BugTraq Mode:
(Page 1587 of 1748)  < Prev  1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592  Next >
Re: Security researchers organization 2003-11-19
Crispin Cowan (crispin immunix com)
Thor Larholm wrote:

>>From: Russ [mailto:Russ.Cooper (at) rc.on (dot) ca [email concealed]]
>>(Was: Vulnerability Disclosure Formats (was "Re: Funny article"))
>><snip http://tinyurl.com/ve83>
>>Thor Larholm proposed the idea of a "Union" to me. While I don't like
>>the concept of union's in this day and age, our field is one

[ more ]  [ reply ]
Re: Router Worm? 2003-11-19
Niels Bakker (niels=bugtraq bakker net)
* cstrom (at) cos (dot) com [email concealed] (Chris Strom) [Wed 19 Nov 2003, 22:45 CET]:
>
> I've received a strange HTTP request on my web site from two different sources. The request is logged as:
>
> SEARCH /\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x0
2
> \xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x

[ more ]  [ reply ]
Re: Router Worm? 2003-11-19
Fred Laxton (securitynotice laxton net)
I just saw the same thing on my web server log from last night. It did
no damage, but I blocked the offending IP anyway, it can't be anything
good ;-) I also reported it to the network's abuse address.

Fred

Chris Strom wrote:

>
> I've received a strange HTTP request on my web site from two

[ more ]  [ reply ]
Re: IA WebMail 3.x PoC Code 2003-11-19
Peter Winter-Smith (peter4020 hotmail com)


Hello again,

I'm afraid that I have had a couple of reports which state that the

Proof of Concept code which I have written for IA WebMail does not work.

This is often due to the fact that I close the socket immediately as the

malicious data is sent, and so the server does not follow the

[ more ]  [ reply ]
HPUX dtmailpr buffer overflow vulnerability 2003-11-19
Davide Del Vecchio (dante alighieri org)
=======================================================
  HPUX dtmailpr buffer overflow vulnerability
=======================================================

Davide Del Vecchio Adv#8

Discovered in: 14/07/2003
Date: 19/11/2003
Tested on HP-UX B.11.00

Description:

  The dtmailpr program reads a

[ more ]  [ reply ]
Microsoft SharePoint Portal and Team Services 2003-11-19
arkanian hacker am


There is a bug in how the authentication mode works with the web-based

administration page.

This page resides, in the Web Servers with Sharepoint, in

http://www.example.com/_layouts/settings.htm or

http://www.example.com/some_directory/_layouts/settings.htm

This page is usually protecte

[ more ]  [ reply ]
Re: Security researchers organization 2003-11-19
John C Borkowski III (borkowsj spawar navy mil)
I would like to see an organization that would do exactly that:

> promote and protect the interests of security researchers

Something that at least in the United States, would act as a voice to
the government to counter the claims of vendors. An "advocacy group", as
it were. Probably with lobbyist

[ more ]  [ reply ]
MDKSA-2003:107 - Updated glibc packagess fix vulnerabilities 2003-11-19
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrake Linux Security Update Advisory
_______________________________________________________________________

Package name: glibc
Advisory ID:

[ more ]  [ reply ]
IA WebMail 3.x PoC 2003-11-19
Peter Winter-Smith (peter4020 hotmail com)


Hello all,

As I stated in my advisory I would release a proof of concept code

after a short period of time which the vendor could use to fix this

and any other bugs for the new release. It has now been in excess

of two weeks, and I have been informed that a fix is almost if not

completely r

[ more ]  [ reply ]
Router Worm? 2003-11-19
Chris Strom (cstrom cos com)


I've received a strange HTTP request on my web site from two different sources. The request is logged as:

SEARCH /\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x0
2

\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02
\xb1\x02

\xb1\x02\xb1\x02\xb1\x0

[ more ]  [ reply ]
Half Life dedicated server information leak and DoS 2003-11-19
3APA3A (3APA3A SECURITY NNOV RU)
Dear bugtraq (at) securityfocus (dot) com [email concealed],

Probably is known, but is not documented:

Vendor: Valve software
Software: hlds, all versions (including steam).
Problem: Information leak, DoS
Author: SYZo[SND]

Problem:

in server configuration, if allowdownload = 1, it's possible to download
any file from direct

[ more ]  [ reply ]
RE: Security researchers organization 2003-11-19
Jeremy Epstein (jeremy epstein webmethods com)
I like the idea of this, but am concerned by the terminology.

<flame-bait>
What's being proposed is an organization of *vulnerability* researchers.
There are MANY other kinds of security researchers, including those who
design new forms of access controls, security models, intrusion detection
syste

[ more ]  [ reply ]
[securitylab.ru & security.nnov] Kerio Winroute Firewall Xroxy problem 2003-11-19
3APA3A (3APA3A SECURITY NNOV RU)

Application: Kerio Winroute Firewall 5.10
Vendor: Kerio Technologies Inc.
Vendor Site: http://www.kerio.com
Remote: Yes
Exploitable: Yes
Risk level: Critical (if proxy requires authentication)
Authors: Alexander Antipov & 3APA3A (aka Pig Killer)
Authors Sites: http://www.securitylab.ru http://www.s

[ more ]  [ reply ]
YAK! 2.1.0 still vulnerable 2003-11-19
bil (bil_912 coolgoose com)


YAK! 2.1.0 still vulnerable

===========================

for file transfer yak uses ftp mode. Yak!

listens on port 3535 for file transfer in ftp mode.

vulnerability in the previous version was, they

were using constant username and pass

combination for ftp login.

2.1.0 version seems to

[ more ]  [ reply ]
Re: Apple Safari 1.1 (v100) 2003-11-19
Christian Horchert (chorchert veedev de)
Hello Austin!

Am 18.11.2003 um 18:28 schrieb Austin Gilbert:
> it appears that Apple's Safari is vulnerable to the
> old Mozilla/IE cookie theft vulnerability outlined by
> Marc Slemko
> http://alive.znep.com/~marcs/security/mozillacookie/

This seems to even work if cookies are disabled.
Stupid, r

[ more ]  [ reply ]
Re: OpenBSD kernel holes ... 2003-11-18
noir uberhax0r net

> I may be wrong here, but I don't think that any of the kern.emul.*
> executable emulations are actually enabled on a default install. I have
> installed openbsd in environments requiring one of these since 3.2 and
> have had to specifically enable them every time. COMPAT_* are compiled in
> the d

[ more ]  [ reply ]
FW: Security researchers organization 2003-11-18
Keving Wong (kevin wong bbc co uk)
>> I don't think those capable of actually doing research require hand holding by anyone.

I don't think there is any need to be so negative : -(

Bugtraq is such a group in existence already, but is more of informal
gathering of like-minded people.

In Asia and the Middle East, Security Associates

[ more ]  [ reply ]
Re: OpenBSD kernel holes ... 2003-11-18
Coleman Kane (cokane cokane org)
I may be wrong here, but I don't think that any of the kern.emul.*
executable emulations are actually enabled on a default install. I have
installed openbsd in environments requiring one of these since 3.2 and
have had to specifically enable them every time. COMPAT_* are compiled in
the default ker

[ more ]  [ reply ]
Re: OpenBSD kernel holes ... 2003-11-18
noir uberhax0r net

i will be releasing a paper regarding kmem allocator (heap) overflows in
kernel space and exploit for patch 005 will be in its content.

buf = malloc(user_controled_size);
vn_rdwr(UIO_READ, ..., user_buf, user_controlled_size, ...);

these types of vulnerabilities are %100 exploitable!
check kern_m

[ more ]  [ reply ]
Re: Security researchers organization 2003-11-18
Steven M. Christey (coley mitre org)

Thor and Russ,

Adam Shostack and I have been thinking about a researchers'
organization for a while, too. We thought that an important first
step would be to host a vulnerability research workshop that would
discuss many of the key issues facing researchers, including the needs
for a researcher-f

[ more ]  [ reply ]
Re: OpenBSD kernel holes ... 2003-11-18
Steve Tornio (steve vitriol net)
<snip>

> from http://www.wideopenbsd.org/errata.html
>
> All architectures
>
> 005: RELIABILITY FIX: November 4, 2003
> It is possible for a local user to cause a system panic by
> executing
> a specially crafted binary with an invalid header.
> A source code patch exists which

[ more ]  [ reply ]
[RHSA-2003:288-01] Updated XFree86 packages provide security and bug fixes 2003-11-18
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated XFree86 packages provide security and bug fixes
Advisory ID: RHSA-2003:288-01
Issue date: 2003-

[ more ]  [ reply ]
Re: Security researchers organization 2003-11-18
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


<!--

What I would like to see
created is an organization that would promote and protect the interests
of security researchers, plain and simple. There is currently no
organization that exists solely to guide, help and represent security
researchers on a larger scale, yet we can all recognize the

[ more ]  [ reply ]
OpenBSD kernel holes ... 2003-11-18
noir uberhax0r net

once again i am honored to present you a generic and robust way to own
OpenBSD 2.x-3.x, enjoy ;)

it is quite funny to name ring 0 overflow patches as "reliability fixes".
who does theo thinks he is fooling ? kiddies in his cult ?

you can patch your useless/old openbsd systems by visiting;
http://

[ more ]  [ reply ]
Re: Funny article 2003-11-18
Javier Fernandez-Sanguino (jfernandez germinus com)
Steven M. Christey wrote:

> It would be very interesting to see any results that try to compare
> the timeliness of vendor response. I attemped to conduct such a
> study

I would be too.

> a year and a half ago, but the study failed due to lack of time and a
> lot of other factors such as:
(...)

[ more ]  [ reply ]
Re: Vulnerability Disclosure Formats (was "Re: Funny article") 2003-11-18
Javier Fernandez-Sanguino (jfernandez germinus com)
Steven M. Christey wrote:

> There are a couple proposals out there, but I don't think they've
> gotten as much attention as they deserve:
>
> Common Advisory Interchange Format
>
http://cert.uni-stuttgart.de/files/caif/requirements/split/requirements.
html
>
>
> Advisory and Notification Markup Lan

[ more ]  [ reply ]
Apple Safari 1.1 (v100) 2003-11-18
Austin Gilbert (austin breakingrobots net)
Hi,

it appears that Apple's Safari is vulnerable to the
old Mozilla/IE cookie theft vulnerability outlined by
Marc Slemko
http://alive.znep.com/~marcs/security/mozillacookie/

Marc posted a nice demo so that you can verify the
vulnerability.
http://alive.znep.com/~marcs/security/mozillacookie/demo

[ more ]  [ reply ]
SUSE Security Announcement: sane (SuSE-SA:2003:046) 2003-11-18
Thomas Biege (thomas suse de)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: sane
Announcement-ID: SuSE-SA:2003:046
Date: Tuesday, Nov 1

[ more ]  [ reply ]
Re: idsearch.com and googleMS.DLL 2003-11-18
Gary Flynn (flynngn jmu edu)


Jelmer wrote:

> thats this issue :
>
> http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2003-09/0654.html

>
> Unfortunatly I imagine it's being used pretty heavily to install malware
> since I had some run ins with
> it myself just browsing some sites

For the past several weeks, I've see

[ more ]  [ reply ]
OpenLinux: Linux NFS utils package contains remotely exploitable off-by-one bug 2003-11-17
security sco com

To: announce (at) lists.caldera (dot) com [email concealed] bugtraq (at) securityfocus (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenLinux: L

[ more ]  [ reply ]
(Page 1587 of 1748)  < Prev  1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus