BugTraq Mode:
(Page 1656 of 1748)  < Prev  1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661  Next >
[SECURITY] [DSA-310-1] New xaos packages fix improper setuid-root execution 2003-06-09
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 310-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
June 8th, 2003

[ more ]  [ reply ]
Etherleak information leak in Windows Server 2003 drivers 2003-06-09
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: Etherleak information leak in Windows Server 2003 drivers
Systems Affected: Windows Server 2003 (all versions)
Severity: Low/Medium Risk
Vendor URL: http://www.microsoft.com/windowsserver2003/
Author: Chris Paget (chrisp (at) ngssoftware (dot) com [email concealed])
Date: 9t

[ more ]  [ reply ]
Cross-Platform Browser vulnerabilities - Critical 2003-06-07
meme-boi (meme-boi nothotmail org)

Background:

Once upon a time in the far off land of 1997 dwelled horrible cross platform
browser vulnerabilities that threatened every user of the internet.

Pioneers of Java Security Model exploitation such as Ben Mesander,Dan
Brumleve, & Georgi Guninski showed us wonderful methods of loading
arb

[ more ]  [ reply ]
IE-object tag longtype exploit 2003-06-07
Alumni (alumni ok kz)


#!/usr/bin/perl

#=synopsis

# 06/06/03 - Proof of concept exploit by Sir Alumni (alumni (at) ok (dot) kz [email concealed])

# IE-Object longtype dynamic call oferflow

# [...]

# url://<$shellcode><'/'x48><jmp %ptr_sh>

# the flaw actually exists in URLMON.DLL when converting backslashes

# to wide char,

# this can

[ more ]  [ reply ]
man[v1.5l] catalog format strings patch. 2003-06-07
Vade 79 (v9 fakehalo deadpig org)


forgot to make a patch for the original posting of the exploit. the patch

will keep the functionality, while eliminating exploitation possibilities.

original exploit ref:

http://www.securityfocus.com/archive/1/323821/2003-05-28/2003-06-03/0

bash# tar -zxvf man.src.tgz

bash# patch -p0 <

[ more ]  [ reply ]
[SECURITY] [DSA-308-1] New gzip packages fix insecure temporary file creation 2003-06-07
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 308-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
June 6th, 2003

[ more ]  [ reply ]
[SECURITY] [DSA-309-1] New eterm packages fix buffer overflow 2003-06-07
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 309-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
June 6th, 2003

[ more ]  [ reply ]
Speak Freely <=7.5 multiple remote and local vulnerabilities (the Hackademy Audit) 2003-06-07
Fozzy (fozzy dmpfrance com)

--[ Summary ]--

Speak Freely is a free and open-sourced software used for efficient and
secure (encrypted) voice communication over the Internet. It was written
by John Walker, and runs on Windows and Unix. Homepage :
http://www.fourmilab.ch/speakfree/

During a source code audit, the Hackademy st

[ more ]  [ reply ]
atftpd bug 2003-06-06
gz (techieone softhome net)
Hello,
sorry for my poor english.

After the mail of Rick Patel about atftpd on vuln-dev ml

http://www.securityfocus.com/archive/82/323886/2003-06-02/2003-06-08/0

I investigated a little the bug and found in

tftpd_file.c (line 320)

int tftpd_send_file(struct thread_data *data)
{
...
char

[ more ]  [ reply ]
zenTrack Remote Command Execution Vulnerabilities 2003-06-06
farking i-ownur info (1 replies)


Subject: zenTrack Remote Command Execution Vulnerabilities

Author: farking (farking (at) i-ownur (dot) info [email concealed])

Product: zenTrack 2.4.1 (latest) and below

Vendor: http://zendocs.phpzen.net/zentrack /

http://sourceforge.net/projects/zentrack/

Status: Vendor contacted (27/05/2003)

Location: http://farking

[ more ]  [ reply ]
Re: zenTrack Remote Command Execution Vulnerabilities 2003-06-07
gr00vy (groovy2600 yahoo com ar)
NOVL-2003-2966181 - HTTPSTK DOS 2003-06-06
Security (at) securityfocus (dot) com [email concealed], Alerts (at) securityfocus (dot) com [email concealed],Novell (at) securityfocus (dot) com [email concealed], Inc. (secure novell com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

Security Alert: NOVL-2003-2966181
Title: HTTPSTK DOS
Date: 03-Jun-2003
Revision: Original
Product Name: Netware
OS/Platform

[ more ]  [ reply ]
NOVL-2003-2966205 - iChain 2.2 Field Patch 1a 2003-06-06
Security (at) securityfocus (dot) com [email concealed], Alerts (at) securityfocus (dot) com [email concealed],Novell (at) securityfocus (dot) com [email concealed], Inc. (secure novell com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

Security Alert: NOVL-2003-2966205
Title: iChain 2.2 Field Patch 1a
Date: 05-Jun-2003
Revision: Original
Product Name: iChain

[ more ]  [ reply ]
NOVL-2003-2966207 - iChain 2.1 Field Patch 3 2003-06-06
Ed Reed (ereed novell com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

Security Alert: NOVL-2003-2966207
Title: iChain 2.1 Field Patch 3
Date: 05-Jun-2003
Revision: Original
Product Name: Novell

[ more ]  [ reply ]
SuSE Security Announcement: cups (SuSE-SA:2003:028) 2003-06-06
Sebastian Krahmer (krahmer suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SuSE Security Announcement

Package: cups
Announcement-ID: SuSE-SA:2003:028
Date: Fri Jun 6 16

[ more ]  [ reply ]
SuSE Security Announcement: pptpd (SuSE-SA:2003:029) 2003-06-06
Sebastian Krahmer (krahmer suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SuSE Security Announcement

Package: pptpd
Announcement-ID: SuSE-SA:2003:029
Date: Fri Jun 6 1

[ more ]  [ reply ]
Multiple Buffer Overflow Vulnerabilities Found in MERCUR Mail server v.4.2 (SP2) - IMAP protocol 2003-06-06
Dennis Rand (der infowarfare dk)
[STATUS, EXAMINE, DELETE, SUBSCRIBE, UNSUBSCRIBE, RENAME, LIST, LSUB, LOGIN,
CREATE, SELECT]
Multiple Buffer Overflow Vulnerabilities
Found in MERCUR Mail server v.4.2 (SP2)
http://www.atriumsoftwareusa.com/

[ more ]  [ reply ]
Critical Vulnerabilities In Max Web Portal 2003-06-06
JeiAr (jeiar kmfms com)


Multiple Vulnerabilities In Max Web Portal

------------------------------------------

Discovery Date: 05/2003

Versions Vuln : All? / 1.30

Author's URL : http://www.maxwebportal.com

http://www.maxcanada.ca

Notify Status : Patch Available / Upgrade

Product Description

[ more ]  [ reply ]
[RHSA-2003:192-01] Updated KDE packages fix security issue 2003-06-05
bugzilla redhat com
---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated KDE packages fix security issue
Advisory ID: RHSA-2003:192-01
Issue date: 2003-06-05
Updated on: 2003-06-05
Product: Red Hat Li

[ more ]  [ reply ]
[RHSA-2003:070-01] Updated hanterm packages provide security fixes 2003-06-06
bugzilla redhat com
---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated hanterm packages provide security fixes
Advisory ID: RHSA-2003:070-01
Issue date: 2003-06-06
Updated on: 2003-06-06
Product: Re

[ more ]  [ reply ]
linux)zblast/xzb[v1.2]: local buffer overflow. (games) 2003-06-05
Vade 79 (v9 fakehalo deadpig org)


note much explaination needed, simple overflow.

vade79 -> fakehalo.deadpig.org -> fakehalo

-- xxzb.c --

/* (linux)zblast/xzb[v1.2]: local buffer overflow.

by: v9[v9 (at) fakehalo.deadpig (dot) org [email concealed]].

zblast/xzb is a common svgalib/X game, included on

www.svgalib.org's program downloads:

[ more ]  [ reply ]
BAZARR LOCAL ROOT AGAIN. HI GUYS. DONT READ THIS 2003-06-05
bazarr (at) ziplip (dot) com [email concealed] (bazarr ziplip com) (1 replies)
Re: BAZARR LOCAL ROOT AGAIN. HI GUYS. DONT READ THIS 2003-06-06
Benjamin A. Okopnik (ben callahans org)
MDKSA-2003:064 - Updated kon2 packages fix buffer overflow vulnerability 2003-06-05
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: kon2
Advisory ID:

[ more ]  [ reply ]
Re: Tripbit Advisory TA-2003-05 Buffer Overflow Vulnerability in Pi3 Web Server v2.0.2 Beta 1 2003-06-05
Holger Zimmermann (zimpel users sourceforge net)
In-Reply-To: <3EDBB632.4030000 (at) tripbit (dot) org [email concealed]>

The problem has been encountered with the Win32 version

of Pi3Web 2.0.2 beta 1, a pre-released beta for public

testing.

As I determined, it is not necessary, to have specific

configuration options set in order to reproduce the

exploit (maybe dependen

[ more ]  [ reply ]
Monkey Http Daemon 2003-06-05
Martin (broadcast o0 dyndns org)
After reading the PHP XSS "exploit" (I dont know if it qualifies as one)
in phpinfo(), I found out that on the default page of the Monkey Http
Daemon, there is a Test of Supports section. Two links are included:
http://whateverhost/php/index.php
and
http://whateverhost/cgi-bin/test.pl

index.php j

[ more ]  [ reply ]
OpenSSH remote clent address restriction circumvention 2003-06-05
Mike Harding (mvh welkyn com)
Welkyn Security Advisory SA-2003060400

Synopsis: SSH "from=" and "user@hosts" restrictions spoofable via
reverse DNS for numerically specified IP addresses.

Issue Date: June 4, 2003

Software Affected: OpenSSH 3.6.1 and earlier

Vendor notified: May 24, 2003.

Vendor response: See workarounds, b

[ more ]  [ reply ]
Solaris syslogd overflow 2003-06-04
David Thiel (lx redundancy redundancy org)
Synopsis:

Solaris syslogd is vulnerable to a remote buffer overflow.

Versions:

Solaris 2.6 SPARC: Not vulnerable
Solaris 2.7 SPARC/x86: Untested
Solaris 8 SPARC: Vulnerable
Solaris 8 x86: Vulnerable
Solaris 9 SPARC: Not vulnerable
Solaris 9 x86: Untested

Impact:

Low-

[ more ]  [ reply ]
(Page 1656 of 1748)  < Prev  1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus