BugTraq Mode:
(Page 1658 of 1748)  < Prev  1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663  Next >
Some Network Drivers May Leak Data on IRIX 2003-06-02
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title: Some Network Drivers May Leak Data
Number : 20030601-01-A
Date : June 2, 2003
Reference: CERT Vulnerability Note VU#41

[ more ]  [ reply ]
Format String Vulnerability in Crob Ftp Server 2003-06-02
Luca Ercoli (luca ercoli inwind it)


Package: Crob Ftp Server

Auth: Crob Software Studio (www.crob.net/studio/ftpserver/)

Version: 2.50.4 Build 228

Vulnerability: Format String

Risk: High

Vulnerability

Description:

A format string flaw in the authentication process allows remote attackers

without val

[ more ]  [ reply ]
[Windows XP] ntdll.dll Buffer Overflow Vulnerability - Yet Another MS03-007 2003-06-01
:: Operash :: (nesumin softhome net)

------------------------------------------------------------------------
---
SUMMARY : [Windows XP] ntdll.dll Buffer Overflow Vulnerability
PRODUCT : Windows XP ntdll.dll
VERSIONS : 5.1.2600.1106
VENDOR : Microsoft Corporation (http://www.microsoft.com/)
SEVERITY :

[ more ]  [ reply ]
IIS WebDav Denial of Service attacks - Update to SPI Dynamics 2003-06-02
Mark Litchfield (mark ngssoftware com)
In SPI Dynamics own advisory it mentions that IIS will restart itself -
whilst this is true, by supplying a specific number of bytes, we can
terminate all the threads, but leaving INETINFO still alive. Despite
INETINFO not dying, the process will no longer serve any requests.

This provides a more

[ more ]  [ reply ]
Mod_gzip Debug Mode Vulnerabilities 2003-06-01
Matthew Murphy (mattmurphy kc rr com)
Multiple Vulnerabilities in mod_gzip Debugging Routines

I. Synopsis

Affected Systems: mod_gzip 1.3.26.1a and prior
Risk:
* Development: High
* Production: Minimal
Developer URL: http://www.sourceforge.net/projects/mod-gzip
Status: Vendor is not supporting project at this time.

II. Product

[ more ]  [ reply ]
xmame gain root exploit 2003-05-31
Gabriel A. Maggiotti (gmaggiot ciudad com ar)
[ PHP-Nuke :] Multiple vulnerabilities in SPChat 2.0 for PHP-Nuke & SPChat 0.8.0 2003-05-31
Rynho Zeros Web (hackargentino gmx net)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Topic: Multiple vulnerabilities in SPChat 2.0 for PHP-Nuke & SPChat 0.8.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Systems Affected: Web Chat 2.0 for PHP-Nuke & SPChat 0.8.0
Vendor URL: http://www.saarport.net
Vuln Type:

[ more ]  [ reply ]
IIS Web DAV exploit new release 2003-05-30
Alumni Alumni (alumni ok kz)


/*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~*/

/* 29/05/2003 - The Matrix Reloaded - */

/* Proof of concept exploit by Alumni */

/*-\--/--\--/--\--/--\--/--\--/--\--/--\--/--\--/-*/

/* In brief: */

/* 1) spawns shell on port 32768; */

/* 2) the byte

[ more ]  [ reply ]
Yahoo! Security Advisory: Yahoo! Voice Chat 2003-05-30
Yahoo!Security Contact (security yahoo-inc com)
---------------------------------------------------------------------
Yahoo! Security Advisory

Subject: Yahoo! Voice Chat Control: buffer overflow
Announced: 2003-05-30
Affects: Yahoo! Audio Conferencing versions prior to 1,0,0,45
running on any version of Microsoft Windows
Corre

[ more ]  [ reply ]
Internet Explorer URL spoofing threat 2003-05-30
M. Burnett (mb xato net)
Recently I advised Microsoft of a vulnerability in Internet Explorer
that would cause the browser to browse to one web site but display a
completely different URL in the address bar. Due to inconsistent
handling of authentication credentials in a URL, IE will parse the
URL one way when browsing and

[ more ]  [ reply ]
[RHSA-2003:181-01] Updated ghostscript packages fix vulnerability 2003-05-30
bugzilla redhat com
---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated ghostscript packages fix vulnerability
Advisory ID: RHSA-2003:181-01
Issue date: 2003-05-30
Updated on: 2003-05-30
Product: Red

[ more ]  [ reply ]
JBOSS 3.2.1: JSP source code disclosure 2003-05-30
Marc Schoenefeld (schonef uni-muenster de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

jboss 3.2.1 with jetty seems to be vulnerable to jsp source code disclosure.

Trying to access the ServerInfo.jsp with an suffixed "%00" shows the source
code of this JSP. Seems to be a forgotten debug feature :-]

http://192.168.0.4:8080/web-conso

[ more ]  [ reply ]
conexant adsl router backdoor 2003-05-30
Luca Bartolomai (mefistofle libero it)


Hi ,

I have acquired one router adsl conexant model Trident .

This modem is identical to the Italian version Digicom Michelangelo Office,

but the firmware is modding .

If get file CONFIG.REG from ftp modem server and edit it , you can see this

DWORD :

[Class\Protocol\Bridge\0000]

"DeviceI

[ more ]  [ reply ]
Re: Unix Version of the Pi3web DoS 2003-05-30
Holger Zimmermann (zimpel users sourceforge net)
In-Reply-To: <20030512154945.29319.qmail (at) www.securityfocus (dot) com [email concealed]>

The vulnerability exists in Unix version of Pi3Web

2.0.1 only,

which use the one of the following configuration files

shipped

with the binary distributions for Linux or Solaris :

/usr/local/Pi3Web/Conf/Devel.pi3

/usr/local/Pi3Web

[ more ]  [ reply ]
NSFOCUS SA2003-05: Microsoft IIS ssinc.dll Over-long Filename Buffer Overflow Vulnerability 2003-05-30
NSFOCUS Security Team (security nsfocus com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NSFOCUS Security Advisory(SA2003-05)

Topic: Microsoft IIS ssinc.dll Over-long Filename Buffer Overflow Vulnerability

Release Date: 2003-5-30

CVE CAN ID: CAN-2003-0224

Affected system:
===================

- - Microsoft IIS 5.0

Unaffected system:
==

[ more ]  [ reply ]
Php-Nuke:users and admins password hashes vulnerability 2003-05-30
bugsman (bugsman libero it)
BUGSMAN: serving security from Italy since..hem..well, about 1 year

------------------------------------------------------------------------
-------------

Object: users & admins password hash retrieving

Tested on Php-Nuke 5.6 e 6.5

Vulnerable versions: I've never seen a patch for this so pote

[ more ]  [ reply ]
Remote DoS in Desktop Orbiter 2003-05-30
Luca Ercoli (luca ercoli inwind it)


SUMMARY: Desktop Orbiter (www.anfibia.it) is a client-server application

that allow you to administer and secure your network.

VULNERABILITY

DESCRIPTION: At every connection to port 51054(of the server), a snapshot

preview of the desktop is loaded in memory;

[ more ]  [ reply ]
Re: Pi3Web 2.0.1 DoS 2003-05-30
Holger Zimmermann (zimpel users sourceforge net)
In-Reply-To: <Law8-F81nLOyDc41W2u00004bb6 (at) hotmail (dot) com [email concealed]>

The problem was related to an additional PathInfo="Yes"

parameter in the PathMapper object for the WebRoot

mapping in version 2.0.1.

There is patch available for a longer time, which fixes

this issue in the administration client :

http

[ more ]  [ reply ]
Re: Another ZEUS Server web admin XSS! 2003-05-30
security zeus com
In-Reply-To: <20030529174830.9975.qmail (at) www.securityfocus (dot) com [email concealed]>

Zeus Technology, 30th May 2003.

"Another ZEUS Server web admin XSS!" vendor response

On May 29th 2003, a cross-site-scripting attack against

the Zeus

Administration Server was reported on bugtraq (incident

"Another ZEUS

Server

[ more ]  [ reply ]
MDKSA-2003:063 - Updated apache2 packages fix vulnerabilities 2003-05-31
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: apache2
Advisory ID:

[ more ]  [ reply ]
Re: Multiple Vulnerabilities In P-Synch Password Management 2003-05-30
Idan Shoham (idan psynch com)
In-Reply-To: <20030529052621.31678.qmail (at) www.securityfocus (dot) com [email concealed]>

The following can be taken as an official response from the vendor:

M-Tech Information Technology, Inc. (http://mtechIT.com/) to this

"vulnerability:"

1) The actual risk of these issues to production deployments of

P-Synch is

[ more ]  [ reply ]
Windows Media Services Remote Command Execution 2003-05-31
Brett Moore (brett softwarecreations co nz)
========================================================================

= Windows Media Services Remote Command Execution
=
= NSIISLOG.DLL Ver 4.1.0.3920
=
= MS Bulletin posted: May 28, 2003 revised May 30, 2003
= http ://www.microsoft.com/technet/security/bulletin/MS03-019.asp
=
= Affected Softwar

[ more ]  [ reply ]
WebStore2000 SQL Injection Vulnerability & Exploit 2003-05-31
Bosen (mobile bosen net)
1ndonesian Security Team (1st)
http://bosen.net/releases/
=======================================================================
=======================
Security Advisory

Advisory Name: WebStore SQL Injection Vulnerability & Exploit
Release Date: 05/10/2003
Application: WebStore2000 Version 6

[ more ]  [ reply ]
iisCart2000 Administration Security Leak 2003-05-31
Bosen (mobile bosen net)
1ndonesian Security Team (1st)
http://bosen.net/releases/
=======================================================================
=======================
Security Advisory

Advisory Name: iisCart2000 Administration Security Leak
Release Date: 05/10/2003
Application: Latest
Platform: Win32

[ more ]  [ reply ]
URLScan detection 2003-05-31
Stephen Cope (mail nonsense kimihia org nz)
Product: URLScan (for IIS)
Vendor : Microsoft
Date : Monday 27 May 2002

URLScan is a popular "Security Tool" used to filter out malicious
looking URLs. It has a variety of filters, including blocking requests
with excess escaped characters or for files with given extensions, eg,
.exe.

http://www

[ more ]  [ reply ]
iDEFENSE Security Advisory 05.30.03: Apache Portable Runtime Denial of Service and Arbitrary Code Execution Vulnerability 2003-05-30
Dave Ahmad (da securityfocus com)


David Mirza Ahmad
Symantec

0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12
Sabbe Dhamma Anatta

[ more ]  [ reply ]
(Page 1658 of 1748)  < Prev  1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus