BugTraq Mode:
(Page 1614 of 1748)  < Prev  1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619  Next >
Rcon Vulnerbility - Plaintext 2003-09-18
Alexander Hagenah (bugtraq primepage de)


--/ INTRODUCTION --

Advisory : rcon_plaintext

Release Date : 18.September 2003

Application : HLSW / rcon-console

Impact : rcon passwords can be sniffed

Vendor Status : No reply yet.

Author : Alexander 'xaitax' Hagenah [ah (at) primepage (dot) de [email concealed]]

[ more ]  [ reply ]
Solaris SADMIND Exploitation 2003-09-18
H D Moore (rootdown-announce metasploit com)
The exploitation method is different from the iDefense advisory, this code only
requires a single UDP packet to the sadmind service to execute commands.

==================================================

$ wget http://www.metasploit.com/tools/rootdown.pl >/dev/null 2>&1
$ chmod 755 rootdown.pl
$

[ more ]  [ reply ]
[CLA-2003:742] Conectiva Security Announcement - sendmail 2003-09-18
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : sendmail
SUMMARY : Remote vulnerability
DATE

[ more ]  [ reply ]
Directory traversal in Plug & Play Web Server 2003-09-18
Bahaa Naamneh (b_naamneh hotmail com)


Directory traversal in Plug & Play Web Server

Introduction:

=============

"The Plug and Play Web Server provides all of the tools you need to host your own website. The tools are bundled together in one comprehensive software package that it is incredibly easy to use and maintain."

- Vendo

[ more ]  [ reply ]
MDKSA-2003:092 - Updated sendmail packages fix buffer overflow vulnerability 2003-09-18
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: sendmail
Advisory ID:

[ more ]  [ reply ]
Immunix Secured OS 7+ sendmail update 2003-09-18
Immunix Security Team (security immunix com)
[From the Redundancy Department of Redundancy: When setting up an
out-of-office-autoreply, please configure it to NOT respond to
Precedence: bulk mail or other public mail lists. Thanks.]

-----------------------------------------------------------------------
Immunix Secured OS Security Advisory

[ more ]  [ reply ]
[RHSA-2003:283-01] Updated Sendmail packages fix vulnerability. 2003-09-17
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated Sendmail packages fix vulnerability.
Advisory ID: RHSA-2003:283-01
Issue date: 2003-09-17
Updat

[ more ]  [ reply ]
[SECURITY] [DSA-384-1] New sendmail packages fix buffer overflows 2003-09-18
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 384-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 17th, 2003

[ more ]  [ reply ]
CORE-2003-0531: Multiple IBM DB2 Stack Overflow Vulnerabilities 2003-09-18
CORE Security Technologies Advisories (advisories coresecurity com)
Core Security Technologies Advisory
http://www.coresecurity.com

Multiple IBM DB2 Stack Overflow Vulnerabilities

Date Published: 2003-09-18

Last Update: 2003-09-18

Advisory ID: CORE-2003-0531

Bugtraq ID: 8552, 8553

CVE Name

[ more ]  [ reply ]
[ESA-20030918-024] Additional 'OpenSSH" buffer management bugs. 2003-09-18
EnGarde Secure Linux (security guardiandigital com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+-----------------------------------------------------------------------
-+
| Guardian Digital Security Advisory September 18, 2003 |
| http://www.guardiandigital.com ESA-20030918-024 |
|

[ more ]  [ reply ]
CERT Advisory CA-2003-25 Buffer Overflow in Sendmail 2003-09-18
CERT Advisory (cert-advisory cert org)

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2003-25 Buffer Overflow in Sendmail

Original issue date: September 18, 2003
Last revised: --
Source: CERT/CC

A complete revision history is at the end of this file.

Systems Affected

* Systems running open-source sendmail

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-03:13.sendmail 2003-09-17
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-03:13.sendmail Security Advisory
The FreeBSD Project

Topic: a

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh [REVISED] 2003-09-17
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.

Topic: Op

[ more ]  [ reply ]
[CLA-2003:741] Conectiva Security Announcement - openssh 2003-09-17
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : openssh
SUMMARY : Remote vulnerabilities
DATE

[ more ]  [ reply ]
[RHSA-2003:279-02] Updated OpenSSH packages fix potential vulnerabilities 2003-09-17
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated OpenSSH packages fix potential vulnerabilities
Advisory ID: RHSA-2003:279-02
Issue date: 2003-0

[ more ]  [ reply ]
Denial-Of-Service and JVM Crash via user injectable xsl template 2003-09-17
Marc Schoenefeld (schonef uni-muenster de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ILLEGALACCESS.ORG JAVA SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : Embedded XALAN packages in JDK 1.4.x
SUMMARY : Vulnerable classes callable via user injectable xsl template
THREAT

[ more ]  [ reply ]
GLSA: sendmail (200309-13) 2003-09-17
aliz gentoo org (Daniel Ahlberg)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-13
- - - ---------------------------------------------------------------------

          PACKAGE : sendmail
          SUMMARY : buffer

[ more ]  [ reply ]
RE: Exploiting Multiple Flaws in Symantec Antivirus 2004 for Windows Mobile (fwd) 2003-09-17
Thor Larholm (thor pivx com)
---------- Forwarded message ----------
> From: <auto9115 (at) hushmail (dot) com [email concealed]>
> Subject: [Full-Disclosure] Exploiting Multiple Flaws in Symantec
> Antivirus 2004 for Windows Mobile
>
> Vulnerability #2: The Virus scanner does not appear to work at all!
>
> Like any antivirus scanner, Symantec detects t

[ more ]  [ reply ]
Denial Of Service in Plug & Play Web (FTP) Server 2003-09-17
Bahaa Naamneh (b_naamneh hotmail com)


Denial Of Service in Plug & Play Web (FTP) Server

Introduction:

=============

"The Plug and Play Web Server provides all of the tools you need to host your own website. The tools are bundled together in one comprehensive software package that it is incredibly easy to use and maintain."

- V

[ more ]  [ reply ]
Verisign abusing .COM/.NET monopoly, BIND releases new 2003-09-17
Thor Larholm (thor pivx com) (2 replies)
This is simply amazing, Verisign has just turned the .COM and .NET TLD
DNS servers up-side-down for their own economical gain and, in doing so,
disrupted network traffic for most of the Internet. Mail administrators
who use any non-existant DNSBL to mark email as spam suddenly has all
their mails de

[ more ]  [ reply ]
Re: Verisign abusing .COM/.NET monopoly, BIND releases new 2003-09-17
SR (bugtraq rivera za net) (1 replies)
Re: Verisign abusing .COM/.NET monopoly, BIND releases new 2003-09-17
Damaged Industries (damaged damaged no-ip com)
Re: Verisign abusing .COM/.NET monopoly, BIND releases new 2003-09-17
Jose Nazario (jose monkey org)
Lun_mountd.c vs mounty.c 2003-09-17
Tobias Klein (tobias klein ewetel de)
frew min ago i was browsing packetstorm and i cant belive my eyes
anyone has changed a half haeder of my code and disclosures it to packetstorm

i cant understand why pplz does that
are they not able to got there own skills
i have investigate many hours to write this code and it should never release

[ more ]  [ reply ]
OPENSSH-SORCERER2003-09-17 2003-09-17
Michael Walton (mwalton abilene com) (1 replies)

Sorcerer Update Advisory
Tap Into the Source


________________________________________________________________________

Source Name: openssh-3.7p1
Advisory ID: SORCERER2003-09-17
Date: September 17th, 2003
______

[ more ]  [ reply ]
openssh 3.7.1 patched or not? 2003-09-17
Tom Brown (tbrown baremetal com) (1 replies)
Re: openssh 3.7.1 patched or not? 2003-09-17
Alex Lambert (alambert quickfire org)
Re: [Full-Disclosure] Exploiting Multiple Flaws in Symantec Antivirus 2004 for Windows Mobile 2003-09-17
Sym Security (symsecurity symantec com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Symantec's response to Issue #1: Symantec's Auto-Protect feature in Symantec
AntiVirus for Handhelds
scanner is designed to detect malicious code, in real time, as files are
saved to a device. At this time the anticipated mechanism for transport to

[ more ]  [ reply ]
[slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02) 2003-09-17
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02)

The sendmail packages in Slackware 8.1, 9.0, and -current have been
patched to fix security problems. These issues seem to be remotely
exploitable, so all sites running sendmail s

[ more ]  [ reply ]
[slackware-security] OpenSSH updated again (SSA:2003-260-01) 2003-09-17
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] OpenSSH updated again (SSA:2003-260-01)

Upgraded OpenSSH 3.7.1p1 packages are available for Slackware
8.1, 9.0 and -current. These fix additional buffer management
errors that were not corrected in the recent 3.7p1 release.
The

[ more ]  [ reply ]
(Page 1614 of 1748)  < Prev  1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus