|
Colapse all |
Post message
[SECURITY] [DSA 244-1] New noffle packages fix buffer overflows 2003-01-27 joey infodrom org (Martin Schulze) [ESA-20030127-001] MySQL vulnerabilities 2003-01-27 EnGarde Secure Linux (security guardiandigital com) Hypermail buffer overflows 2003-01-27 Ulf Harnhammar (ulfh update uu se) Hypermail buffer overflows PROGRAM: Hypermail HOMEPAGE: http://www.hypermail.org/ SOURCEFORGE PAGE: http://sourceforge.net/projects/hypermail/ VULNERABLE VERSIONS: 2.1.3, 2.1.4, 2.1.5, possibly others IMMUNE VERSIONS: 2.1.6 DESCRIPTION: "Hypermail 2 is a much enhanced version of the popular too [ more ] [ reply ] [ESA-20030127-002] fetchmail-ssl: heap overflow vulnerability 2003-01-27 EnGarde Secure Linux (security guardiandigital com) Sun Microsystems Solaris at -r job name handling and race condition vulnerabilities 2003-01-27 Wojciech Purczynski (cliph isec pl) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Synopsis: at -r job name handling and race condition vulnerabilities Product: Sun Microsystems Solaris Version: all URL: http://isec.pl/vulnerabilities/isec-0008-sun-at.txt Author: Wojciech Purczynski <cliph (at) isec (dot) pl [email concealed]> Date: November 1, 2002 Update: [ more ] [ reply ] New security tool: ike-scan (IPsec IKE scanner) released 2003-01-27 Roy Hills (Roy Hills nta-monitor com) (1 replies) I'm releasing a tool that I've developed to discover and fingerprint systems running IKE (i.e. IPsec VPN systems). The program is written in C and runs on Linux and most Unix-like systems. It's being released under the GPL license. See: http://www.nta-monitor.com/ike-scan/ I recommend that you [ more ] [ reply ] Re: New security tool: ike-scan (IPsec IKE scanner) released 2003-01-27 Philipp Wuensche (cryx gate5 de) dotproject Remote File Access Vulnerability 2003-01-26 mindwarper hush com dotproject Remote File Access Vulnerability ( By Mindwarper :: mindwarper (at) hush (dot) com [email concealed] :: ) <------- -------> ---------------------- Vendor Information: ---------------------- Homepage : http://www.dotproject.net Vendor : informed Mailed advisory: 26/01/02 Vender Response : None ----------------- [ more ] [ reply ] Re: Zorum Portal (PHP) 2003-01-26 Frog Man (leseulfrog hotmail com) A patch has been created for this hole and can be found on http://www.phpsecure.org/. >From: MGhz <magas (at) mail (dot) lt [email concealed]> >To: bugtraq (at) securityfocus (dot) com [email concealed] >Subject: Zorum Portal (PHP) >Date: 22 Jan 2003 19:45:26 -0000 > > > >Version : 3.0;3.1;3.2 >Website : http://zorum.phpoutsourcing.com/ >Problem : [ more ] [ reply ] Tool: Sapphire SQL Worm Scanner 2003-01-26 Marc Maiffret (marc eeye com) We had a lot of requests to put together a quick free scanner, like we've done in the past, for this SQL worm. This is the first version and it is bound to have bugs. Feel free to email me any issues directly and we can work on them. The scanner is non-intrusive, wont crash your servers, in identi [ more ] [ reply ] Sapphire SQL Worm Analysis Complete 2003-01-25 Matthew Murphy (mattmurphy kc rr com) I've completed an analysis of the 'Sapphire' SQL worm targeting MS-SQL servers. Some have reported massive slowdowns. An interesting part of this worm results from its use of UDP. Attacked hosts/networks may generate ICMP Host/Port Unreachable messages in response to a Sapphire attack, amplifying [ more ] [ reply ] RE: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434! 2003-01-25 John Howie (JHowie securitytoolkit com) (1 replies) Jason, I can't believe you wrote this - seriously, I can't. > > As of now we don't know who wrote the worm, but we do know that it looks > like a concept worm with no malicious payload. There is a good argument to > be made in favor of such worms. > What good can come of a widespread DoS of the [ more ] [ reply ] RE: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434! 2003-01-26 Arne Vidstrom (arne vidstrom ntsecurity nu) |
|
Privacy Statement |
Hash: SHA1
- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 244-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 27th, 2003
[ more ] [ reply ]