|
Colapse all |
Post message
[slackware-security] GnuPG key validation fix (SSA:2003-141-04) 2003-05-22 Slackware Security Team (security slackware com) [slackware-security] glibc XDR overflow fix (SSA:2003-141-03) 2003-05-22 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] glibc XDR overflow fix (SSA:2003-141-03) An integer overflow in the xdrmem_getbytes() function found in the glibc library has been fixed. This could allow a remote attacker to execute arbitrary code by exploiting RPC service tha [ more ] [ reply ] [slackware-security] EPIC4 security fixes (SSA:2003-141-01) 2003-05-22 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] EPIC4 security fixes (SSA:2003-141-01) New EPIC4 packages are available to fix security problems found by Timo Sirainen. EPIC4 is an IRC (Internet Relay Chat) client. Under certain circumstances, a malicious IRC server could cau [ more ] [ reply ] [slackware-security] BitchX security fixes (SSA:2003-141-02) 2003-05-22 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] BitchX security fixes (SSA:2003-141-02) New BitchX packages are available to fix security problems found by Timo Sirainen. BitchX is an IRC (Internet Relay Chat) client. Under certain circumstances, a malicious IRC server could [ more ] [ reply ] [slackware-security] mod_ssl RSA blinding fixes (SSA:2003-141-05) 2003-05-22 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mod_ssl RSA blinding fixes (SSA:2003-141-05) An upgrade for mod_ssl to version 2.8.14_1.3.27 is now available. This version provides RSA blinding by default which prevents an extended timing analysis from revealing details of the [ more ] [ reply ] [slackware-security] quotacheck security fix in rc.M (SSA:2003-141-06) 2003-05-22 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] quotacheck security fix in rc.M (SSA:2003-141-06) An upgraded sysvinit package is available which fixes a problem with the use of quotacheck in /etc/rc.d/rc.M. The original version of rc.M calls quotacheck like this: echo " [ more ] [ reply ] WsMp3d remote exploit. 2003-05-22 dong-h0un U (xploit hackermail com) Hello. This is WsMp3d remote exploit. Thanks. -- /* ** ** [*] Title: Remote Heap Corruption Overflow vulnerability in WsMp3d (Again) ** [+] Exploit: 0x82-Remote.WsMp3d.again.c ** ** [+] Description -- ** ** WsMp3d is webserver daemon that can enjoy mp3. (shoutcast-server) ** There is WsMp3 Heap [ more ] [ reply ] MDKSA-2003:058-1 - Updated cdrecord packages fix local root compromise 2003-05-21 Mandrake Linux Security Team (security linux-mandrake com) Demarc Puresecure v1.6 - Plaintext password issue - 2003-05-21 Ryan Purita (ryan totally-connected com) According to Demarc Puresecure's Website; Demarc PureSecureTM is a one of a kind, Total Intrusion Detection System (TIDS), which provides an unsurpassed level of comprehensive security. For the first time you will be able to reliably prevent, detect, and deter internal and external th [ more ] [ reply ] MDKSA-2003:059 - Updated lpr packages fix local root vulnerability 2003-05-21 Mandrake Linux Security Team (security linux-mandrake com) [CLA-2003:653] Conectiva Security Announcement - bugzilla 2003-05-21 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : bugzilla SUMMARY : Cross site scripting and t [ more ] [ reply ] Restricted Zone: the OUTLOOK EXPRESS 2003-05-21 http-equiv (at) excite (dot) com [email concealed] (1 malware com) Tuesday, 20 May, 2003 Silent delivery and installation of an executable on a target computer. No client input other than opening an email or newsgroup post. This can be achieved with the default setting of Outlook Express: RESTRICTED ZONE. Technically the following never worked, cannot work [ more ] [ reply ] [[ TH 026 Inc. ]] SA #4 - Blackmoon FTP Server cleartext passwords and User enumeration 2003-05-20 Daniel Nyström (exce netwinder nu) Telhack 026 Inc. Security Advisory - #4 _________________________________________ Name: Blackmoon FTP Server 2.6 Free Edition Impact: Medium Date: May 21 / 2003 _________________________________________ Daniel Nyström a.k.a. excE <exce (at) netwinder (dot) nu [email concealed]> _I N F O_ BlackMoon FTP Server is an FTP dae [ more ] [ reply ] [INetCop Security Advisory] Remote Heap Corruption Overflow vulnerability in WsMp3d. 2003-05-21 dong-h0un U (xploit hackermail com) ========================================== INetCop Security Advisory #2003-0x82-017.b ========================================== * Title: Remote Heap Corruption Overflow vulnerability in WsMp3d (Again) 0x01. Description WsMp3d is webserver daemon that can enjoy mp3. (shoutcast-server) The [ more ] [ reply ] [INetCop Security Advisory] WsMP3d Directory Traversing Vulnerability. 2003-05-21 dong-h0un U (xploit hackermail com) (1 replies) ========================================== INetCop Security Advisory #2003-0x82-017.a ========================================== * Title: WsMP3d Directory Traversing Vulnerability 0x01. Description WsMp3d is daemon that can enjoy mp3. This daemon can approach in web, directory traversing [ more ] [ reply ] Security advisory: LSF 5.1 local root exploit 2003-05-22 Tomasz Grabowski (cadence apollo aci com pl) BadBlue Remote Administrative Interface Access Vulnerability 2003-05-20 mattmurphy (at) kc.rr (dot) com [email concealed] (mattmurphy kc rr com) Maelstrom Local Buffer Overflow Exploit, FreeBSD 4.8 edition 2003-05-20 Knud Erik Højgaard (kain ircop dk) (1 replies) hey, it's maelort.pl. #!/usr/bin/perl # kokanin/DSR, gid games crap for /usr/ports/games/maelstrom -server bug found by # Luca Ercoli. This (ret/offset/shellcode) is made for FreeBSD 4.8-RELEASE. # maelstrom-3.0.5 Asteroids-style game for X Window System # shellcode by eSDee, he's cool. AV crap [ more ] [ reply ] Maelstrom bugfix (was Maelstrom Local Buffer Overflow Exploit, FreeBSD 4.8 edition) 2003-05-21 achurch achurch org (Andrew Church) PHP-Nuke Denial of Service attack and more SQL Injections 2003-05-18 Lorenzo Manuel Hernandez Garcia-Hierro (security lorenzohgh com) ------- Product: PHP-Nuke Vendor: Francisco Burzi Versions Vulnerable: Francisco Burzi PHP-Nuke 6.0 Francisco Burzi PHP-Nuke 6.5 RC3 Francisco Burzi PHP-Nuke 6.5 RC2 Francisco Burzi PHP-Nuke 6.5 RC1 Francisco Burzi PHP-Nuke 6.5 FINAL Francisco Burzi PHP-Nuke 6.5 BETA 1 Francisco Burzi P [ more ] [ reply ] PHP-Nuke module PHP-Banner-Exchange path disclosure 2003-05-18 Lorenzo Manuel Hernandez Garcia-Hierro (security lorenzohgh com) Blue screen in Windows 2003-05-20 David F. Madrid (idoru videosoft net uy) Issue : Blue screen in Windows Tested versions : W2000 Server Sp3 with IE 6.0 Sp1 XP Pro with IE 6.0 Vendor status : MS is investigating the issue but as they spent months to just acknowledge it I decided to publish it Description : With Internet Explorer you can make calls using netmeetin [ more ] [ reply ] More vulnerabilities in ttForum/ttCMS -> SQL injection 2003-05-20 ScriptSlave gmx net Advisory name: SQL Injection-Bug in ttForum (all versions) Application: ttForum - all versions Vendor: www.ttforum.com Status: Vendor of ttForum was contacted but didn't reply Impact: Attacker can get Administrator-rights on forum Platform(s): any Technical description: ---------------------- Ever [ more ] [ reply ] Maelstrom Local Buffer Overflow Exploit 2003-05-20 akcess . (akcss linuxmail org) Local exploit for /usr/bin/Maelstrom due to insufficient bounds checking of the -player cmd line arg. See attached proof-of-concept exploit. -akcess -- ______________________________________________ http://www.linuxmail.org/ Now with e-mail forwarding for only US$5.95/yr Powered by Outblaze [ more ] [ reply ] [Fwd: 127 Research and Development: 127 Day!] 2003-05-20 northern snowfall (dbailey27 ameritech net) Every year, 127 Research chooses an interesting topic, presenting it to our correspondants just to keep them up-to-date with our vastly increasing prowess and drive. This year will be the first we bring the public our yearly analysis. Focused on topics that challenge an analyst's skill, 127 Day rel [ more ] [ reply ] Plaintext Password in Settings.ini of CesarFTP 2003-05-20 Andreas Constantinides (megahz megahz org) Cesar FTP v0.99g (latest version) an FTP Server by http://www.aclogic.com/ it saves the ftp password in file: c:\Program Files\CesarFTP\settings.ini in plaintext: .... Password= "lalala" Login= "megahz" Name= "megahz" .... Discovered by MegaHz www.megahz.org megahz (at) megahz (dot) org [email concealed] www.cyhackportal.co [ more ] [ reply ] |
|
Privacy Statement |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] GnuPG key validation fix (SSA:2003-141-04)
A key validation bug which results in all user IDs on a given key
being treated with the validity of the most-valid user ID on that
key has been fixed with the release of GnuPG 1.2.2.
W
[ more ] [ reply ]