BugTraq Mode:
(Page 1641 of 1748)  < Prev  1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646  Next >
Re: Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-22
benjurry (benjurry xfocus org)
The Vulnerability is not the same as the LSD,so the RPC service will also be crashed even if you have patch the MS03-026. But XP and 2003 is not affected.

benjurry

-----------------------------

天�健��子以�强不息

å?°å?¿å¤ï¼?å?子以å??å¾·è½½ç?©

---------------------------

[ more ]  [ reply ]
Apache 1.3.27 mod_proxy security issue 2003-07-22
Jason Robertson (jason ifuture com)
I have found that recently a spammer has been using a mod_proxy
configuration, (that was meant to allow for an easier transition to a
new naming scheme, as well as changes to a backend software) as a spam
relay.
The spammer has been using HTTP POST requests to send these messages
with POST HTTP

[ more ]  [ reply ]
RE: Disclosure-for-pay? 2003-07-22
Rikhardur EGILSSON oecd org

This is apparenty what happened with Serge Humpich, France's famous engineer
(At least in France :-), a true hacker (in the original meaning of the
word). He was passionate about the French credid card system and how it
worked, and spent four years studying the system and even bought one teller
ma

[ more ]  [ reply ]
Re: Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-22
flashsky fangxing (flashsky xfocus org)
In-Reply-To: <003b01c34ef1$4a8486f0$64064a0a@homedudu>

The reason for this is that __RemoteGetClassObject intface passed a NULL

point to PerformScmStage Function;

Author e-mail:

fangxing (at) venustech.com (dot) cn [email concealed]

flashsky (at) xfocus (dot) org [email concealed]

Thanks:

Test and translate for Benjerry (at) xfocus (dot) org [email concealed]

We

[ more ]  [ reply ]
Re: Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-22
voleur speakeasy net
Has anybody tried this out? I tried it against Windows 2000 SP3 and SP4 with the MS03-026 hotfix. It killed port 135 (RPC) with or without the patch.

[ more ]  [ reply ]
Security Update: [ CSSA-2003-SCO.12 ] OpenServer 5.0.6, OpenServer 5.0.7 : Security vulnerability in Merge prior to Release 5.3.23a 2003-07-22
security sco com

To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: UnixWare 7.1.x : Security vulnerability in Merge prior
to Release 5.3.

[ more ]  [ reply ]
[CLA-2003:700] Conectiva Security Announcement - nfs-utils 2003-07-22
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : nfs-utils
SUMMARY : Buffer overflow vulnerabi

[ more ]  [ reply ]
sorry, wrong file 2003-07-22
phil dunn (z3hp yahoo com)


######################################################

## Name: Phil Dunn ##

## Email: z3hp (at) yahoo (dot) com [email concealed] ##

## Date: July - 20 - 2003 ##

## Program: Ashnews v0.83 ##

## Version: v0.

[ more ]  [ reply ]
[CLA-2003:698] Conectiva Security Announcement - apache 2003-07-21
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : apache
SUMMARY : Denial of service vulnerabil

[ more ]  [ reply ]
ActiveX security resources 2003-07-21
Michael Howard (mikehow microsoft com)
Following recent emails about securing ActiveX controls, we would like
to bring the following resources to developers' attentions:

_Designing Secure ActiveX Controls_
Guidelines for building security ActiveX controls, especially controls
marked safe for scripting.
http://msdn.microsoft.com/workshop

[ more ]  [ reply ]
RE: Re: FW: Windows Update - Unsafe ActiveX control (fwd) 2003-07-20
liudieyuinchina vip sina com
>if there is some XSS hole in

> Windows Update site or if there is a bug in IE that

> allows to trick the URL,

then the attacker can use Windows Update ActiveX to:

reboot your machine;

get detailed information on computer - computer name, hardware, isAdmin, etc.

BUT it's hard for the atta

[ more ]  [ reply ]
WebCalendar Include File 2003-07-21
noconflic (nocon texas-shooters com)


Webcalendar 0.9.41 and below.
http://webcalendar.sourceforge.net/

Since this appears to be public info now.

Problem:
http://sourceforge.net/forum/forum.php?thread_id=901234&forum_id=11588

Exploit:
http://www.some.host/webcalendar/[filename].php?user_inc=../../../../../
etc/passwd

-

[ more ]  [ reply ]
RE: Cisco IOS exploit (44020) 2003-07-21
Donahue, Pat (PDonahue acmicorp com) (1 replies)
Here's a much simpler shell script that produces the same result:

--- BEGIN SHELL SCRIPT ---
#!/bin/tcsh -f

if ($1 == "" || $2 == "") then
echo "usage: $0 <router hostname|address> <ttl>"
exit
endif

foreach protocol (53 55 77 103)
/usr/local/sbin/hping $1 --rawip --rand-source --ttl $2 --

[ more ]  [ reply ]
RE: Cisco IOS exploit (44020) 2003-07-21
Jerry Shenk (jshenk decommunications com)
Path disclosure and file retrieving in AtomicBoard-0.6.2 2003-07-21
gr00vy (groovy2600 yahoo com ar)
Vendors has been contacted.
Main WEB: http://cal007300.student.utwente.nl/atomicboard/

DESCRIPTION:
========================================================================
=
What is AtomicBoard?

"An object oriented framework for building forums/weblogs"

AtomicBoard is an Open Source web applicati

[ more ]  [ reply ]
Netterm netftpd - Remote DoS 2003-07-20
morning_wood (se_cur_ity hotmail com)
------------------------------------------------------------------
- EXPL-A-2003-017 exploitlabs.com Advisory 017
------------------------------------------------------------------
-= netterm netftpd =-

Vunerability(s):
----------------
1. Remote / Local Denial

[ more ]  [ reply ]
RE: Disclosure-for-pay? 2003-07-21
Martin Walker (martin walker ctg com) (1 replies)
NOTE: that the individual is not saying "Pay me or I'll tell everyone
about it". He's just saying "Pay me or I WON'T tell you about it".
There is a subtle but critical difference. Your example is incorrect
from that standpoint.

Personally I don't think it is very good business, but it is not as
d

[ more ]  [ reply ]
RE: Disclosure-for-pay? 2003-07-21
Jay D. Dyson (jdyson treachery net)
Drupal XSS Vulnerability (main page and sub pages) 2003-07-21
Ferruh Mavituna (ferruh mavituna com)
------------------------------------------------------
Drupal XSS Vulnerability (main page and sub pages)
------------------------------------------------------
Any kind of XSS attacks possibility. An attacker could access other
users/admin drupal accounts.

-----------------------------------------

[ more ]  [ reply ]
Cisco IOS exploit (44020) 2003-07-21
Martin Kluge (martin elxsi de)
Hi,

I'd like to submit a DoS attack against the recently found bug in
almost all Cisco IOS versions (Cisco document ID 44020).

The exploit can be found here (and it is included as attachment):

http://www.elxsi.de/cisco-bug-44020.tar.gz

This exploit is NOT broken (like the shadowchode.tar.gz exp

[ more ]  [ reply ]
CGI.pm vulnerable to Cross-site Scripting 2003-07-20
obscure (dontreply eyeonsecurity org) (1 replies)
Advisory Title: CGI.pm vulnerable to Cross-site Scripting.
Release Date: July 19 2003

Application: CGI.pm - which is by default included in many common Perl
distributions.

Platform: Most platforms. Tested on Apache and IIS.

Version: CGI.pm

Severity: Effects scripts which make use of start_f

[ more ]  [ reply ]
Re: CGI.pm vulnerable to Cross-site Scripting 2003-07-21
Erwann CORVELLEC (Erwann Corvellec free fr) (1 replies)
Re: CGI.pm vulnerable to Cross-site Scripting 2003-07-22
Lincoln Stein (lstein cshl edu)
Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-20
benjurry (benjurry xfocus org)


Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability

1.Description:

There is a vulnerability in the part of RPC that deals with message exchange over TCP/IP. The failure results because of incorrect handling of malformed messages.

By sending a malformed me

[ more ]  [ reply ]
[RHSA-2003:162-02] Updated Mozilla packages fix security vulnerability. 2003-07-21
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated Mozilla packages fix security vulnerability.
Advisory ID: RHSA-2003:162-02
Issue date: 2003-07-

[ more ]  [ reply ]
[RHSA-2003:238-01] Updated 2.4 kernel fixes vulnerabilities 2003-07-21
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated 2.4 kernel fixes vulnerabilities
Advisory ID: RHSA-2003:238-01
Issue date: 2003-07-21
Updated o

[ more ]  [ reply ]
Simpnews include file Vulnerability 2003-07-19
pupet cahyo (pupet cosmo com)


original File name : PUPET-simpnews.txt

date releases : july 15, 2003

Informations :

=========================

Advisory Name: Simpnews include file Vulnerability

Author: PUPET <pupet (at) cosmo (dot) com [email concealed]>

Discover by: PUPET <pupet (at) cosmo (dot) com [email concealed]>

Website vendor : http://www.boesch-it.de/

Versions :

[ more ]  [ reply ]
Re: Microsoft ISA Server HTTP error handler XSS (TL#007) 2003-07-19
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


>
> <A href="http://%09%09%09%09%09%09%09
> 09www.malware.com">http://www.microsoft.com</A>

The following will represent a true status and a false destination:

<A href="http://www.microsoft.com%09%09%09@%09%09%09%09%09%09
09www.malware.com">http://www.microsoft.com</A>

--
http://www.ma

[ more ]  [ reply ]
(Page 1641 of 1748)  < Prev  1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus