BugTraq Mode:
(Page 1608 of 1748)  < Prev  1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613  Next >
Tru64 and OpenVMS patch announcements change after next month 2003-09-25
Matt Power (mhpower bos bindview com)
An October 31 change will apparently affect announcements and
distribution of various patches (including security-related patches)
for Tru64 UNIX and OpenVMS. As an example, a recent announcement had:

Date: Thu, 11 Sep 2003 22:30:02 -0600 (MDT)
To: "OpenVMS Patch Mailing List" <openvms (at) list (dot) sup [email concealed]

[ more ]  [ reply ]
DCE 1.2.2c Denial of Service Vulnerability on IRIX 2003-09-26
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : DCE 1.2.2c Denial of Service Vulnerability
Number : 20030902-01-P
Date : September, 26 2003
Reference : CVE

[ more ]  [ reply ]
[SECURITY] [DSA-390-1] New marbles packages fix buffer overflow 2003-09-26
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 390-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 26th, 2003

[ more ]  [ reply ]
@Stake pulls pin on Geer: Effect on research and publication 2003-09-26
Patrick J. Kobly (patrick kobly com)
CNET is reporting that @Stake fired Dan Geer yesterday:

http://news.com.com/2100-1014_3-5082649.html

Over a recent CCIA report coauthored by him, and released Wednesday:

http://www.ccianet.org/papers/cyberinsecurity.pdf

@Stake's comments - "The values and opinions of the report are not in
line w

[ more ]  [ reply ]
CyberInsecurity: The cost of Monopoly 2003-09-26
Jonathan A. Zdziarski (jonathan nuclearelephant com) (1 replies)
This was released yesterday just incase nobody noticed.
http://www.ccianet.org/papers/cyberinsecurity.pdf

Among the authors are Bruce Schnier, Dan Geer, and Charles Pfleeger.
Interesting read.

[ more ]  [ reply ]
RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly 2003-09-26
Marc Maiffret (marc eeye com) (1 replies)
RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly 2003-09-26
Richard M. Smith (rms computerbytesman com)
SMC Router Denial of Service exploit 2003-09-26
res076cf alltel net


Howdy,

Tested on an SMC2404WBR - BarricadeT Turbo 11/22 Mbps Wireless Cable/DSL

Broadband Router.

Sending a stream of UDP random packets to multiple ports 0-65000 on the

router will cause the router to freeze until a soft reset is performed on

it. In one case, the router did survive but

[ more ]  [ reply ]
RE: Sanctum AppScan 4 misses potential vulnerabilities in wrapped links 2003-09-26
Dawes, Rogan (ZA - Johannesburg) (rdawes deloitte co za) (1 replies)
I am inclined to agree with Sanctum's position here. Without actually
executing the javascript, and triggering all the possible events, and
tracing the javascript (in a sandbox, maybe), it is pretty much impossible
to identify the fact that the function called would result in a new URL to
investigat

[ more ]  [ reply ]
MPlayer Security Advisory #01: Remotely exploitable buffer overflow 2003-09-25
Gabucino (gabucino-NO-SPAM mplayerhq hu)
Severity:
HIGH (if playing ASX streaming content)
LOW (if playing only normal files)

Description:
A remotely exploitable buffer overflow vulnerability was found in MPlayer.
A malicious host can craft a harmful ASX header, and trick MPlayer into
executing arbitrary code upon parsing that header.

MP

[ more ]  [ reply ]
Re: base64 2003-09-25
"Ilya Teterin" (alienhard mail ru)
David Wilson:

> So, there is ambiguity in RFC 2045, and this is the point of the
> original post. Different people, and therefore different
> implementations will have different interpretations. There is
> therefore potential for a vulnerability when checks are
> performed using one interpretation

[ more ]  [ reply ]
Re: Ruh-Roh SOBIG.G? 2003-09-25
Joe Stewart (jstewart lurhq com)
On Thursday 25 September 2003 03:18 am, Dragos Ruiu wrote:
> Now I noted with concern this morning that I started getting more
> wicked screensavers. :-) Analysis indicates that this new nuisance of
> this the newly ressurected malware does not correspond with any of
> the earlier variants. (the fil

[ more ]  [ reply ]
RE: ICMP pokes holes in firewalls... 2003-09-25
Daniel Chemko (dchemko smgtec com)
>NAT gateway has been
>detected as a ignore-the-source UDP forwarder

2.4 kernels: NAT doesn't work without ip_conntrack, and ip_conntrack
always keeps track of source IP addresses (hence its function). I can't
think of a situation for any Linux machine which allows inbound UDP
replies from other s

[ more ]  [ reply ]
[eft] Remote atphttpd 0.4b <= exploit 2003-09-25
r-code (d_fence gmx net)
Atphttpd <=0.4b exploit attached..
--
[mail: d_fence(at)gmx(dot)net][GPG: 0x4470D90B][bash~# ;-]
[GPG FGPRINT: B681 14F3 8716 CBBA 32A6 3AE5 9E2C 8CCE 4470 D90B]

[ more ]  [ reply ]
Re: Ruh-Roh SOBIG.G? 2003-09-25
Dragos Ruiu (dr kyx net)
On September 25, 2003 08:48 am, Nick Fisher wrote:
> As you point out above, one of the biggest problems with SoBig was the
> bandwidth usage. As such wouldn't it be better to DISCARD the messages and
> not REJECT them? SoBig spoofs return addresses, why do you have to clog my
> mail server with bou

[ more ]  [ reply ]
(Page 1608 of 1748)  < Prev  1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus