|
Colapse all |
Post message
IE bug: loading HTML under a graphic file name - summary 2003-10-31 Gadi Evron (ge egotistical reprehensible net) Multiple Vulnerabilities in Led-Forums 2003-10-30 ProXy - (proxy excluded org) Product: Led-Forums Versions: Beta 1 Vulnerability: XSS- and redirection-Bug Date: October 30, 2003 Discovered by: ProXy <proxy (at) excluded (dot) org [email concealed]> 1. - XSS-Bug The Welcome-Message of the Led-Forums software could be changed by everybody. Normal Text, HTML and Javascript it's all allow [ more ] [ reply ] [OpenPKG-SA-2003.047] OpenPKG Security Advisory (postgresql) 2003-10-30 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] Re: Internet Explorer and Opera local zone restriction bypass 2003-10-30 william schulze (was macromedia com) In-Reply-To: <20031024135303.26267.qmail (at) linuxmail (dot) org [email concealed]> All: Macromedia is dedicated to protecting the security of our customers, and we are taking steps to resolve this issue. To summarize, the Flash Player stores cookies in a somewhat predictable location (assuming the username can be gues [ more ] [ reply ] Re: FirstClass 7.1 HTTP Server: Remote Directory Listing 2003-10-30 Graham Morley (GMorley_Public firstclass com) In-Reply-To: <fc.00802e600021e6b400802e600021e6b4.21e717 (at) rbwm (dot) org [email concealed]> >FirstClass 7.1 HTTP Server allow the listing of all files under the web >root directory and user web directories. While this statement is correct, it is not a bug, but rather a misunderstanding/misconfiguration of the FirstClas [ more ] [ reply ] Re: Mac OS X vulnerabilities 2003-10-30 James Kelly (macubergeek comcast net) This vulnerability is much ado about nothing It was caused by developers of shareware using third party installers which changed the permissions on certain directories of MacOS X. Problem largely solved with the increased use of Apple's installer AND problem is easily fixed by adding this comman [ more ] [ reply ] Immunix Secured OS 7+ apache update 2003-10-29 Immunix Security Team (security immunix com) [Please do not use vacation(1), procmail(1), or "Out of Office Autoreply" features on public mail lists. Thanks.] ----------------------------------------------------------------------- Immunix Secured OS Security Advisory Packages updated: apache Affected products: Immunix OS 7+ Bugs fixed: CAN [ more ] [ reply ] E107 DoS vulnerability 2003-10-29 Blademaster (blademaster msbx net) Program: E107 (www.e107.org) Versions: 0.545 & 0.603 tested, below may also be vulnerable Synopsis: Tagboard Denial of Service vulnerability (system wide) Security Risk: Medium (It's a system wide DoS) Author: Blademaster (nielserman (at) hotmail (dot) com [email concealed]) (www.hackingheaven.com) URL: http://www.hackingheaven [ more ] [ reply ] Re: Mac OS X vulnerabilities ['Virus checked"] 2003-10-29 Chris Wysopal (cwysopal atstake com) In-Reply-To: <20031029180349.GA85446 (at) lightship.internal.homeport (dot) org [email concealed]> @stake's policy has been the same since June, 2002 which was its last revision. Our policy is in line with the OIS guidelines. Assuming Mac OS X 10.2 is supported, Apple is not following the OIS guidelines which require a ven [ more ] [ reply ] [CLA-2003:773] Conectiva Security Announcement - libnids 2003-10-29 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : libnids SUMMARY : Remotely exploitable buffer [ more ] [ reply ] RE: Mac OS X vulnerabilities ['Virus checked"] 2003-10-29 graham coles retail-logic com (1 replies) Thor, Sorry, I hadn't read the vendor response section of the advisories fully, I'd rather assumed they would be issuing a security update for 10.2 as per usual. I'd have to agree it's a pretty poor showing from Apple if the only fix is to buy the next version of the operating system. I believe M [ more ] [ reply ] Re: Mac OS X vulnerabilities ['Virus checked"] 2003-10-29 Steve Clement (steve ion lu) (1 replies) Re: Mac OS X vulnerabilities ['Virus checked"] 2003-10-29 Adam Shostack (adam homeport org) (1 replies) Re: Mac OS X vulnerabilities ['Virus checked"] 2003-10-29 Ragnar Sundblad (ragge nada kth se) (1 replies) RE: Mac OS X vulnerabilities ['Virus checked"] 2003-10-29 Thor Larholm (thor pivx com) Graham, Thank you for the feedback. I can't locate any new patches or updates through the software update tool on our 10.2 systems, and Apples security site (which I now received the URL to) mentions nothing about these security updates for OS X 10.2 The only way for any Mac OS X 10.2 us [ more ] [ reply ] Re: Mac OS X vulnerabilities ['Virus checked"] 2003-10-29 graham coles retail-logic com I usually download main updates (10.2.8) and security patches from http://www.apple.com/downloads/macosx/apple There's also an automated update from within OS X which will check for and install patches automatically. These are non-chargeable updates, I believe the price you quote is for a single [ more ] [ reply ] TelCondex SimpleWebserver Buffer Overflow 2003-10-29 Oliver Karow (Oliver Karow gmx de) TelCondex SimpleWebserver Buffer Overflow ========================================= The TelCondex SimpleWebserver 2.12.30210 Build 3285 is vulnerable to a remote executable buffer overflow, due to missing length check on the referer-variable of the HTTP-header. It is possible to overwrite the st [ more ] [ reply ] [SECURITY] [DSA 396-1] New thttpd packages fix information leak, DoS and arbitrary code execution 2003-10-29 joey infodrom org (Martin Schulze) possible issue with IPv4 mapped address and $REMOTE_ADDR in CGI 2003-10-29 itojun iijlab net (1 replies) because of the difference in http server in handling IPv4 mapped address (IPv4 traffic goes into the system into AF_INET6 socket), the peer's address passed by $REMOTE_ADDR to CGI script can vary between the http server. some http server would pass IPv4 mapped address as is (::ffff:10.1.1.1), [ more ] [ reply ] Re: possible issue with IPv4 mapped address and $REMOTE_ADDR in CGI 2003-10-29 Colm MacCarthaigh (colmmacc redbrick dcu ie) (1 replies) Re: possible issue with IPv4 mapped address and $REMOTE_ADDR in CGI 2003-10-29 der Mouse (mouse Rodents Montreal QC CA) (1 replies) Re: possible issue with IPv4 mapped address and $REMOTE_ADDR in CGI 2003-10-29 Colm MacCarthaigh (colmmacc redbrick dcu ie) STG Security Advisory: [SSA-20031025-05] InfronTech WebTide 7.04 Directory and File Disclosure Vulnerability 2003-10-29 advisory stgsecurity com STG Security Advisory: [SSA-20031025-05] InfronTech WebTide 7.04 Directory and File Disclosure Vulnerability Revision 1.0 Date Published: 2003-10-25 (KST) Last Update: 2003-10-25 Disclosed by SSR Team (advisory (at) stgsecurity (dot) com [email concealed]) Abstract ======== InfronTech's J2EE Web Application Server [ more ] [ reply ] Re: Internet Explorer and Opera local zone restriction bypass 2003-10-28 Bipin Gautam hUNT3R (door_hunt3r blackcodemail com) In-Reply-To: <20031025100233.6289.qmail (at) linuxmail (dot) org [email concealed]> try this ... its dam strange to see WINXP LOGOFF WITHOUT ASKING MY PERMISSION file://c:\windows\system32\logoff.exe -------------------- >Received: (qmail 3472 invoked from network); 27 Oct 2003 15:55:23 -0000 >Received: from outgo [ more ] [ reply ] |
|
Privacy Statement |
the new trojan horse exploiting this "bug" to load itself, and then
execute javascript code with one of the latest IE exploits allowing it
to over-write files.
Some guesses have been made, and although it is true that if the fil
[ more ] [ reply ]