BugTraq Mode:
(Page 1626 of 1748)  < Prev  1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631  Next >
Piolet client vulnerable to a remote DoS 2003-08-20
Luca Ercoli (luca ercoli inwind it)


What's Piolet: Piolet is a peer-to-peer file sharing client.

More information can be found at www.piolet.com

Vulnerability Description: By connecting TCP port 701, client show to user

a "voice chat session request" message.

[ more ]  [ reply ]
Administrivia: List sluggish + buffer overflow protection thread. 2003-08-19
Dave Ahmad (da securityfocus com)

It has been a long day. I've rejected & deleted from the Bugtraq queue
well over 1000 messages with Sobig.F attachments. I've got a few hundred left to
go. I apologize if any of your messages havn't yet been approved. It's because
they're buried in the queue, I'll get to them. On another note,

[ more ]  [ reply ]
MPSB03-05 Patch and Work Around for Dreamweaver MX, DRK, and UltraDev Server Behaviors 2003-08-19
Jennifer Taylor (jetaylor macromedia com)
In-Reply-To: <200308041508.h74F824G026875 (at) novappc (dot) com [email concealed]>

Thank you again for bringing this to the attention of Macromedia. The

issues have been resolved. More information and the necessary patches

are available at: http://www-

staging.macromedia.com/devnet/security/security_zone/mpsb03-05.htm

[ more ]  [ reply ]
MDKSA-2003:083 - Updated eroaster packages fix temporary file vulnerability 2003-08-19
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: eroaster
Advisory ID:

[ more ]  [ reply ]
MDKSA-2003:073-1 - Updated unzip packages fix vulnerability 2003-08-19
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: unzip
Advisory ID:

[ more ]  [ reply ]
Re: Buffer overflow prevention 2003-08-19
Theo de Raadt (deraadt cvs openbsd org)
> i don't care about other peoples war. but:
>
> > W^X was invented because we saw the need for it. We had no idea that
> > anyone else was working in the same area.
>
> i think it is somewhat strange. there realy smart people start building
> something before they do some research and look if s

[ more ]  [ reply ]
RE: Windows Update: A single point of failure for the world's economy? 2003-08-19
Russ (Russ Cooper rc on ca)
Let me state up front that I am in complete agreement with Microsoft's move should they decide to set Automatic Updates to enabled on any and all OS' they sell, have sold, will ever sell. In case you're not aware, I like to think I am one of the most vocal critics of Windows Update.

Firstly, to add

[ more ]  [ reply ]
Remote Execution of Commands in Omail Webmail 0.98.4 and earlier 2003-08-19
Phillip Whelan (pwhelan bunkerchile net)


Product: Omail Webmail

Author: Olivier Mueller

Vulnerable Versions:

- 0.98.x

- 0.97.x

- ...

Omail is a Webmail coded in perl for qmail,

optionally with vmailmgr

or vpopmail.

There is a security flaw in Omail which, if

installed by default, allows

for remote root acces

[ more ]  [ reply ]
Windows Update: A single point of failure for the world's economy? 2003-08-19
Richard M. Smith (rms computerbytesman com)
Hi,

The Washington Post has an article in today's paper saying that
Microsoft is mulling over making the Auto-Update feature of Windows XP
be turned on by default. The article can be found here:

Microsoft Weighs Automatic Security Updates as a Default
http://www.washingtonpost.com/ac2/wp-d

[ more ]  [ reply ]
Re: Need help. Proof of concept 100% security. 2003-08-18
xenophi1e (oliver lavery sympatico ca)
In-Reply-To: <1061409854.1743.99.camel (at) limit.tm (dot) org [email concealed]>

>3. Results of EFC are in front of you all. There have been 2000+ plus

>attacks, still system is up and running without a reboot. All

>applications are doing what they are supposed to do. All these

>security loopholes and attacks have cost mon

[ more ]  [ reply ]
Re: Buffer overflow prevention 2003-08-19
pageexec freemail hu
> In essence, PAX attempts a best-effort of mapping existing and unchanged
> Linux binaries (except for marking) so that they are mapped best for
> security. They do this by changing almost only kernel code.

This is not correct. PaX is about researching various ways of protection
against memory co

[ more ]  [ reply ]
Re: Buffer overflow prevention 2003-08-18
Theo de Raadt (deraadt cvs openbsd org) (3 replies)
>I agree whole heartedly. It is interesting to see OpenBSD transition
>from a stance of "audit is the only way" to actually employing access
>control [...]

I persist in my belief that policy-based mechanisms do not improve
security. If you cannot make a default policy that everyone can live
unde

[ more ]  [ reply ]
Re: Buffer overflow prevention 2003-08-19
Mark Tinberg (mtinberg securepipe com)
Re: Buffer overflow prevention 2003-08-19
Crispin Cowan (crispin immunix com) (2 replies)
Re: Buffer overflow prevention 2003-08-19
Mariusz Woloszyn (emsi ipartners pl)
Re: Buffer overflow prevention 2003-08-19
Anil Madhavapeddy (anil recoil org)
Re: Buffer overflow prevention 2003-08-19
Glynn Clements (glynn clements virgin net)
[CLA-2003:723] Conectiva Security Announcement - openslp 2003-08-18
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : openslp
SUMMARY : Temporary file creation vul

[ more ]  [ reply ]
A Vonage VOIP 3-way call CID Spoofing Vulnerability 2003-08-14
Nathan Wosnack (nathan hypervivid com)


Original Advisory: Wednesday, August 13, 2003

Severity: Medium - High

Description: An attacker using the VOIP (Voice Over IP) carrier Vonage,

has the ability to spoof the caller ID of a called party through the three-

way calling feature. This trick essentially acts similar to a POTS-base

[ more ]  [ reply ]
Re: Buffer overflow prevention 2003-08-18
Theo de Raadt (deraadt cvs openbsd org) (2 replies)
>> If we had been aware of PAX as you claim, why would we have thought
>> that i386 solutions were impossible?
>
>You have thought that i386 solutions were possible, because you have
>implemented them.

Can you please stop spinning this?

W^X was up and running on some of our architectures before we

[ more ]  [ reply ]
Re: Buffer overflow prevention 2003-08-19
Peter Busser (peter trusteddebian org)
Re: Buffer overflow prevention 2003-08-18
Darren Reed (avalon caligula anu edu au)
[Full-Disclosure] [SECURITY] [DSA-364-3] New man-db packages fix segmentation fault 2003-08-18
debian-security-announce lists debian org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 364-3 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
August 18th, 2003

[ more ]  [ reply ]
(Page 1626 of 1748)  < Prev  1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus