|
Colapse all |
Post message
Security Announcement: untrusted ELF library path in some cvsup binary RPMs 2004-01-29 Matthias Andree (matthias andree gmx de) new WIN virus? 2004-01-29 Atom 'Smasher' (atom suspicious org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 i don't know much at all about windows, but this spam got past my spam filter and drew my attention. i tested the suspect file in some on-line virus checkers, and they all reported the file as not being a threat. looking at the page that the spam reques [ more ] [ reply ] SGI Advanced Linux Environment security update #9 2004-01-28 SGI Security Coordinator (agent99 sgi com) ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary files retrieving 2004-01-28 ZetaLabs (zetalabs zone-h org) Oracle toplink mapping workbench password algorithm 2004-01-28 Pete Finnigan (plsql petefinnigan com) Hi I thought readers here might be interested in this item. Today I found that a website has posted the algorithm and sample code for the encryption algorithm used in Oracles toplink mapping workbench. This code can be used to decrypt the passwords held in the xml file easily. A link to the details [ more ] [ reply ] BRS WebWeaver Webserver Cross Site Scripting Vulnerability 2004-01-28 Oliver Karow (oliver karow gmx de) BRS WebWeaver Webserver Cross Site Scripting Vulnerability ================================================ Whatis: ===== BRS WebWeaver is a free personal web server that runs on the Windows platform. Version: ====== V 1.07 Exploiting: ======= http://127.0.0.1/scripts/ISAPISkeleton.dll? [ more ] [ reply ] SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM 2004-01-28 KF (dotslash snosoft com) phpBB privmsg.php XSS vulnerability patch. 2004-01-28 Shaun Colley (shaunige yahoo co uk) For those who have not yet installed the phpBB packages fixing the XSS vulnerability in privmsg.php documented at <http://www.securityfocus.com/bid/9290> and the groupcp.php vulnerability, or for those who do not want to download the new packages, the following patches can be quickly and easily appl [ more ] [ reply ] Changes to CERT Advisories [INFO#04.20510] 2004-01-28 CERT Advisory (cert-advisory cert org) -----BEGIN PGP SIGNED MESSAGE----- Dear Friends, As many of you are aware, a few months ago the CERT Coordination Center (CERT/CC) announced a new partnership with the Department of Homeland Security's National Cyber Security Division (NCSD) to form a response system for our nation and the Interne [ more ] [ reply ] RFC: virus handling 2004-01-28 Thomas Zehetbauer (thomasz hostmaster org) Looking at the current outbreak of the Mydoom.A worm I would like to share and discuss some thoughts: 1.) Virus Detected Notifications After filtering out the messages generated by the worm itself there remain a lot of messages generated by automated e-mail scanning solutions. 1.1.) Configuration [ more ] [ reply ] [SECURITY] [DSA 430-1] New trr19 packages fix local games exploit 2004-01-28 joey infodrom org (Martin Schulze) information and reverse engineering bits of the Mydoom worm 2004-01-27 Gadi Evron (ge egotistical reprehensible net) We've released a digest of a few of the messages that passed through TH-Research about this new worm. In it is information about the worm that is not included in the different vendors web pages, and requires a higher understanding of assembly and reverse engineering. We release it for the purpo [ more ] [ reply ] RE: GOOROO CROSSING: File Spoofing Internet Explorer 6 2004-01-27 tlarholm pivx com You're not very detailed about what happens behind the curtain, so here goes :) When an HTTP request returns its data, IE tries to determine the MIME type based on several factors [0]. In this case, IE determines that it cannot render the data as HTML since there is a Content-Disposition header - C [ more ] [ reply ] GAIM Patch update 2004-01-27 Stefan Esser (s esser e-matters de) Hello, there was a problem with the GAIM patch that was linked from my advisory and is most probably part of the already released packages. The old version of the patch lacked a variable increment, that eventually creates a very long loop followed by a crash on malformed yahoo packets. This probl [ more ] [ reply ] Remote exploit in Gallery 1.3.1, 1.3.2, 1.3.3, 1.4 and 1.4.1 2004-01-27 Bharat Mediratta (bharat menalto com) (Big thanks to Fred [vrotogel] for discovering this vulnerability and alerting us before posting ) ___________________ PROBLEM DESCRIPTION Gallery is an open source image management system written in PHP. Learn more about it at http://gallery.sourceforge.net Starting in release 1.3.1, Gallery in [ more ] [ reply ] [ GLSA 200401-03 ] Apache mod_python Denial of Service vulnerability 2004-01-27 Tim Yamin (plasmaroo gentoo org) GOOROO CROSSING: File Spoofing Internet Explorer 6 2004-01-27 http-equiv (at) excite (dot) com [email concealed] (1 malware com) (1 replies) Tuesday, January 27, 2004 Trivial file spoofing in Internet Explorer 6.0.2800.1106 and all of 'its' patches to date on WIN XP [probably others]: Content-Disposition: attachment; filename=malware.{3050f4d8-98B5- 11CF-BB82-00AA00BDCE0B}fun_ball_gites_pie_throw%2Empeg" Absolute bare minimum work [ more ] [ reply ] Elevated scanning: TCP port 135 (RPC) AND 445 (Domain Services) 2004-01-27 Nicholas Weaver (nweaver CS berkeley edu) At several locations we have seen a significant elevation in scanning on TCP ports 135 AND 445. The scannig machines are scanning both ports, and seem to be doing a semirepeated scan (sometimes attempting multiple tries at the same destination). This looks somewhat like a worm scan or widely di [ more ] [ reply ] [FLSA-2004:1187] Updated screen resolves security vulnerability 2004-01-27 Jesse Keating (jkeating j2solutions net) Re: Self-Executing FOLDERS: Windows XP Explorer Part V 2004-01-27 Liu Die Yu (liudieyuinchina yahoo com cn) here is what's happening here on my default and up2date winxp.home: i downloaded the ZIP file at: http://www.malware.com/my.pics.zip double clicked it and another windows explorer popped up - there was folder inside the zip file. then i double clicked the folder - and my screen was burning... [ more ] [ reply ] Ultramagnetic Advisory #001: Multiple vulnerabilities in Gaim code 2004-01-27 lowhalo hush com Ultramagnetic Advisory #001: January 26th, 2004 http://ultramagnetic.sourceforge.net/advisories/001.html Severity: 9 (High) Document Revision: 1.0 Overview Ultramagnetic is a concurrent fork of the Gaim instant messaging software which adds strong end-to-end encryption and authentication using G [ more ] [ reply ] MDKSA-2004:008 - Updated tcpdump packages fix several vulnerabilities 2004-01-27 Mandrake Linux Security Team (security linux-mandrake com) Chaosreader: Trace TCP/UDP from snoop/tcpdump logs 2004-01-27 Brendan Gregg (brendan gregg tpg com au) Vunerability Analysis Tool Chaosreader is a freeware tool that can trace HTTP sessions from a packet log, displaying which bytes are plaintext. It could be used to help verify that some websites really do use encryption, which may interest readers of Bugtraq. It has been written in perl and tested [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
MA-SA-2004:02.ELF_RPATH
Topic: Unsecure ELF RPATH allows user privilege escalation
Announcement: MA-SA-2004-02
Writer: Matthias Andree
Version: 1.0
Announced: 2004-01-29
Type: local escalation of privileges
Impact: vulnerability enables one user t
[ more ] [ reply ]