BugTraq Mode:
(Page 1585 of 1748)  < Prev  1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590  Next >
Thomnson TCM315 Denial of service 2003-11-23
Administrador de ShellSec (admin shellsec net)
________________________________________________________________________
___

. : Shell Security Advisory : .

Subject: Buffer overflow in the cable modem Thomson TCM315

Issue date: 2003 November 23

Related link: http://www.shellsec.net/leer_advisory.php?id=2

Homepage: ht

[ more ]  [ reply ]
simple buffer overflow in gedit 2003-11-23
Andreas Constantinides (MegaHz) (megahz megahz org)
Hello,
I discover a strange but simple buffer overflow in gedit.
I am using RH9,

to demostrate the buffer here is a simple file buffer generator:

===========buffer.c == cut here===============
/*
simple buffer overflow generator by MegaHz megahz (at) megahz (dot) org [email concealed]
*/
#include <iostream>
using namespace

[ more ]  [ reply ]
[CommerceSQL] Remote File Read Vulnerability 2003-11-23
Mariusz Ciesla (craig tenbit pl)


CommerceSQL shopping cart (http://commercesql.com) allows remote file reading. It only needs to specially prepared page variable in index.cgi to allow reading remote files (like /etc/passwd)

By using prepared GET page variable it allows user to read remote files

Example:

With index.cgi?page

[ more ]  [ reply ]
[Opera 7] Arbitrary File Auto-Saved Vulnerability. 2003-11-22
:: Operash :: (nesumin softhome net)

------------------------------------------------------------------------
---------
TITLE : [Opera 7] Arbitrary File Auto-Saved Vulnerability.
-= For Whom The Remote Customizing Runs? =-
PRODUCT : Opera 7 for Windows
VERSIONS : 7.22 build 3221 (JP:build 3222)

[ more ]  [ reply ]
webfs 1.7.x:webserver remote file overflow exploit (use ftpd to mkdir) 2003-11-22
yan feng (jsk ph4nt0m net)


/***********************************************************************
***********hate money. if you have much. please shit ,lol...

*only love #ph4nt0m(irc.ox557.org) #cheese..(sec..)

*page: jsk.ph4nt0m.org

*love taiwan. nah :( chen&li. go die...........

*[root@localhost root]# ./hack -h

[ more ]  [ reply ]
Opera directory traversal and buffer overflow 2003-11-22
Jouko Pynnonen (jouko iki fi)


OVERVIEW
========

Two vulnerabilities were found in the Opera web browser versions up to
7.22. They are related to skin files. The first one is a directory
traversal problem which allows an attacker to upload a file to an
arbitrary location on the victim system. The second is a buffer
overf

[ more ]  [ reply ]
rpc.mountd Vulnerabilities on SGI IRIX 2003-11-21
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SGI Security Advisory

Title: rpc.mountd Vulnerabilities
Number: 20031102-01-P
Date: November, 21 2003
Reference: SGI BUG 897521, CVE CAN-1999

[ more ]  [ reply ]
yet another panic() in OpenBSD 2003-11-21
noir uberhax0r net (1 replies)

a project lacking the basic QA and unit testing and here is the outcome:

#include <stdio.h>
#include <sys/types.h>
#include <sys/sem.h>
#include <sys/ipc.h>

int
main()
{
int i;

for(i = 0; i < 0x40; i++)
semop(i, (struct sembuf *) NULL, 0);

}

PANIC in OpenBSD 3.3 an

[ more ]  [ reply ]
Re: yet another panic() in OpenBSD 2003-11-22
Henning Brauer (henning openbsd org)
[SCSA-021] Anonymous Mail Forwarding Vulnerabilities in vbPortal 2003-11-22
Gregory LEBRAS (gregory lebras security-corporation com)


======================================================================

Security Corporation Security Advisory [SCSA-021]

Anonymous Mail Forwarding Vulnerabilities in vbPortal

======================================================================

PROGRAM: vbPortal

HOMEPAGE: http://www.vbp

[ more ]  [ reply ]
PrimeBase SQL Database server cleartext password storage. (fwd) 2003-11-22
Larry W. Cashdollar (lwc vapid ath cx)
PrimeBase SQL Database server cleartext password storage.
Vapid Labs Security Note
10/20/03

The PrimeBase SQL Database Server 4.2 stores passwords in clear
text, and based on the installation users umask settings maybe readable by
all local users.

From the readme.txt file:

"The Admin server wil

[ more ]  [ reply ]
DOE Releases Interim Report on Blackouts/Power Outages, Focus on Cyber Security 2003-11-21
Geoff Shively (gshively pivx com)
The Department of Energy (http://www.energy.gov) has released a interim
report on the Aug 14th power outages.

http://energy.gov/engine/content.doPUBLIC_ID=11860&BT_CODE=DOEHOME&TT_CO
DE=SPOTLIGHTDOCUMENT

*remote terminal units (RTU)
*distributed control systems (DCS)
*supervisory control and data a

[ more ]  [ reply ]
[SECURITY] Some Debian Project machines have been compromised 2003-11-21
Martin Schulze (joey infodrom org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

Debian Security Advisory http://www.debian.org/security/
Some Debian Project machines compromised security (at) debian (dot) org [email concealed]
November 21st, 2003 d

[ more ]  [ reply ]
FreeRADIUS 0.9.2 "Tunnel-Password" attribute Handling Vulnerability 2003-11-21
S-Quadra Security Research (research s-quadra com)

S-Quadra Advisory #2003-11-21

Topic: FreeRADIUS 0.9.2 "Tunnel-Password" attribute Handling Vulnerability
Severity: Average
Release date: 21 Nov 2003

1. DESCRIPTION

The FreeRADIUS Server (http://www.freeradius.org) is a high-performance
and highly configurable GPL'd free R

[ more ]  [ reply ]
MSN messenger improper file transfer ip-address field parsing 2003-11-21
ronan o kane (hi_t3ch_ass4ssin hotmail com)


MSN Messenger bug

Release Date:

20/11/03

Discovery date:

Sometime around 2001 or 2000

Versions Affected:

------------------

Msn messenger 1.0 -> msn messenger 6.0.0602

Windows messenger all versions

Not Affected:

------------

Msn Messenger 6.1, trillian, gaim

Description

[ more ]  [ reply ]
Xitami Denial of Service in Handling malformed request 2003-11-21
Tri Huynh (trihuynh zeeup com)
Xitami Denial of Service in Handling malformed request
=================================================

PROGRAM: Xitami
HOMEPAGE: http://www.xitami.com
VULNERABLE VERSIONS: 2.5 and below

DESCRIPTION
=================================================

LiteServe is a very powerful, full-featured, o

[ more ]  [ reply ]
[aadams (at) securityfocus (dot) com [email concealed]: Linux Kernel <= 2.4.21 MXCSR Local DOS Exploitation] 2003-11-21
David Ahmad (da securityfocus com) (2 replies)

As far as I know, this bug was not discussed or exploited anywhere
publicly. Also, the technique used to cause the memory copy to
fail is clever and may be useful in other scenarios.

----- Forwarded message from Aaron Adams <aadams (at) securityfocus (dot) com [email concealed]> -----

From: Aaron Adams <aadams@securityfocus

[ more ]  [ reply ]
RE: Router Worm? 2003-11-20
BugTrap (bugtrap intercept net)
I am now seeing these as well, I believe this is something new as I have
not seen this on my network until now and I've had infected welchia
infected pc's.

Michael

-----Original Message-----
From: David Gillett [mailto:gillettdavid (at) fhda (dot) edu [email concealed]]
Posted At: Thursday, November 20, 2003 12:14 PM
Posted

[ more ]  [ reply ]
R7-0016: Sybase ASE 12.5 Remote Password Array Denial of Service 2003-11-20
advisory rapid7 com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________
Rapid7, Inc. Security Advisory
Visit http://www.rapid7.com/ to download NeXpose,
the world's most advanced vulnerability scanner.
Linux and

[ more ]  [ reply ]
Remote DoS in FreeRADIUS, all versions. 2003-11-20
Alan DeKok (aland freeradius org)
Application: FreeRADIUS, all versions (http://www.freeradius.org)

Summary:

A remote DoS, and possibly exploit, exists in all versions of the
FreeRADIUS server. All users should upgrade to the latest version, as
soon as it is officially release. For later announcements, see:

http://www.freera

[ more ]  [ reply ]
[securitylab.ru] EffectOffice Server 2.9 problem 2003-11-20
Alexander Antipov (antipov SecurityLab ru)
Application: EffectOffice Server 2.9
Vendor: EffectOffice
Vendor Site: http://www.EffectOffice.com
Remote: Yes
Exploitable: Yes
Risk level: High
Authors: D_BuG (d_bug @ bk.ru)
Authors Site: http://www.securitylab.ru

Description:
A vulnerability identified in EffectOffice can be exploite

[ more ]  [ reply ]
SIRCD: Anyone can set umode +o(oper). 2003-11-20
Victor Jerlin (vigge vigge fulhack nu)
I recently accidentially set my own usermode to +o in SIRCD, (MODE <nick>
+o), and hey! I was oper! :)

Versions affected is atleast 0.5.2 och 0.5.3..

The developer has been informed about this, and I assume that it will be
fixed ASAP. Here's a quick fix for those who doesnt have time to wait (at
l

[ more ]  [ reply ]
(Page 1585 of 1748)  < Prev  1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus