|
Colapse all |
Post message
Local stackbased overflow found for silly Poker v0.25.5 (advisory + poc exploit) 2003-09-30 demz (demz c-code net) Multiple OpenSSH/OpenSSL Vulnerabilities on IRIX 2003-09-30 SGI Security Coordinator (agent99 sgi com) [ESA-20030930-027] OpenSSL ASN.1 parsing vulnerabilities. 2003-09-30 EnGarde Secure Linux (security guardiandigital com) Immunix Secured OS 7+ OpenSSL update 2003-09-30 Immunix Security Team (security immunix com) ----------------------------------------------------------------------- Immunix Secured OS Security Advisory Packages updated: openssl Affected products: Immunix OS 7+ Bugs fixed: CAN-2003-0543 CAN-2003-0544 Date: Mon Sep 29 2003 Advisory ID: IMNX-2003-7+-022-01 Author: Seth Arnold <sarnold@ [ more ] [ reply ] CERT Advisory Notice: Clarifications regarding recent vulnerabilities in OpenSSH 2003-09-29 CERT Advisory (cert-advisory cert org) -----BEGIN PGP SIGNED MESSAGE----- CERT Advisory Notice: Clarifications regarding recent vulnerabilities in OpenSSH The CERT/CC has received queries regarding several recent OpenSSH vulnerabilities. We are sending this message to help ensure that administrators have not overlooked one or more of [ more ] [ reply ] Gamespy3d <= 263015 lets code execution through long IRC answer 2003-09-30 Luigi Auriemma (aluigi altervista org) Subject: [OpenPKG-SA-2003.044] OpenPKG Security Advisory (openssl) 2003-09-30 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] Re: SMC Router Denial of Service exploit 2003-09-29 Claus A (bugtraq-me gmx net) (1 replies) Hi > Tested on an SMC2404WBR - BarricadeT Turbo 11/22 Mbps Wireless Cable/DSL > Broadband Router. I ve just tested this code against my SMC 2404WBR. Firmware Version 1.0.10. But it didnt work. I saw a lot of UDP & ICMP on the air, but I could access the AP all the time. Slower as normal but there [ more ] [ reply ] [ANNOUNCE] kses 0.2.1 2003-09-29 Härnhammar, Ulf (Ulf Harnhammar 9485 student uu se) kses 0.2.1 ========== kses is an HTML/XHTML filter written in PHP. It removes all unwanted HTML elements and attributes, no matter how malformed HTML input you give it. It also does several checks on attribute values. kses can be used to avoid Cross-Site Scripting (XSS), Buffer Overflows and Denia [ more ] [ reply ] Re: Geeklog Multiple Versions Vulnerabilities 2003-09-29 Chris Kulish us ing com I would like to note that this disclosure was released with NO attempt made to contact the Authors before hand. ----- Chris Kulish Systems Engineer ING Advisors Network chris.kulish (at) us.ing (dot) com [email concealed] Ph. 515.698.7583 Fx. 515.698.3583 "There's more to living than only surviving" "Maybe I'm not there, but [ more ] [ reply ] [CLA-2003:750] Conectiva Security Announcement - proftpd 2003-09-29 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : proftpd SUMMARY : Remote vulnerability DATE [ more ] [ reply ] Re: Geeklog Multiple Versions Vulnerabilities 2003-09-28 Lorenzo Hernandez Garcia-Hierro (novappc novappc com) cfengine2-2.0.3 remote exploit for redhat 2003-09-28 yan feng (jsk ph4nt0m net) (1 replies) /*********************************************************************** ********** * jsk / cfengine2-2.0.3 from redhat * advisory: http://packetstormsecurity.nl/0309-advisories/cfengine.txt * forking portbind shellcode 0port=26112) by netric * bug discovered by nick cleaton, tested on [ more ] [ reply ] Re: cfengine2-2.0.3 remote exploit for redhat 2003-09-29 Stephen Smoogen (smoogen lanl gov) (1 replies) Re: cfengine2-2.0.3 remote exploit for redhat 2003-09-29 Keith Matthews (keith_m sweeney demon co uk) ECHU.ORG Alert #4: GuppY makes XSS attacks easy 2003-09-29 David Suzanne (das echu org) -------------------------------- | GuppY makes XSS attacks easy | -------------------------------- PROGRAM: GuppY VULNERABLE VERSIONS: All versions under 2.4p1 IMMUNE VERSIONS: 2.4p1 SEVERITY: high Tested version ============== GuppY 2.4 on the official GuppY website. Description ============ [ more ] [ reply ] [SECURITY] [DSA-392-1] New webfs packages fix buffer overflows, file and directory exposure 2003-09-29 Matt Zimmerman (mdz debian org) [RELEASE] GenXE - Generate Xss Exploit 2003-09-29 Liu Die Yu (liudieyuinchina yahoo com cn) [RELEASE] GenXE - Generate Xss Exploit InfoCard ======== website : genxe.sourceforge.net OR genxe.sf.net digest : Generate (complex) Xss Exploit (Automatically) version : 0.9.0 platform: MOZILLA,MSIE or NETSCAPE NAVIGATOR What's Good of GenXE ==================== after finding some c [ more ] [ reply ] [Full-Disclosure] [SECURITY] [DSA-391-1] New freesweep packages fix buffer overflow 2003-09-28 debian-security-announce lists debian org Shattering SEH III 2003-09-29 Brett Moore (brett moore security-assessment com) ======================================================================== ==== = Shattering SEH III = = brett.moore (at) security-assessment (dot) com [email concealed] = http://www.security-assessment.com = = Originally posted: September 29, 2003 ======================================================================== ==== == Ba [ more ] [ reply ] Re: Packetstorm started a try2crack of A.R.C.S. Algorithm 2003-09-26 markus-1977 gmx net Hi! The code contains a bug (ARCS.c, line 88) where the MD5 of the password is strcpyed into another buffer. Since the MD5-hash can contain a '\x0' byte the copying might abort too early. This can make decryption realy interesting if you are using two different compilers that might or might not init [ more ] [ reply ] |
|
Privacy Statement |
silly Poker contains an $HOME environment variable stack overflow,
this can be exploited very simple to execute arbitrary code with gid=games
privileges.
demz
demz (at) c-code (dot) net [email concealed]
[ more ] [ reply ]