BugTraq Mode:
(Page 1613 of 1748)  < Prev  1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618  Next >
LSH: Buffer overrun and remote root compromise in lshd 2003-09-20
nisse lysator liu se (Niels Möller)
The Analysis of RPC Long Filename Heap Overflow AND a Way to Write Universal Heap Overflow of Windows 2003-09-20
flashsky fangxing (flashsky xfocus org)


The Analysis of RPC Long Filename Heap Overflow AND a Way to Write Universal Heap Overflow of Windows

Author:FLASHSKY

SITE:WWW.XFOCUS.NET,WWW.VENUSTECH.COM.CN WWW.SHOPSKY.COM

email:flashsky (at) xfocus (dot) org [email concealed]

Venus Active Defence Research Center

Thanks:

ey

[ more ]  [ reply ]
[SECURITY] [DSA-388-1] New kdebase packages fix multiple vulnerabilites in KDM 2003-09-20
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 388-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 19th, 2003

[ more ]  [ reply ]
Vulnrability in myPHPnuke 1.8.8 2003-09-20
Lifo Fifo (lifofifo20 yahoo com)


Language : PHP

Script : http://www.myphpnuke.com 1.8.8

Problem : SQL Injection

Description : myphpnuke is a widely used Content Managemnt System.

Problem :

In auth.inc.php file,

*********************

if ((isset($aid)) && (isset($pwd)) && ($op == "login")) {

if($aid!="" AND $pwd!="")

[ more ]  [ reply ]
Admin Access Vulnerability in Community Wizard 2003-09-19
Bahaa Naamneh (b_naamneh hotmail com)


Admin Access Vulnerability in Community Wizard

Affected Systems: Community Wizard

version: 5.1 (and possibly earlier versions)

Vendor: http://www.sepcity.com , http://www.commwiz.com

Issue: gain admin access

Released: 18 September 2003

Introduction:

=============

"Community

[ more ]  [ reply ]
[Advisory] Powerslave 4.3 Information Leak Vuln. 2003-09-19
Enrico Kern (phantom h07 org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=========================================================
H Zero Seven Security Advisory

Product : FlyingDog Software - Powerslave Portalmanager
Impact : information leak vulnerability
Issue date: 19 Sept. 2003
Update : Powerslave 4.4.3

[ more ]  [ reply ]
[CLA-2003:747] Conectiva Security Announcement - kde 2003-09-19
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : kde
SUMMARY : Several vulnerabilities (kdm, k

[ more ]  [ reply ]
MDKSA-2003:094 - Updated MySQL packages fix buffer overflow vulnerability 2003-09-19
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: MySQL
Advisory ID:

[ more ]  [ reply ]
MDKSA-2003:093 - Updated gtkhtml packages fix vulnerability 2003-09-19
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: gtkhtml
Advisory ID:

[ more ]  [ reply ]
[CLA-2003:743] Conectiva Security Announcement - MySQL 2003-09-18
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : MySQL
SUMMARY : Several Vulnerabilities
DATE

[ more ]  [ reply ]
Knox Arkeia Pro v5.1.12 remote root exploit 2003-09-18
A. C. (bugtraq_vuln yahoo com)
Exploit attached for Knox Arkeia Pro v5.1.12 backup
software from http://www.arkeia.com.

/*
* Knox Arkiea arkiead local/remote root exploit.
*
* Portbind 5074 shellcode
*
* Tested on Redhat 8.0, Redhat 7.2, but all versions
are presumed vulnerable.
*
* NULLs out least significant byte

[ more ]  [ reply ]
[SECURITY] [DSA-386-1] New libmailtools-perl packages fix input validation bug 2003-09-19
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 386-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 18th, 2003

[ more ]  [ reply ]
[SECURITY] [DSA-387-1] New gopher packages fix buffer overflows 2003-09-19
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 387-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 18th, 2003

[ more ]  [ reply ]
AppSecInc Security Alert: Denial of Service Vulnerability in DB2 Discovery Service 2003-09-19
Aaron C. Newman (aaron newman-family com)
Denial of Service Vulnerability in DB2 Discovery Service

To determine if you should apply this patch, download AppDetective for
DB2 from http://www.appsecinc.com/products/appdetective/db2/

Risk level: Low

Summary:

IBM DB2 provides a UDP service used as a discovery service for locating
DB2 databa

[ more ]  [ reply ]
[SECURITY] [DSA-385-1] New hztty packages fix buffer overflows 2003-09-18
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 385-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 18th, 2003

[ more ]  [ reply ]
Mambo 4.0.14 Stable Bugs 2003-09-19
Lifo Fifo (lifofifo20 yahoo com)


Product : Mambo 4.0.14 Stable

Website : http://www.mamboserver.com/

Status : Vendor notified via email

Imapct : Search for "Mambo Open Source is Free Software released under

the GNU/GPL License." (with quotes) returned more than 500 results.

Credit : lifofifo

First of all, you will get a

[ more ]  [ reply ]
uninitialized buffer in midnight commander 2003-09-19
"Ilya Teterin" (alienhard mail ru)
Midnight Commander is using uninitialized buffer for handling symlinks in VFS (tar, cpio). See vfs/direntry.c, handling of buf[] at vfs_s_resolve_symlink(). I wonder but it works almost properly ;-)

On linux-i386 I can reach stack buffer overflow using specially crafted archive. Open http://buggzy.

[ more ]  [ reply ]
Wave of fake Official Microsoft Advisory 2003-09-19
Bruno Clermont (bruno gnome ca) (1 replies)
Since this morning I start seeing tons of fake Microsoft Advisories by
mail. They contain a .exe attachment.

Running strings(1) on the file show it contain it's own HTML mail source
(and other version of the advisory), and many of the stuff it try to do:

- Increment a web counter "GET
http://ww2.f

[ more ]  [ reply ]
RE: Wave of fake Official Microsoft Advisory 2003-09-19
Lee Evans (lee vital co uk)
Remote root vuln in lsh 1.4.x 2003-09-19
Haggis (haggis learningshophull co uk)

After reading about a theoretical remote hole in OpenSSH and many detractors
smugly saying that they weren't vulnerable because they run LSH (a free
alternative), I'd like to present a working remote root exploit against LSH
version 1.4.x.

Enjoy.

[ more ]  [ reply ]
[OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail) 2003-09-19
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
[ESA-20030918-025] 'MySQL' buffer overflow. 2003-09-18
EnGarde Secure Linux (security guardiandigital com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+-----------------------------------------------------------------------
-+
| Guardian Digital Security Advisory September 18, 2003 |
| http://www.guardiandigital.com ESA-20030918-025 |
|

[ more ]  [ reply ]
SuSE Security Announcement: openssh (second release) (SuSE-SA:2003:039) 2003-09-18
Roman Drahtmueller (draht suse de)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SuSE Security Announcement

Package: openssh (second release)
Announcement-ID: SuSE-SA:2003:039
Date:

[ more ]  [ reply ]
Web counter in the new Swen/Gibe.F worm 2003-09-18
Richard M. Smith (rms computerbytesman com)
Hi,

Joe Stewart of Lurhq.com has made an interesting discovery about the new
Swen/Gibe.F worm that started circulating today: When the worm infects
a new machine, it hits a Web counter.

The URL of the counter is:

http://ww2.fce.vutbr.cz/bin/counter.gif/link=bacillus&width=6&set=cnt006

If th

[ more ]  [ reply ]
Several Mambo 4.0.14 Stable Exploits 2003-09-18
Lifo Fifo (lifofifo20 yahoo com)


Product : Mambo 4.0.14 Stable

Website : http://www.mamboserver.com/

Status : Vendor notified via email

Imapct : Search for "Mambo Open Source is Free Software released under the GNU/GPL License." (with quotes) returned more than 500 results.

Credit : lifofifo, hackingzone.org

Originally poste

[ more ]  [ reply ]
NetBSD Security Advisory 2003-012: Out of bounds memset(0) in sshd 2003-09-18
NetBSD Security Officer (security-officer NetBSD org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2003-012
=================================

Topic: Out of bounds memset(0) in sshd

Version: NetBSD-current: source prior to September 17, 2003
NetBSD 1.6.1: affected
NetBSD 1.6: affected
NetBSD-1.5.3: affected
NetBSD-1.5.

[ more ]  [ reply ]
NetBSD Security Advisory 2003-013: Kernel memory disclosure via ibcs2 2003-09-18
NetBSD Security Officer (security-officer NetBSD org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2003-013
=================================

Topic: Kernel memory disclosure via ibcs2

Version: NetBSD-current: source prior to August 7, 2002
NetBSD 1.6.1: not affected
NetBSD 1.6: not affected
NetBSD-1.5.3: affected
NetB

[ more ]  [ reply ]
NetBSD Security Advisory 2003-014: Insufficient argument checking in sysctl(2) 2003-09-18
NetBSD Security Officer (security-officer NetBSD org)


-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2003-014
=================================

Topic: Insufficient argument checking in sysctl(2)

Version: NetBSD-current: source prior to August 25, 2003
NetBSD 1.6.1: affected
NetBSD 1.6: affected
NetBSD-1.5.3: affected
N

[ more ]  [ reply ]
(Page 1613 of 1748)  < Prev  1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus