BugTraq Mode:
(Page 1662 of 1748)  < Prev  1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667  Next >
[slackware-security] GnuPG key validation fix (SSA:2003-141-04) 2003-05-22
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] GnuPG key validation fix (SSA:2003-141-04)

A key validation bug which results in all user IDs on a given key
being treated with the validity of the most-valid user ID on that
key has been fixed with the release of GnuPG 1.2.2.

W

[ more ]  [ reply ]
[slackware-security] glibc XDR overflow fix (SSA:2003-141-03) 2003-05-22
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] glibc XDR overflow fix (SSA:2003-141-03)

An integer overflow in the xdrmem_getbytes() function found in the glibc
library has been fixed. This could allow a remote attacker to execute
arbitrary code by exploiting RPC service tha

[ more ]  [ reply ]
[slackware-security] EPIC4 security fixes (SSA:2003-141-01) 2003-05-22
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] EPIC4 security fixes (SSA:2003-141-01)

New EPIC4 packages are available to fix security problems found
by Timo Sirainen. EPIC4 is an IRC (Internet Relay Chat) client.
Under certain circumstances, a malicious IRC server could cau

[ more ]  [ reply ]
[slackware-security] BitchX security fixes (SSA:2003-141-02) 2003-05-22
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] BitchX security fixes (SSA:2003-141-02)

New BitchX packages are available to fix security problems found
by Timo Sirainen. BitchX is an IRC (Internet Relay Chat) client.
Under certain circumstances, a malicious IRC server could

[ more ]  [ reply ]
[slackware-security] mod_ssl RSA blinding fixes (SSA:2003-141-05) 2003-05-22
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mod_ssl RSA blinding fixes (SSA:2003-141-05)

An upgrade for mod_ssl to version 2.8.14_1.3.27 is now available.
This version provides RSA blinding by default which prevents an
extended timing analysis from revealing details of the

[ more ]  [ reply ]
[slackware-security] quotacheck security fix in rc.M (SSA:2003-141-06) 2003-05-22
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] quotacheck security fix in rc.M (SSA:2003-141-06)

An upgraded sysvinit package is available which fixes a problem with
the use of quotacheck in /etc/rc.d/rc.M. The original version of
rc.M calls quotacheck like this:

echo "

[ more ]  [ reply ]
WsMp3d remote exploit. 2003-05-22
dong-h0un U (xploit hackermail com)

Hello.
This is WsMp3d remote exploit.

Thanks.

--

/*
**
** [*] Title: Remote Heap Corruption Overflow vulnerability in WsMp3d (Again)
** [+] Exploit: 0x82-Remote.WsMp3d.again.c
**
** [+] Description --
**
** WsMp3d is webserver daemon that can enjoy mp3. (shoutcast-server)
** There is WsMp3 Heap

[ more ]  [ reply ]
MDKSA-2003:058-1 - Updated cdrecord packages fix local root compromise 2003-05-21
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: cdrecord
Advisory ID:

[ more ]  [ reply ]
Demarc Puresecure v1.6 - Plaintext password issue - 2003-05-21
Ryan Purita (ryan totally-connected com)
According to Demarc Puresecure's Website;

Demarc PureSecureTM is a one of a kind, Total Intrusion Detection
System (TIDS), which provides an unsurpassed level of comprehensive
security. For the first time you will be able to reliably prevent,
detect, and deter internal and external th

[ more ]  [ reply ]
MDKSA-2003:059 - Updated lpr packages fix local root vulnerability 2003-05-21
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: lpr
Advisory ID:

[ more ]  [ reply ]
[CLA-2003:653] Conectiva Security Announcement - bugzilla 2003-05-21
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : bugzilla
SUMMARY : Cross site scripting and t

[ more ]  [ reply ]
[RHSA-2003:175-01] Updated gnupg packages fix validation bug 2003-05-21
bugzilla redhat com
---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated gnupg packages fix validation bug
Advisory ID: RHSA-2003:175-01
Issue date: 2003-05-20
Updated on: 2003-05-20
Product: Red Hat

[ more ]  [ reply ]
[AP] Owl Intranet Engine CSS Bug 2003-05-21
methodic libpcap net
CSS bug allowing in session id stealing.. advisory attached.

--
+ Microsoft doesn't believe in free() code.

[ more ]  [ reply ]
Restricted Zone: the OUTLOOK EXPRESS 2003-05-21
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Tuesday, 20 May, 2003

Silent delivery and installation of an executable on a target
computer. No client input other than opening an email or newsgroup
post.

This can be achieved with the default setting of Outlook Express:
RESTRICTED ZONE.

Technically the following never worked, cannot work

[ more ]  [ reply ]
[[ TH 026 Inc. ]] SA #4 - Blackmoon FTP Server cleartext passwords and User enumeration 2003-05-20
Daniel Nyström (exce netwinder nu)
Telhack 026 Inc. Security Advisory - #4
_________________________________________

Name: Blackmoon FTP Server 2.6 Free Edition
Impact: Medium
Date: May 21 / 2003
_________________________________________

Daniel Nyström a.k.a. excE <exce (at) netwinder (dot) nu [email concealed]>

_I N F O_

BlackMoon FTP Server is an FTP dae

[ more ]  [ reply ]
[INetCop Security Advisory] Remote Heap Corruption Overflow vulnerability in WsMp3d. 2003-05-21
dong-h0un U (xploit hackermail com)


==========================================
INetCop Security Advisory #2003-0x82-017.b
==========================================

