|
Prev week |
Colapse all |
Post message
RFC: content-filter and AV notifications (Was: Re: RFC: virus handling) 2004-01-29 Andrey G. Sergeev (AKA Andris) (andris aernet ru) Re: Remote exploit in Gallery 1.3.1, 1.3.2, 1.3.3, 1.4 and 1.4.1 2004-01-28 Matus UHLAR - fantomas (uhlar fantomas sk) This mail is meaned to blame, not to flame... On 27.01 14:29, Bharat Mediratta wrote: > Starting in release 1.3.1, Gallery includes code to simulate the > behaviour of register_globals in environments where that setting > is disabled. We do this by extracting the values of the various > $HTTP_ glo [ more ] [ reply ] Re: RFC: virus handling 2004-01-29 Sascha Wilde (wilde agentur-sec de) On Wed, Jan 28, 2004 at 04:45:39PM +0100, Thomas Zehetbauer wrote: > 1.2.1.) Standardization > To allow filtering of these messages they should always carry the text > 'possible virus found' in the subject optionally extended by the name of > the virus or the test conducted (eg. heuristics). I wou [ more ] [ reply ] MDKSA-2004:006-1 - Updated gaim packages fix multiple vulnerabilities 2004-01-30 Mandrake Linux Security Team (security linux-mandrake com) Advisory ! 2004-01-31 Mr Serbia (serbian_sniper hotmail com) ------------------------------------------------- thePHOTOtool SQL Injection Vulnerability By KingSerb ------------------------------------------------- Please Forgive my spelling or any mistakes i have made, Its my first discovery of a vulnerablity so please understand, and use this file for ed [ more ] [ reply ] http://www.smashguard.org 2004-01-30 Hilmi Ozdoganoglu (cyprian purdue edu) SmashGuard is a hardware-based solution developed at Purdue University to prevent Buffer-Overflow Attacks realized by overwriting the Function Return Address (patent-pending). The design of SmashGuard is a kernel patch that supports CPUs modified to support SmashGuard protection. For d [ more ] [ reply ] Re: RFC: virus handling 2004-01-28 3APA3A (3APA3A SECURITY NNOV RU) Dear Thomas Zehetbauer, --Wednesday, January 28, 2004, 6:45:39 PM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]: TZ> Looking at the current outbreak of the Mydoom.A worm I would like to TZ> share and discuss some thoughts: Most of your ideas are already covered by RFC1892/RFC3462. The only proble [ more ] [ reply ] RE: virus handling 2004-01-28 Rainer Gerhards (rgerhards hq adiscon com) I agree with most in this post, but not with 3), the ISP actions. This is not doable for an ISP, not from a ressource (manpower) point of view and even hardly from a contractual basis. And, no, I am not with an ISP. Other than that, I really think the AV vendors should do this. Also, I hardly can [ more ] [ reply ] FreeBSD Security Advisory FreeBSD-SA-04:01.mksnap_ffs 2004-01-30 FreeBSD Security Advisories (security-advisories freebsd org) Serv-U exploit 2004-01-30 Berend-Jan Wever (SkyLined edup tudelft nl) Hi, Attached is my Serv-U "SITE CHMOD" exploit. Should be pretty script kiddie friendly. Cheers, SkyLined -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com Comment: Berend-Jan Wever - skylined (at) edup.tudelft (dot) nl [email concealed] mQGiBD//MyARBADnHLyg2lUBEddhdWAVBx [ more ] [ reply ] Cisco Security Advisory: Buffer Overrun in Microsoft Windows 2000 Workstation Service (MS03-049) 2004-01-29 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Buffer Overrun in Microsoft Windows 2000 Workstation Service (MS03-049) Revision 1.0 - FINAL For Public Release 2004 January 29 18:00 UTC (GMT) - ----------------------------------------------------------------------- Conte [ more ] [ reply ] [FLSA-2004:1207] Updated cvs resolves security vulnerability 2004-01-29 Jesse Keating (jkeating j2solutions net) ----------========== OPEN3S-2003-08-08-eng-informix-onedcu ==========---------- 2004-01-29 pask open3s com ----------========== OPEN3S-2003-08-08-eng-informix-onedcu ==========---------- Title: Local Vulnerability in IBM Informix IDSv9.40 onedcu binary Date: 08-08-2003 Platform: Only tested in Linux but can be exported to others. Impact: Users with exec perm over ./bin/onedcu can create [ more ] [ reply ] ----------========== OPEN3S-2003-08-08-eng-informix-onshowaudit ==========---------- 2004-01-29 pask open3s com ----------========== OPEN3S-2003-08-08-eng-informix-ontape ==========---------- 2004-01-29 pask open3s com ZH2004-02SA (security advisory): PJ CGI Neo review (NeoBoard review) Remote arbitrary file retrieving 2004-01-29 ZetaLabs (zetalabs zone-h org) Security Announcement: untrusted ELF library path in some cvsup binary RPMs 2004-01-29 Matthias Andree (matthias andree gmx de) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 MA-SA-2004:02.ELF_RPATH Topic: Unsecure ELF RPATH allows user privilege escalation Announcement: MA-SA-2004-02 Writer: Matthias Andree Version: 1.0 Announced: 2004-01-29 Type: local escalation of privileges Impact: vulnerability enables one user t [ more ] [ reply ] new WIN virus? 2004-01-29 Atom 'Smasher' (atom suspicious org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 i don't know much at all about windows, but this spam got past my spam filter and drew my attention. i tested the suspect file in some on-line virus checkers, and they all reported the file as not being a threat. looking at the page that the spam reques [ more ] [ reply ] SGI Advanced Linux Environment security update #9 2004-01-28 SGI Security Coordinator (agent99 sgi com) ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary files retrieving 2004-01-28 ZetaLabs (zetalabs zone-h org) Oracle toplink mapping workbench password algorithm 2004-01-28 Pete Finnigan (plsql petefinnigan com) Hi I thought readers here might be interested in this item. Today I found that a website has posted the algorithm and sample code for the encryption algorithm used in Oracles toplink mapping workbench. This code can be used to decrypt the passwords held in the xml file easily. A link to the details [ more ] [ reply ] BRS WebWeaver Webserver Cross Site Scripting Vulnerability 2004-01-28 Oliver Karow (oliver karow gmx de) BRS WebWeaver Webserver Cross Site Scripting Vulnerability ================================================ Whatis: ===== BRS WebWeaver is a free personal web server that runs on the Windows platform. Version: ====== V 1.07 Exploiting: ======= http://127.0.0.1/scripts/ISAPISkeleton.dll? [ more ] [ reply ] SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM 2004-01-28 KF (dotslash snosoft com) Re: New MiMail variant is DDoS'ing SCO.com 2004-01-28 Bob Toxen (bob verysecurelinux com) I had no problem downloading CA's cleansing tool a short time ago. My hat is off to CA for producing this tool and making it available for free. Regarding the SCO DDoS, it's so sad when a thief (of services) decides to attack a blackmailer, in my opinion. Best regards, Bob Toxen, CTO Fly-By-Day C [ more ] [ reply ] phpBB privmsg.php XSS vulnerability patch. 2004-01-28 Shaun Colley (shaunige yahoo co uk) For those who have not yet installed the phpBB packages fixing the XSS vulnerability in privmsg.php documented at <http://www.securityfocus.com/bid/9290> and the groupcp.php vulnerability, or for those who do not want to download the new packages, the following patches can be quickly and easily appl [ more ] [ reply ] |
|
Privacy Statement |
Wed Jan 28 2004 18:45:39 Thomas Zehetbauer <thomasz (at) hostmaster (dot) org [email concealed]> wrote:
TZ> Looking at the current outbreak of the Mydoom.A worm I would like
TZ> to share and discuss some thoughts:
[...]
TZ> 1.) Virus Detected Notifications
TZ> After filtering out the messages generated by the worm i
[ more ] [ reply ]