BugTraq Mode:
(Page 1693 of 1748)  < Prev  1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698  Next >
[sorcerer-spells] MAN-SORCERER2003-03-11 2003-03-12
Michael Walton (mwalton abilene com)

--
Michael Walton

Asst-Manager Tech Support
mwalton (at) abilene (dot) com [email concealed]

(915)677-7900

[ more ]  [ reply ]
pgp4pine stack overflow vulnerability 2003-03-12
Eric AUGE (eric auge cw com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Following informations:

I Background:
pgp4pine is a mail encryption/decryption/signature/verification wrapper
to gpg for pine, it is called from pine to parse mail body and get PGP
information from the file.

more information : http://pgp4pine.

[ more ]  [ reply ]
[Opera 7/6] Long Filename Buffer Overflow Vulnerability in Download 2003-03-11
nesumin (nesumin softhome net)
Hi, all.

We release the information about the vulnerability of Opera, here.
And we hope that this vulnerability be fixed by Vendor immediately.

___________________________________________________

-----------------------------------------------------------------
Synopsis: [Opera 7/6]

[ more ]  [ reply ]
802.11b DoS exploit 2003-03-11
Mark Osborne (mark loud-fat-bloke co uk)


While working to develop code for WIDZ that is equivalent to a standard

Intrusion Detection system?s RESET or SHUN functionality, an effective

802.11b disruption of service attack has been discovered. I haven?t

spotted any other postings so here we go?.

FATA-jack - a modified version o

[ more ]  [ reply ]
Re: Corsaire Security Advisory - Clearswift MAILsweeper MIME attachme nt evasion issue 2003-03-11
http-equiv (at) excite (dot) com [email concealed] (http-equiv malware com)


<!--

Step 2: Now create a text file that will be used to hold the MIME
encoded attachment. Start notepad (or another text editor), and
paste
in:

MIME-Version: 1.0
Content-Location:file:///executable.exe
Content-Transfer-Encoding: base64

TVp0AQIAAAAgAAgA//8YAIAAAAAQ

[ more ]  [ reply ]
GLSA: ethereal (200303-10) 2003-03-09
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-10
- - ---------------------------------------------------------------------

PACKAGE : ethereal
SUMMARY : arbitrary

[ more ]  [ reply ]
Re: QPopper 4.0.x buffer overflow vulnerability 2003-03-11
Jonas Frey (jonas frey gmx de)
Hello,

i just checked and got:
Suse 7.3 (qpopper.rpm 4.0.3-34) is vulnerable, you get
id
uid=503(test) gid=0(root) groups=0(root)

(Using Mailuser "test").

Same goes for Suse 8.0 (qpopper-4.0.3-168)

The overflow isnt logged anywhere, you just see normal pop logins.

Jonas

On Mon, 2003-03-10 at

[ more ]  [ reply ]
SOHO Routefinder 550 VPN, DoS and Buffer Overflow 2003-03-11
Peter Kruse (kruse krusesecurity dk)
Name: SOHO Routefinder 550 VPN, DoS and Buffer Overflow
Date: 11th of Marts 2003
Software affected: RF550VPN Firmware v463, v464 beta
(prior versions are vulnerable - other models might
be affected as well!)
Advisory:
http://www.krusesecurity.dk/advisorie

[ more ]  [ reply ]
Re: .MHT Buffer Overflow in Internet Explorer 2003-03-11
http-equiv (at) excite (dot) com [email concealed] (http-equiv malware com)


<!--
The following sample format contains malformed MIME header along with
the Base64 encoded executable.

----------------------------------------------
MIME-Version: 1.0
------=_NextPart_000_0000_01C2E1F4.0D559EA0
Content-Location:file:///tomatell.exe
Content-Transfer-Encoding: base64

[ more ]  [ reply ]
Vulnerability in man < 1.5l 2003-03-11
Jack Lloyd (lloyd acm jhu edu)

man 1.5l was released today, fixing a bug which results in arbitrary code
execution upon reading a specially formatted man file. The basic problem
is, upon finding a string with a quoting problem, the function my_xsprintf
in util.c will return "unsafe" (rather than returning a string which could
be

[ more ]  [ reply ]
[Summary of Responses] Bound by Tradition: A sampling of the security posture of the Internet's DNS servers 2003-03-11
Mike Schiffman (mike infonexus com) (1 replies)
- Chris Gordon <chris.gordon (at) gettyimages (dot) com [email concealed]> has been watching DNS
traffic at www.dshield.org and was wondering if "something was coming"
and wanted to know if I had seen anything to indicate a DNS worm or
virus was propagating. Chris, I have not noticed anything along those
lines but all I did was

[ more ]  [ reply ]
.MHT Buffer Overflow in Internet Explorer 2003-03-10
Tom Tanaka (tomatell canon-sol jp) (2 replies)


CANON SYSTEM SOLUTIONS INC. Security Alert

VULNERABILITY:.MHT Buffer Overflow in Internet Explorer

DATE FOUND:March 2, 2003

Severity:High Risk(code can be executed remotely)

========================================================================
==

====

SUMMARY:

IE5 introduced the

[ more ]  [ reply ]
Re: .MHT Buffer Overflow in Internet Explorer 2003-03-11
Jouko Pynnonen (jouko solutions fi)
Re: .MHT Buffer Overflow in Internet Explorer 2003-03-11
jelmer (jelmer kuperus xs4all nl)
QPopper 4.0.x buffer overflow vulnerability 2003-03-10
Florian Heinz (heinz cronon-ag de) (2 replies)
Hello,

Under certain conditions it is possible to execute arbitrary code using
a buffer overflow in the recent qpopper.

You need a valid username/password-combination and code is (depending on
the setup) usually executed with the user's uid and gid mail.

Explanation:

Qualcomm provides their own

[ more ]  [ reply ]
Re: QPopper 4.0.x buffer overflow vulnerability 2003-03-12
Randall Gellens (rg_public 1 flagg qualcomm com)
Re: QPopper 4.0.x buffer overflow vulnerability 2003-03-12
Torsten Mueller (torsten archesoft de) (1 replies)
Re: QPopper 4.0.x buffer overflow vulnerability 2003-03-12
Florian Heinz (heinz cronon-ag de)
[SNS Advisory No.63] DeleGate Pointer Array Overflow May Let Remote Users Execute Arbitrary Code 2003-03-10
Secure Net Service(SNS) Security Advisory (snsadv lac co jp)
----------------------------------------------------------------------
SNS Advisory No.63
DeleGate Pointer Array Overflow May Let Remote Users Execute Arbitrary Code

Problem first discovered on: Sun, 02 Mar 2003
Published on: Mon, 10 Mar 2003
--------------------------------------------------------

[ more ]  [ reply ]
Security Update: [CSSA-2003-010.0] Linux: remote buffer overflow in sendmail (CERT CA-2003-07) 2003-03-10
security sco com
To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: Linux: remote buffer overflow in sendmail (CERT CA-2003-07)
Advisory number: CSSA-2003-010.

[ more ]  [ reply ]
Security Update: [CSSA-2003-011.0] Linux: format string vulnerability in zlib (gzprintf) 2003-03-10
security sco com
To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: Linux: format string vulnerability in zlib (gzprintf)
Advisory number: CSSA-2003-011.0
Iss

[ more ]  [ reply ]
[SECURITY] [DSA 258-1] New ethereal packages fix arbitrary code execution 2003-03-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 258-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 10th, 2003

[ more ]  [ reply ]
Security Update: [CSSA-2003-SCO.4.1] UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : REVISED: Lax permissions on /dev/X 2003-03-10
security sco com
To: ler (at) lerctr (dot) org [email concealed] bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : REVISED: Lax permissions on /dev/X
Advisory number: CSSA-2003-

[ more ]  [ reply ]
Re: MySQL user can be changed to root 2003-03-10
Sergei Golubchik (serg mysql com)
Hi!

Both to bugtraq and mysql list:

This issue has been adressed in 3.23.56 (release build is started
today), and some steps were taken to alleviate the threat.

In particular, MySQL will no longer read config files that are
world-writeable (and SELECT ... OUTFILE always creates world-writeable
fi

[ more ]  [ reply ]
PHP-Nuke 6.0 & 6.5RC2 SQL Injection Again 2003-03-10
Frog Man (leseulfrog hotmail com)


Informations :
°°°°°°°°°°°°°°
Language : PHP
Website : http://www.phpnuke.org
Version : 6.0 & 6.5 RC2
Modules : Forums, Private_Messages
Problem : SQL Injection

PHP Code/Location :
°°°°°°°°°°°°°°°°°°°
/modules/Forums/viewtopic.php :

--------------------------------------------------------------

[ more ]  [ reply ]
Cross-Referencing Linux vulnerability 2003-03-11
Albert Puigsech Galicia (ripe 7a69ezine org)
Info.
-----

+ Type: To gain visibility

+ Software: Cross-Referencing Linux.

+ Verions: until 0.9.2

+ Exploit: Si.

+ Autor: Albert Puigsech Galicia

+ Contact: ripe (at) 7a69ezine (dot) org [email concealed]

Introduction.
-------------

Cross-Referencing Linux, as known as LXR, allow read all linux kernel

[ more ]  [ reply ]
MDKSA-2003:029 - Updated snort packages fix buffer overflow vulnerability 2003-03-06
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: snort
Advisory ID:

[ more ]  [ reply ]
(Page 1693 of 1748)  < Prev  1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus