BugTraq Mode:
(Page 1560 of 1748)  < Prev  1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565  Next >
Security Announcement: untrusted ELF library path in some cvsup binary RPMs 2004-01-29
Matthias Andree (matthias andree gmx de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

MA-SA-2004:02.ELF_RPATH

Topic: Unsecure ELF RPATH allows user privilege escalation

Announcement: MA-SA-2004-02
Writer: Matthias Andree
Version: 1.0
Announced: 2004-01-29
Type: local escalation of privileges
Impact: vulnerability enables one user t

[ more ]  [ reply ]
new WIN virus? 2004-01-29
Atom 'Smasher' (atom suspicious org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

i don't know much at all about windows, but this spam got past my spam
filter and drew my attention. i tested the suspect file in some on-line
virus checkers, and they all reported the file as not being a threat.
looking at the page that the spam reques

[ more ]  [ reply ]
SGI Advanced Linux Environment security update #9 2004-01-28
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : SGI Advanced Linux Environment security update #9
Number : 20040103-01-U
Date : January 28, 2004
Reference

[ more ]  [ reply ]
ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary files retrieving 2004-01-28
ZetaLabs (zetalabs zone-h org)


ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary files retrieving

Published: 28 january 2004

Released: 28 january 2004

Name: Web Blog

Affected Systems: 1.1

Issue: Remote file retrieving

Author: Zone-h Security Labs

Vendor: http://leifwright.com

Description

[ more ]  [ reply ]
Oracle toplink mapping workbench password algorithm 2004-01-28
Pete Finnigan (plsql petefinnigan com)
Hi

I thought readers here might be interested in this item. Today I found
that a website has posted the algorithm and sample code for the
encryption algorithm used in Oracles toplink mapping workbench. This
code can be used to decrypt the passwords held in the xml file easily. A
link to the details

[ more ]  [ reply ]
BRS WebWeaver Webserver Cross Site Scripting Vulnerability 2004-01-28
Oliver Karow (oliver karow gmx de)
BRS WebWeaver Webserver Cross Site Scripting Vulnerability
================================================

Whatis:
=====

BRS WebWeaver is a free personal web server that runs on the Windows
platform.

Version:
======

V 1.07

Exploiting:
=======

http://127.0.0.1/scripts/ISAPISkeleton.dll?

[ more ]  [ reply ]
phpBB privmsg.php XSS vulnerability patch. 2004-01-28
Shaun Colley (shaunige yahoo co uk)
For those who have not yet installed the phpBB
packages fixing the XSS vulnerability in privmsg.php
documented at <http://www.securityfocus.com/bid/9290>
and the groupcp.php vulnerability, or for those who do
not want to download the new packages, the following
patches can be quickly and easily appl

[ more ]  [ reply ]
Denial Of Service in SurfNOW 2.2 2004-01-28
Donato Ferrante (fdonato autistici org)
Donato Ferrante

Application: SurfNOW
http://www.loomsoft.com/

Version: 2.2

Bug: Denial Of Service

Author: Donato Ferrante
e-mail: fdonato (at) autistici (dot) org [email concealed]
web: www.autistici.org/fdonato

xxxxxxxxxxxxxxxx

[ more ]  [ reply ]
Changes to CERT Advisories [INFO#04.20510] 2004-01-28
CERT Advisory (cert-advisory cert org)
-----BEGIN PGP SIGNED MESSAGE-----

Dear Friends,

As many of you are aware, a few months ago the CERT Coordination Center
(CERT/CC) announced a new partnership with the Department of Homeland
Security's National Cyber Security Division (NCSD) to form a response
system for our nation and the Interne

[ more ]  [ reply ]
RFC: virus handling 2004-01-28
Thomas Zehetbauer (thomasz hostmaster org)
Looking at the current outbreak of the Mydoom.A worm I would like to
share and discuss some thoughts:

1.) Virus Detected Notifications
After filtering out the messages generated by the worm itself there
remain a lot of messages generated by automated e-mail scanning
solutions.

1.1.) Configuration

[ more ]  [ reply ]
[SECURITY] [DSA 430-1] New trr19 packages fix local games exploit 2004-01-28
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 430-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 28th, 2004

[ more ]  [ reply ]
information and reverse engineering bits of the Mydoom worm 2004-01-27
Gadi Evron (ge egotistical reprehensible net)
We've released a digest of a few of the messages that passed through
TH-Research about this new worm.

In it is information about the worm that is not included in the
different vendors web pages, and requires a higher understanding of
assembly and reverse engineering.

We release it for the purpo

[ more ]  [ reply ]
RE: GOOROO CROSSING: File Spoofing Internet Explorer 6 2004-01-27
tlarholm pivx com
You're not very detailed about what happens behind the curtain, so here
goes :)

When an HTTP request returns its data, IE tries to determine the MIME
type based on several factors [0]. In this case, IE determines that it
cannot render the data as HTML since there is a Content-Disposition
header - C

[ more ]  [ reply ]
[ GLSA 200401-04 ] GAIM 0.75 Remote overflows 2004-01-27
Tim Yamin (plasmaroo gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200401-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
~

[ more ]  [ reply ]
GAIM Patch update 2004-01-27
Stefan Esser (s esser e-matters de)
Hello,

there was a problem with the GAIM patch that was linked from my advisory
and is most probably part of the already released packages.

The old version of the patch lacked a variable increment, that eventually
creates a very long loop followed by a crash on malformed yahoo packets.

This probl

[ more ]  [ reply ]
Remote exploit in Gallery 1.3.1, 1.3.2, 1.3.3, 1.4 and 1.4.1 2004-01-27
Bharat Mediratta (bharat menalto com)
(Big thanks to Fred [vrotogel] for discovering this vulnerability
and alerting us before posting )

___________________
PROBLEM DESCRIPTION

Gallery is an open source image management system written in PHP.
Learn more about it at http://gallery.sourceforge.net

Starting in release 1.3.1, Gallery in

[ more ]  [ reply ]
CERT Advisory CA-2004-02 Email-borne Viruses 2004-01-27
CERT Advisory (cert-advisory cert org)

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2004-02 Email-borne Viruses

Original release date: January 27, 2004
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

* Any system running Microsoft Windows (a

[ more ]  [ reply ]
[ GLSA 200401-03 ] Apache mod_python Denial of Service vulnerability 2004-01-27
Tim Yamin (plasmaroo gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200401-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
~

[ more ]  [ reply ]
GOOROO CROSSING: File Spoofing Internet Explorer 6 2004-01-27
http-equiv (at) excite (dot) com [email concealed] (1 malware com) (1 replies)


Tuesday, January 27, 2004

Trivial file spoofing in Internet Explorer 6.0.2800.1106 and all
of 'its' patches to date on WIN XP [probably others]:

Content-Disposition: attachment; filename=malware.{3050f4d8-98B5-
11CF-BB82-00AA00BDCE0B}fun_ball_gites_pie_throw%2Empeg"

Absolute bare minimum work

[ more ]  [ reply ]
RE: GOOROO CROSSING: File Spoofing Internet Explorer 6 2004-01-27
Oliver Lavery (olavery pivx com)
Elevated scanning: TCP port 135 (RPC) AND 445 (Domain Services) 2004-01-27
Nicholas Weaver (nweaver CS berkeley edu)

At several locations we have seen a significant elevation in
scanning on TCP ports 135 AND 445. The scannig machines are scanning
both ports, and seem to be doing a semirepeated scan (sometimes
attempting multiple tries at the same destination).

This looks somewhat like a worm scan or widely di

[ more ]  [ reply ]
[FLSA-2004:1187] Updated screen resolves security vulnerability 2004-01-27
Jesse Keating (jkeating j2solutions net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated screen resolves security vulnerability
Advisory ID: FLSA:1187
Issue date: 2004-01-26
Product:

[ more ]  [ reply ]
Re: Self-Executing FOLDERS: Windows XP Explorer Part V 2004-01-27
Liu Die Yu (liudieyuinchina yahoo com cn)


here is what's happening here on my default and up2date winxp.home:

i downloaded the ZIP file at:

http://www.malware.com/my.pics.zip

double clicked it and another windows explorer popped up - there was folder inside the zip file.

then i double clicked the folder - and my screen was burning...

[ more ]  [ reply ]
Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code 2004-01-27
lowhalo hush com

Ultramagnetic Advisory #001: January 26th, 2004
http://ultramagnetic.sourceforge.net/advisories/001.html
Severity: 9 (High)
Document Revision: 1.0

Overview

Ultramagnetic is a concurrent fork of the Gaim instant messaging software
which adds strong end-to-end encryption and authentication using G

[ more ]  [ reply ]
MDKSA-2004:008 - Updated tcpdump packages fix several vulnerabilities 2004-01-27
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrake Linux Security Update Advisory
_______________________________________________________________________

Package name: tcpdump
Advisory ID:

[ more ]  [ reply ]
Chaosreader: Trace TCP/UDP from snoop/tcpdump logs 2004-01-27
Brendan Gregg (brendan gregg tpg com au)
Vunerability Analysis Tool

Chaosreader is a freeware tool that can trace HTTP sessions from a packet
log, displaying which bytes are plaintext. It could be used to help verify
that some websites really do use encryption, which may interest readers of
Bugtraq. It has been written in perl and tested

[ more ]  [ reply ]
(Page 1560 of 1748)  < Prev  1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus