsoft Windows 2000 Workstation Service (MS03-049) 2004-01-29
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Buffer Overrun in Microsoft Windows 2000
Workstation Service (MS03-049)

Revision 1.0 - FINAL

For Public Release 2004 January 29 18:00 UTC (GMT)

- -----------------------------------------------------------------------

Conte

[ more ]  [ reply ]
userland binary vulnerabilities on IRIX 2004-01-29
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SGI Security Advisory

Title: userland binary vulnerabilities
Number: 20040104-01-P
Date: January 29, 2004
Reference: SGI BUGS 902173, 902

[ more ]  [ reply ]
[FLSA-2004:1207] Updated cvs resolves security vulnerability 2004-01-29
Jesse Keating (jkeating j2solutions net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated cvs resolves security vulnerability
Advisory ID: FLSA:1207
Issue date: 2004-01-28
Product:

[ more ]  [ reply ]
----------========== OPEN3S-2003-08-08-eng-informix-onedcu ==========---------- 2004-01-29
pask open3s com


----------========== OPEN3S-2003-08-08-eng-informix-onedcu ==========----------

Title: Local Vulnerability in IBM Informix IDSv9.40 onedcu binary
Date: 08-08-2003
Platform: Only tested in Linux but can be exported to others.
Impact: Users with exec perm over ./bin/onedcu can create

[ more ]  [ reply ]
SUSE Security Announcement: gaim (SuSE-SA:2004:004) 2004-01-29
thomas suse de (Thomas Biege)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: gaim
Announcement-ID: SuSE-SA:2004:004
Date: Thrusday, Jan

[ more ]  [ reply ]
----------========== OPEN3S-2003-08-08-eng-informix-onshowaudit ==========---------- 2004-01-29
pask open3s com

----------========== OPEN3S-2003-08-08-eng-informix-onshowaudit ==========----------

Title: Local Vulnerability in IBM Informix IDS v9.40 onshowaudit binary
Date: 08-08-2003
Platform: Only tested in Linux but can be exported to others.
Impact: Users with exec perm over ./bin/on

[ more ]  [ reply ]
----------========== OPEN3S-2003-08-08-eng-informix-ontape ==========---------- 2004-01-29
pask open3s com
----------========== OPEN3S-2003-08-08-eng-informix-ontape ==========----------

Title: Local Vulnerability at Informix IDSv9.40 via ontape binary
Date: 08-08-2003
Platform: Only tested in Linux but can be exported to others.
Impact: Any user with DSA privileges over Informix c

[ more ]  [ reply ]
MacOS X TruBlueEnvironment Buffer Overflow 2004-01-29
@stake Advisories (advisories atstake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

@stake, Inc.
www.atstake.com

Security Advisory

Advisory Name: TruBlueEnvironment Buffer Overflow
Release Date: 01/27/2004
Application: TruBlueEnvironment

[ more ]  [ reply ]
ZH2004-02SA (security advisory): PJ CGI Neo review (NeoBoard review) Remote arbitrary file retrieving 2004-01-29
ZetaLabs (zetalabs zone-h org)


ZH2004-02SA (security advisory): PJ CGI Neo review (NeoBoard review) Remote arbitrary file retrieving

Published: 29 january 2004

Released: 29 january 2004

Name: PJ CGI Neo review (NeoBoard review)

Affected Systems: Current version

Issue: Remote file retrieving

Author: Zone-h Secu

[ more ]  [ reply ]
Security Announcement: untrusted ELF library path in some cvsup binary RPMs 2004-01-29
Matthias Andree (matthias andree gmx de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

MA-SA-2004:02.ELF_RPATH

Topic: Unsecure ELF RPATH allows user privilege escalation

Announcement: MA-SA-2004-02
Writer: Matthias Andree
Version: 1.0
Announced: 2004-01-29
Type: local escalation of privileges
Impact: vulnerability enables one user t

[ more ]  [ reply ]
new WIN virus? 2004-01-29
Atom 'Smasher' (atom suspicious org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

i don't know much at all about windows, but this spam got past my spam
filter and drew my attention. i tested the suspect file in some on-line
virus checkers, and they all reported the file as not being a threat.
looking at the page that the spam reques

[ more ]  [ reply ]
SGI Advanced Linux Environment security update #9 2004-01-28
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : SGI Advanced Linux Environment security update #9
Number : 20040103-01-U
Date : January 28, 2004
Reference

[ more ]  [ reply ]
ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary files retrieving 2004-01-28
ZetaLabs (zetalabs zone-h org)


ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary files retrieving

Published: 28 january 2004

Released: 28 january 2004

Name: Web Blog

Affected Systems: 1.1

Issue: Remote file retrieving

Author: Zone-h Security Labs

Vendor: http://leifwright.com

Description

[ more ]  [ reply ]
Oracle toplink mapping workbench password algorithm 2004-01-28
Pete Finnigan (plsql petefinnigan com)
Hi

I thought readers here might be interested in this item. Today I found
that a website has posted the algorithm and sample code for the
encryption algorithm used in Oracles toplink mapping workbench. This
code can be used to decrypt the passwords held in the xml file easily. A
link to the details

[ more ]  [ reply ]
BRS WebWeaver Webserver Cross Site Scripting Vulnerability 2004-01-28
Oliver Karow (oliver karow gmx de)
BRS WebWeaver Webserver Cross Site Scripting Vulnerability
================================================

Whatis:
=====

BRS WebWeaver is a free personal web server that runs on the Windows
platform.

Version:
======

V 1.07

Exploiting:
=======

http://127.0.0.1/scripts/ISAPISkeleton.dll?

[ more ]  [ reply ]
Re: New MiMail variant is DDoS'ing SCO.com 2004-01-28
Bob Toxen (bob verysecurelinux com)
I had no problem downloading CA's cleansing tool a short time ago.
My hat is off to CA for producing this tool and making it available
for free.

Regarding the SCO DDoS, it's so sad when a thief (of services)
decides to attack a blackmailer, in my opinion.

Best regards,

Bob Toxen, CTO
Fly-By-Day C

[ more ]  [ reply ]
phpBB privmsg.php XSS vulnerability patch. 2004-01-28
Shaun Colley (shaunige yahoo co uk)
For those who have not yet installed the phpBB
packages fixing the XSS vulnerability in privmsg.php
documented at <http://www.securityfocus.com/bid/9290>
and the groupcp.php vulnerability, or for those who do
not want to download the new packages, the following
patches can be quickly and easily appl

[ more ]  [ reply ]
Denial Of Service in SurfNOW 2.2 2004-01-28
Donato Ferrante (fdonato autistici org)
Donato Ferrante

Application: SurfNOW
http://www.loomsoft.com/

Version: 2.2

Bug: Denial Of Service

Author: Donato Ferrante
e-mail: fdonato (at) autistici (dot) org [email concealed]
web: www.autistici.org/fdonato

xxxxxxxxxxxxxxxx

[ more ]  [ reply ]
(Page 1560 of 1748)  < Prev  1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus