|
Colapse all |
Post message
UnixWare 7.1.3 Open UNIX 8.0.0 UnixWare 7.1.1 : Insecure handling of procfs descriptors in UnixWare can lead to local privilege escalation. 2003-11-12 security sco com Gamespy uses DMCA to destroy bug research and full disclosure 2003-11-12 Luigi Auriemma (aluigi altervista org) Just today (12 Nov 2003) opening my mailbox I have found a mail of about 1 megabyte and half and fortunally for the sender I don't use filters. The mail has been sent by the Gamespy's lawyers asking me to remove my bug research stuff from my site. The stuff is composed by my proof-of-concepts and [ more ] [ reply ] Proof of concept for Windows Workstation Service overflow 2003-11-12 "Hanabishi Recca" (recca mail ru) C:\telnet 192.168.175.3 5555 Microsoft Windows 2000 [Version 5.00.2195] (C) Copyright 1985-2000 Microsoft Corp. C:\WINNT\system32> -- /* Proof of concept for MS03-049. This code was tested on a Win2K SP4 with FAT32 file system, and is supposed to work *only* with that (it will probably crash [ more ] [ reply ] Re: Six Step IE Remote Compromise Cache Attack 2003-11-11 Goetz Babin-Ebell (babin-ebell trustcenter de) Hello Alun, Alun Jones wrote: >>-----Original Message----- >>From: Goetz Babin-Ebell [mailto:babin-ebell (at) trustcenter (dot) de [email concealed]] >>Sent: Monday, November 10, 2003 11:25 AM >> >>But wrongly rejecting good input has no security implications. >>But wrongly accepting bad input has. > > Coding to satisfy only [ more ] [ reply ] [OpenPKG-SA-2003.048] OpenPKG Security Advisory (postgresql) 2003-11-11 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] EEYE: Windows Workstation Service Remote Buffer Overflow 2003-11-11 Derek Soeder (dsoeder eeye com) Windows Workstation Service Remote Buffer Overflow Release Date: November 11, 2003 Date Reported: September 15, 2003 Severity: High (Remote Code Execution) Systems Affected: Windows 2000 Windows XP Description: eEye Digital Security has discovered a remote buffer overflow in the Windows Worksta [ more ] [ reply ] RE: Six Step IE Remote Compromise Cache Attack 2003-11-11 Michael Wojcik (Michael Wojcik microfocus com) > From: Alun Jones [mailto:alun (at) texis (dot) com [email concealed]] > Sent: Tuesday, November 11, 2003 12:13 PM > > From: Goetz Babin-Ebell [mailto:babin-ebell (at) trustcenter (dot) de [email concealed]] > > Sent: Monday, November 10, 2003 11:25 AM > > > > But wrongly rejecting good input has no security implications. > > But wrongly accepting bad [ more ] [ reply ] HylaFAX - Format String Vulnerability Fixed 2003-11-11 Lee Howard (lee howard hylafax org) HylaFAX Security Advisory 11 November 2003 Subject: Format String Vulnerability Fixed Introduction: HylaFAX is a mature (est. 1991) enterprise-class open source software package for sending and receiving facsimiles as well as for sending alpha-numeric pages. It runs on a wide variety of UNIX- [ more ] [ reply ] DoS in PureFTPd - continue. 2003-11-11 Adam Zabrocki (pi3ki31ny wp pl) DoS in PureFTPd - continue. After carefully read the source PureFTPd and talk with autor PureFTPd i must apologize for false alarm about DoS in PureFTPd, becouse the messy code will never be executed. Looked once more for source - function displayrate(): "in file src/ftpd.c" static voi [ more ] [ reply ] MDKSA-2003:105 - Updated hylafax packages fix remote root vulnerability 2003-11-11 Mandrake Linux Security Team (security linux-mandrake com) [SECURITY] [DSA 400-1] New omega-rpg packages fix local games exploit 2003-11-11 joey infodrom org (Martin Schulze) Re: Fw: sql injection in phpbb 2003-11-10 Micheal Cottingham (micheal michealcottingham com) What's more, as is in the linked topic, is that there is no 2.0.7 >----- Original Message ----- >From: "Marius Kaase" <marius (at) kaase (dot) net [email concealed]> >To: "jocanor jocanor" <jocanor2002 (at) hotmail (dot) com [email concealed]> >Cc: <bugtraq (at) securityfocus (dot) com [email concealed]> >Sent: Saturday, November 08, 2003 2:39 PM >Subject: Re: sql injection in phpbb [ more ] [ reply ] buffer overflow in unace (linux extractor for .ace files) 2003-11-09 Andreas Constantinides (MegaHz) (megahz megahz org) Gaim IRC Local Account Information Leakage 2003-11-09 'ken'@FTU (ken ftusecurity com) When logging into IRC via gaim, gaim registers the user with their valid local account id as well as the nick chosen by the end user. This is revealed when an attacker asks for information regarding the victim. Given that the host name (DNS/IP) is also registered, an attacker now knows both the loc [ more ] [ reply ] RE: POS#1 Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part III 2003-11-10 Evans, Arian (Arian Evans fishnetsecurity com) >On a related topic, > >Does anyone have a method to programatically (perhaps using registry >entries) change security settings in Internet Explorer for a >specific zone. >For example, if I wanted to disable active scripting for the >Internet Zone >for 1000 end users by pushing a script, reg entry [ more ] [ reply ] Re: Six Step IE Remote Compromise Cache Attack 2003-11-10 Steven M. Christey (coley mitre org) "Goetz Babin-Ebell" <babin-ebell (at) trustcenter (dot) de [email concealed]> said: >> We need a little bit more than that, because our understanding of >> "what's bad" increases with time, and that frequently reduces the set >> of "what's good." > >Yes. >But wrongly rejecting good input has no security implications. Actuall [ more ] [ reply ] Re: sql injection in phpbb 2003-11-10 telli codezwiz com (2 replies) In-Reply-To: <3FAD4685.2040907 (at) kaase (dot) net [email concealed]> >Received: (qmail 32171 invoked from network); 8 Nov 2003 21:06:28 -0000 >Received: from outgoing3.securityfocus.com (205.206.231.27) > by mail.securityfocus.com with SMTP; 8 Nov 2003 21:06:28 -0000 >Received: from lists2.securityfocus.com (lists2.secur [ more ] [ reply ] Symbol Technologies Default WEP KEYS Vulnerability 2003-11-10 Michael Scheidell (scheidell secnap net) Symbol Technologies Default WEP KEYS Vulnerability Systems: Symbol Technologies PDT 8100 Severity: Medium Category: Default password storage and access Classification: Installation problem BugTraq-ID: TBA CVE-ID: CAN-2003-0934 SymbolTech-ID: 620646 Local Exploit: yes Vendor URL: http://www.symbol. [ more ] [ reply ] RE: POS#1 Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part III 2003-11-10 Robert C. Auch (RAuch totalnetsolutions net) From: "Cowperthwaite, Eric" <eric.cowperthwaite (at) eds (dot) com [email concealed]> > On a related topic, > > Does anyone have a method to programatically (perhaps using registry > entries) change security settings in Internet Explorer for a specific zone. > For example, if I wanted to disable active scripting for the Intern [ more ] [ reply ] A resource for the Fake players bug 2003-11-10 Luigi Auriemma (aluigi altervista org) I want to signal an interesting type of problem that affects almost all the videogames with multiplayer support and moreover a resource where finding informations and proof-of-concepts for games and game's engines. I already managed this problem in the past (over one year ago) with Half-Life and t [ more ] [ reply ] [SNS Advisory No.69] Eudora "Reply-To-All" Buffer Overflow Vulnerability 2003-11-10 Secure Net Service(SNS) Security Advisory (snsadv lac co jp) ---------------------------------------------------------------------- SNS Advisory No.69 Eudora "Reply-To-All" Buffer Overflow Vulnerability Problem first discovered on: Thu, 09 Jan 2003 Published on: Mon, 10 Nov 2003 ---------------------------------------------------------------------- Overview [ more ] [ reply ] |
|
Privacy Statement |
To: announce (at) lists.sco (dot) com [email concealed] bugtraq (at) securityfocus (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
________________________________________________________________________
______
SCO Security Advisory
Subject: UnixWare 7.1.3 Open UNIX 8.0.0 UnixWare 7.1.1 :
[ more ] [ reply ]