* Title: Remote Heap Corruption Overflow vulnerability in WsMp3d (Again)

0x01. Description

WsMp3d is webserver daemon that can enjoy mp3. (shoutcast-server)
The

[ more ]  [ reply ]
[INetCop Security Advisory] WsMP3d Directory Traversing Vulnerability. 2003-05-21
dong-h0un U (xploit hackermail com) (1 replies)


==========================================
INetCop Security Advisory #2003-0x82-017.a
==========================================

* Title: WsMP3d Directory Traversing Vulnerability

0x01. Description

WsMp3d is daemon that can enjoy mp3.
This daemon can approach in web, directory traversing

[ more ]  [ reply ]
Security advisory: LSF 5.1 local root exploit 2003-05-22
Tomasz Grabowski (cadence apollo aci com pl)
BadBlue Remote Administrative Interface Access Vulnerability 2003-05-20
mattmurphy (at) kc.rr (dot) com [email concealed] (mattmurphy kc rr com)
BadBlue Remote Administrative Access Vulnerability

I. Synopsis

Affected Systems:
* BadBlue 1.7
* BadBlue 2.0
* BadBlue 2.1
* BadBlue 2.2
Immune Systems:
* BadBlue 2.3

NOTE: BadBlue 1.6 and prior may be impacted; these systems were not tested.

Risk: High (Remote LocalSystem Co

[ more ]  [ reply ]
Maelstrom Local Buffer Overflow Exploit, FreeBSD 4.8 edition 2003-05-20
Knud Erik Højgaard (kain ircop dk) (1 replies)
hey, it's maelort.pl.
#!/usr/bin/perl
# kokanin/DSR, gid games crap for /usr/ports/games/maelstrom -server bug
found by
# Luca Ercoli. This (ret/offset/shellcode) is made for FreeBSD 4.8-RELEASE.
# maelstrom-3.0.5 Asteroids-style game for X Window System
# shellcode by eSDee, he's cool. AV crap

[ more ]  [ reply ]
PHP-Nuke Denial of Service attack and more SQL Injections 2003-05-18
Lorenzo Manuel Hernandez Garcia-Hierro (security lorenzohgh com)


-------

Product: PHP-Nuke

Vendor: Francisco Burzi

Versions Vulnerable:

Francisco Burzi PHP-Nuke 6.0

Francisco Burzi PHP-Nuke 6.5 RC3

Francisco Burzi PHP-Nuke 6.5 RC2

Francisco Burzi PHP-Nuke 6.5 RC1

Francisco Burzi PHP-Nuke 6.5 FINAL

Francisco Burzi PHP-Nuke 6.5 BETA 1

Francisco Burzi P

[ more ]  [ reply ]
PHP-Nuke module PHP-Banner-Exchange path disclosure 2003-05-18
Lorenzo Manuel Hernandez Garcia-Hierro (security lorenzohgh com)


-------

Product: PHP-Nuke

Vendor: F.Burzi

Module: PHP-Banner Exchange

Version: 1.2

-------

Accessing directly to the PHP Banner Exchange module and without a

specified file :

http://[target]/modules/phpbannerexchange/

( phpbannerexchange module directory )

you get this:

Wa

[ more ]  [ reply ]
Blue screen in Windows 2003-05-20
David F. Madrid (idoru videosoft net uy)
Issue :

Blue screen in Windows

Tested versions :

W2000 Server Sp3 with IE 6.0 Sp1
XP Pro with IE 6.0

Vendor status :

MS is investigating the issue but as they spent months to just acknowledge
it I decided to publish it

Description :

With Internet Explorer you can make calls using netmeetin

[ more ]  [ reply ]
More vulnerabilities in ttForum/ttCMS -> SQL injection 2003-05-20
ScriptSlave gmx net
Advisory name: SQL Injection-Bug in ttForum (all versions)
Application: ttForum - all versions
Vendor: www.ttforum.com
Status: Vendor of ttForum was contacted but didn't reply
Impact: Attacker can get Administrator-rights on forum
Platform(s): any

Technical description:
----------------------

Ever

[ more ]  [ reply ]
Maelstrom Local Buffer Overflow Exploit 2003-05-20
akcess . (akcss linuxmail org)
Local exploit for /usr/bin/Maelstrom due to insufficient bounds checking of the -player cmd line arg.

See attached proof-of-concept exploit.

-akcess
--
______________________________________________
http://www.linuxmail.org/
Now with e-mail forwarding for only US$5.95/yr

Powered by Outblaze

[ more ]  [ reply ]
[Fwd: 127 Research and Development: 127 Day!] 2003-05-20
northern snowfall (dbailey27 ameritech net)
Every year, 127 Research chooses an interesting topic, presenting it to
our correspondants just to keep them up-to-date with our vastly
increasing prowess and drive. This year will be the first we bring the
public our yearly analysis. Focused on topics that challenge an
analyst's skill, 127 Day rel

[ more ]  [ reply ]
Plaintext Password in Settings.ini of CesarFTP 2003-05-20
Andreas Constantinides (megahz megahz org)
Cesar FTP v0.99g (latest version)
an FTP Server by http://www.aclogic.com/
it saves the ftp password in file:
c:\Program Files\CesarFTP\settings.ini
in plaintext:

....
Password= "lalala"
Login= "megahz"
Name= "megahz"
....

Discovered by MegaHz
www.megahz.org
megahz (at) megahz (dot) org [email concealed]
www.cyhackportal.co

[ more ]  [ reply ]
(Page 1662 of 1748)  < Prev  1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus