|
Colapse all |
Post message
Vulnerability Disclosure Formats (was "Re: Funny article") 2003-11-14 Steven M. Christey (coley mitre org) Re: Web Wiz Forums ver. 7.01 2003-11-14 bruce webwizguide info (1 replies) In-Reply-To: <6520144396.20031113223723 (at) hex.net (dot) ru [email concealed]> HEX has submitted incorrect information on Web Wiz Forums (again!!!). The values of the variables mentioned by HEX are filtered further on in the code. The file register_new_user.asp is not a file that exsits in Web Wiz Forums version 7.01 [ more ] [ reply ] RE: [Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data 2003-11-14 Schmehl, Paul L (pauls utdallas edu) (2 replies) > -----Original Message----- > From: full-disclosure-admin (at) lists.netsys (dot) com [email concealed] > [mailto:full-disclosure-admin (at) lists.netsys (dot) com [email concealed]] On Behalf Of > srenna (at) vdbmusic (dot) com [email concealed] > Sent: Friday, November 14, 2003 7:30 AM > To: Adam Laurie; Pentest Security Advisories; > bugtraq (at) securityfocus (dot) com [email concealed]; full-disclosure@l [ more ] [ reply ] Re: [Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data 2003-11-14 Kurt Seifried (listuser seifried org) Re: [Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data 2003-11-14 Nicholas Weaver (nweaver CS berkeley edu) Quagga remote vulnerability 2003-11-14 Paul Jakma (paul clubi ie) Summary: -------- All versions of Quagga (and also GNU Zebra, from which Quagga was forked) are vulnerable to a remotely triggerable denial of service. Scope of vulnerability: ----------------------- All versions of GNU Zebra and all versions of Quagga /prior/ to 0.96.4, where a daemon's vty, i [ more ] [ reply ] PHPlist, file injection vulnerability 2003-11-14 Michiel Dethmers (secfoc kipu co uk) PHPlist, http://www.phplist.com is a popular open source newsletter application written in PHP. Recently a file injection vulnerability has been discovered allowing remote attackers to issue arbitrary commands on the hosted machine, as the webserver user. The issue has been resolved in the late [ more ] [ reply ] Re: Funny article 2003-11-13 Steven M. Christey (coley mitre org) (1 replies) It would be very interesting to see any results that try to compare the timeliness of vendor response. I attemped to conduct such a study a year and a half ago, but the study failed due to lack of time and a lot of other factors such as: - the relatively small percentage of disclosure timelines [ more ] [ reply ] [RHSA-2003:325-01] Updated glibc packages provide security and bug fixes 2003-11-13 bugzilla redhat com RE: Secure Network Operations SRT2003-11-13-0218, PCAnywhere allows local users to become SYSTEM 2003-11-13 Sym Security (symsecurity symantec com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec Security Response Advisory 13 November 2003 Symantec pcAnywhere Service-Mode Help File Elevation of Privilege Risk Impact High (very dependent on product configuration and operating environment) Overview Security analysts from Secure Networ [ more ] [ reply ] Minor OpenSSH/pam vuln (non-exploitable) 2003-11-13 das decisionsoft com The home page of the one time password system (or otpw -- http://www.cl.cam.ac.uk/~mgk25/otpw.html) has info about how OpenSSH doesn't correctly return PAM_CONV_ERR when a user cancels a login (but instead incorrectly calls pam_end() having the side effect that memory is not correctly scrubbed (or [ more ] [ reply ] Webwasher Classic Error-Message XSS Vulnerability 2003-11-13 Oliver Karow (Oliver Karow gmx de) Webwasher Classic Error-Message XSS Vulnerability ================================================= Description =========== WebWasher Classic is vulnerable to a XSS attack. If a HTTP GET-Request, containing script code, is sent to the proxy port (default 8080/TCP), an error page is shown, which c [ more ] [ reply ] Web Wiz Forums ver. 7.01 2003-11-13 HEX (hex hex net ru) Informations : °°°°°°°°°°°° Language : ASP Bugged Version : Web Wiz Forums ver. 7.01 (and less ?) Website : http://www.webwizforums.com Problems : Permanent XSS Objects : °°°°°°° - register_new_user.asp - register.asp The values variable are not filtered: strLocation = Request.Form("location") s [ more ] [ reply ] [CLA-2003:784] Conectiva Security Announcement - postgresql 2003-11-13 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : postgresql SUMMARY : Buffer overflow vulnerab [ more ] [ reply ] terminatorX stack-based overflow (exploit) 2003-11-13 Li0n7 voila fr terminatorX Exploitable Stack-Based Overflow (load_tt_part()) ------------------------------------------------------------------------ SUMMARY There is a stack-based overflow which is likely to be exploited locally in order to cause the product to execute malicious code, allowing a [ more ] [ reply ] Corsaire Security Advisory: PeopleSoft Gateway Administration servlet path disclosure issue 2003-11-13 advisories (advisories corsaire com) -- Corsaire Security Advisory -- Title: PeopleSoft Gateway Administration servlet path disclosure issue Date: 04.07.03 Application: PeopleTools 8.20/8.43 and prior Environment: Various Author: Martin O'Neal [martin.oneal (at) corsaire (dot) com [email concealed]] Audience: General distribution Reference: c030704-003 -- Scop [ more ] [ reply ] MDKSA-2003:106 - Updated fileutils and coreutils packages fix vulnerabilities 2003-11-12 Mandrake Linux Security Team (security linux-mandrake com) Eudora 6.0.1 attachment spoof 2003-11-13 psz maths usyd edu au (Paul Szabo) Eudora 6.0.1 for Windows was released recently. The buffer overflow (and code execution) with long spoofed attachment names seems to be fixed; the spoofing itself is not, though it was known for years. Spoofing demo (essentially identical to 6.0 version) below. Cheers, Paul Szabo - psz (at) maths (dot) usyd [email concealed] [ more ] [ reply ] NSFOCUS SA2003-08: HP-UX libc NLSPATH Environment Variable Privilege Elevation Vulnerability 2003-11-13 NSFOCUS Security Team (security nsfocus com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 NSFOCUS Security Advisory(SA2003-08) Topic: HP-UX libc NLSPATH Environment Variable Privilege Elevation Vulnerability Release Date: 2003-11-13 CVE CAN ID: CAN-2003-0090 http://www.nsfocus.com/english/homepage/research/0308.htm Affected system: ==== [ more ] [ reply ] [RHSA-2003:307-01] Updated zebra packages fix security vulnerabilities 2003-11-13 bugzilla redhat com |
|
Privacy Statement |
Systems Administrator <sysadmin (at) sunet.com (dot) au [email concealed]> said:
> Quick question: would it make sense to have somewhere:
>
>- A common (computer/human readable) format for vulnerability
> disclosures
>- A common format for bugfix publications
There are a couple proposals out there, but I don't think they've
[ more ] [ reply ]