|
Colapse all |
Post message
Tru64 and OpenVMS patch announcements change after next month 2003-09-25 Matt Power (mhpower bos bindview com) DCE 1.2.2c Denial of Service Vulnerability on IRIX 2003-09-26 SGI Security Coordinator (agent99 sgi com) [SECURITY] [DSA-390-1] New marbles packages fix buffer overflow 2003-09-26 Matt Zimmerman (mdz debian org) @Stake pulls pin on Geer: Effect on research and publication 2003-09-26 Patrick J. Kobly (patrick kobly com) CNET is reporting that @Stake fired Dan Geer yesterday: http://news.com.com/2100-1014_3-5082649.html Over a recent CCIA report coauthored by him, and released Wednesday: http://www.ccianet.org/papers/cyberinsecurity.pdf @Stake's comments - "The values and opinions of the report are not in line w [ more ] [ reply ] CyberInsecurity: The cost of Monopoly 2003-09-26 Jonathan A. Zdziarski (jonathan nuclearelephant com) (1 replies) This was released yesterday just incase nobody noticed. http://www.ccianet.org/papers/cyberinsecurity.pdf Among the authors are Bruce Schnier, Dan Geer, and Charles Pfleeger. Interesting read. [ more ] [ reply ] RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly 2003-09-26 Marc Maiffret (marc eeye com) (1 replies) RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly 2003-09-26 Richard M. Smith (rms computerbytesman com) SMC Router Denial of Service exploit 2003-09-26 res076cf alltel net Howdy, Tested on an SMC2404WBR - BarricadeT Turbo 11/22 Mbps Wireless Cable/DSL Broadband Router. Sending a stream of UDP random packets to multiple ports 0-65000 on the router will cause the router to freeze until a soft reset is performed on it. In one case, the router did survive but [ more ] [ reply ] RE: Sanctum AppScan 4 misses potential vulnerabilities in wrapped links 2003-09-26 Dawes, Rogan (ZA - Johannesburg) (rdawes deloitte co za) (1 replies) I am inclined to agree with Sanctum's position here. Without actually executing the javascript, and triggering all the possible events, and tracing the javascript (in a sandbox, maybe), it is pretty much impossible to identify the fact that the function called would result in a new URL to investigat [ more ] [ reply ] Re: Sanctum AppScan 4 misses potential vulnerabilities in wrapped links 2003-09-26 Valdis Kletnieks vt edu MPlayer Security Advisory #01: Remotely exploitable buffer overflow 2003-09-25 Gabucino (gabucino-NO-SPAM mplayerhq hu) Severity: HIGH (if playing ASX streaming content) LOW (if playing only normal files) Description: A remotely exploitable buffer overflow vulnerability was found in MPlayer. A malicious host can craft a harmful ASX header, and trick MPlayer into executing arbitrary code upon parsing that header. MP [ more ] [ reply ] Re: base64 2003-09-25 "Ilya Teterin" (alienhard mail ru) David Wilson: > So, there is ambiguity in RFC 2045, and this is the point of the > original post. Different people, and therefore different > implementations will have different interpretations. There is > therefore potential for a vulnerability when checks are > performed using one interpretation [ more ] [ reply ] Re: Ruh-Roh SOBIG.G? 2003-09-25 Joe Stewart (jstewart lurhq com) On Thursday 25 September 2003 03:18 am, Dragos Ruiu wrote: > Now I noted with concern this morning that I started getting more > wicked screensavers. :-) Analysis indicates that this new nuisance of > this the newly ressurected malware does not correspond with any of > the earlier variants. (the fil [ more ] [ reply ] RE: ICMP pokes holes in firewalls... 2003-09-25 Daniel Chemko (dchemko smgtec com) >NAT gateway has been >detected as a ignore-the-source UDP forwarder 2.4 kernels: NAT doesn't work without ip_conntrack, and ip_conntrack always keeps track of source IP addresses (hence its function). I can't think of a situation for any Linux machine which allows inbound UDP replies from other s [ more ] [ reply ] Re: Ruh-Roh SOBIG.G? 2003-09-25 Dragos Ruiu (dr kyx net) On September 25, 2003 08:48 am, Nick Fisher wrote: > As you point out above, one of the biggest problems with SoBig was the > bandwidth usage. As such wouldn't it be better to DISCARD the messages and > not REJECT them? SoBig spoofs return addresses, why do you have to clog my > mail server with bou [ more ] [ reply ] |
|
Privacy Statement |
distribution of various patches (including security-related patches)
for Tru64 UNIX and OpenVMS. As an example, a recent announcement had:
Date: Thu, 11 Sep 2003 22:30:02 -0600 (MDT)
To: "OpenVMS Patch Mailing List" <openvms (at) list (dot) sup [email concealed]
[ more ] [ reply ]