|
Colapse all |
Post message
Eudora 6.0.1 LaunchProtect 2003-11-25 psz maths usyd edu au (Paul Szabo) Eudora 6.0.1 (on Windows) has LaunchProtect, to warn the user before running executable attachments. However this only works in the attach folder; using spoofed attachments, executables stored elsewhere may run without warning. In some setups, even executables in the attach folder may run without wa [ more ] [ reply ] RE: Unhackable network really unhackable? 2003-11-24 Bohling James CONT JBC (james bohling JBC JFCOM MIL) DHCP with a short lease period or a manual lease period Here's yer sign! Thank You, James T. Bohling, CCNA, Security+, MCP-Win2k Network Security Engineer - JBC CoE Joint C4ISR Battle Center (AMSEC) 116 Lake View Parkway Suffolk, VA 23435 (W) 757-638.4032 Web: www.jbc.jfcom.mil This email was pro [ more ] [ reply ] GLSA: phpsysinfo (200311-06) 2003-11-24 Andrea Barisani (lcars gentoo org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ --- GENTOO LINUX SECURITY ANNOUNCEMENT 200311-06 - - ------------------------------------------------------------------------ --- GLSA: 200311-06 package: dev-php/ph [ more ] [ reply ] GLSA: libnids (200311-07) 2003-11-24 Andrea Barisani (lcars gentoo org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ --- GENTOO LINUX SECURITY ANNOUNCEMENT 200311-07 - - ------------------------------------------------------------------------ --- GLSA: 200311-07 package: net-libs/l [ more ] [ reply ] GLSA: ethereal (200311-04) 2003-11-24 Andrea Barisani (lcars gentoo org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ --- GENTOO LINUX SECURITY ANNOUNCEMENT 200311-04 - - ------------------------------------------------------------------------ --- GLSA: 200311-04 package: net-analyz [ more ] [ reply ] GLSA: glibc (200311-05) 2003-11-24 Andrea Barisani (lcars gentoo org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ --- GENTOO LINUX SECURITY ANNOUNCEMENT 200311-05 - - ------------------------------------------------------------------------ --- GLSA: 200311-05 package: sys-libs/g [ more ] [ reply ] Re: hard links on Linux create local DoS vulnerability and security problems 2003-11-24 flaps dgp toronto edu (Alan J Rosenthal) (2 replies) >on Linux it is possible for any user to create a hard link to a file belonging >to another user. Only if they can write to some directory on the same partition. >Furthermore, users can even create links to a setuid binary. Only if it's on the same partition. This is just one of a huge number of [ more ] [ reply ] Re: hard links on Linux create local DoS vulnerability and security problems 2003-11-24 Casper Dik (casper holland sun com) Re: hard links on Linux create local DoS vulnerability and security problems 2003-11-24 Carl Ekman (calle gosig nu) hard links on Linux create local DoS vulnerability and security problems 2003-11-24 Jakob Lell (jlell JakobLell de) (4 replies) Hello, on Linux it is possible for any user to create a hard link to a file belonging to another user. This hard link continues to exist even if the original file is removed by the owner. However, as the link still belongs to the original owner, it is still counted to his quota. If a malicious us [ more ] [ reply ] Re: [Full-Disclosure] hard links on Linux create local DoS vulnerability and security problems 2003-11-24 Michal Zalewski (lcamtuf ghettot org) Re: hard links on Linux create local DoS vulnerability and security problems 2003-11-24 Steven Leikeim (steven enel ucalgary ca) Re: hard links on Linux create local DoS vulnerability and security problems 2003-11-24 Bruno Lustosa (bruno lustosa net) (1 replies) Re: hard links on Linux create local DoS vulnerability and security problems 2003-11-24 David F. Skoll (dfs roaringpenguin com) Re: hard links on Linux create local DoS vulnerability and security problems 2003-11-24 Brian Bennett (bahamat digitalelf net) RE: DOE Releases Interim Report on Blackouts/Power Outages, Focus on Cyber Security 2003-11-21 Richard Bertolett ci austin tx us All, I took a look at the failure analysis section, and perhaps I can help clarify RTUs vs. 'dialups', but it is hard for me to tell much about the SCADA Systems they run. Dial-ups are usually remote RTUs that are dialed from the control center and polled for data/changes/exception events, etc. [ more ] [ reply ] RE: DOE Releases Interim Report on Blackouts/Power Outages, Focus on Cyber Security 2003-11-21 Russ (Russ Cooper rc on ca) Well, they did specifically discount both current (at the time) Internet worms/activity, and terrorist activity, as having any part in the blackout. As for the RTU failures, FE told investigators they believed that was because they believed the RTU's "started queuing and overloading the terminals bu [ more ] [ reply ] Unhackable network really unhackable? 2003-11-24 $B%8!<%9%]!<%H!!9uED(B (akuroda mx5 nisiq net) (1 replies) Have you ever checked out the InvisiLAN technology? InvisiLAN is seemingly developed by ex-KGB and CIA directors. It's a random IP change technology inside LAN by a set of secureID like network cards and special router. Anarkey Network security, a Dutch company started to distribute InvisiLAN in Eur [ more ] [ reply ] New version of ike-scan (IPsec IKE scanner) available - v1.5.1 2003-11-24 Roy Hills (Roy Hills nta-monitor com) ike-scan v1.5.1 has been released. There are many changes from the last official release which was v1.2. In summary, the changes are: a) More IKE backoff patterns which allows more systems to be fingerprinted; b) More flexible backoff pattern specification which allows systems with more complex [ more ] [ reply ] [RHSA-2003:311-01] Updated Pan packages fix denial of service vulnerability 2003-11-24 bugzilla redhat com [RHSA-2003:316-01] Updated iproute packages fix local security vulnerability 2003-11-24 bugzilla redhat com Monit 4.1 HTTP interface multiple security vulnerabilities 2003-11-24 S-Quadra Security Research (e legerov s-quadra com) |
|
Privacy Statement |
[tested]
OS:Win2k3,CN version
IE: with MS03-048 installed.
OS:WinXp, CN version
Microsoft Internet Explorer v6.Sp1; up-to-date on 2003/11/16
[overview]
By combining several vulnerabilities in Internet Explorer, an attacker can execute his EXE file on victim's system.
("Clean" means: the
[ more ] [ reply ]