|
Colapse all |
Post message
[SECURITY] [DSA 226-1] New xpdf-i packages fix arbitrary command execution 2003-01-10 joey infodrom org (Martin Schulze) [VSA0303] Half-Life StatsMe remote (root) hole 2003-01-11 VOID.AT Security (crew void at) [void.at Security Advisory VSA0303] Overview ======== "statsme"[1] is a popular plugin for the Half-Life Dedicated Server (hlds). hlds is not only the server for the most popular online game today, "Counter-Strike", but for many other games too. Two security bugs in statsme make it possible to ex [ more ] [ reply ] Mambo Site Server Remote Code Execution 2003-01-11 mindwarper hush com -----BEGIN PGP SIGNED MESSAGE----- Mambo PHP-Portal Vulnerability ( By Mindwarper :: mindwarper (at) hush (dot) com [email concealed] :: ) <------- -------> - ---------------------- Vendor Information: - ---------------------- Homepage : http://www.mamboserver.com Vendor : informed Mailed advisory: 09/01/03 Vender Response [ more ] [ reply ] Security Update: [CSSA-2003-SCO.1] UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer overflow in ps 2003-01-10 security caldera com To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] scoannmod (at) xenitec.on (dot) ca [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] ________________________________________________________________________ ______ SCO Security Advisory Subject: UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer overflo [ more ] [ reply ] Mambo Site Server Remote Code Execution 2003-01-10 Mindwarper (logger hehe com) Mambo PHP-Portal Vulnerability ( By Mindwarper :: logger (at) hehe (dot) com [email concealed] :: ) <------- -------> ---------------------- Vendor Information: ---------------------- Homepage : http://www.mamboserver.com Vendor : informed Mailed advisory: 09/01/03 Vender Response : None yet ---------------------- Affecte [ more ] [ reply ] [VSA0305] HLTV remote DoS 2003-01-10 VOID.AT Security (crew void at) [void.at Security Advisory VSA0305] HLTV offers the ability to have thousands of spectators watch online games on Half-Life-servers. Overview ======== By sending a specially crafted packet to the hltv-server, an attacker can cause the server to crash. Affected Versions ================= The one [ more ] [ reply ] [VSA0304] Half-Life Client remote hole via Adminmod plugin 2003-01-10 VOID.AT Security (crew void at) (1 replies) [void.at Security Advisory VSA0304] Half-Life is the underlying game for the most popular online game today, "Counter-Strike", and others. Adminmod is a popular plugin to the half-life-server. Overview ======== Due to a format string in the Half-Life *client*, it is possible for an attacker who [ more ] [ reply ] Re: [VSA0304] Half-Life Client remote hole via Adminmod plugin 2003-01-11 3APA3A (3APA3A SECURITY NNOV RU) [VSA0301] Half-Life Clanmod remote (root) hole 2003-01-10 VOID.AT Security (crew void at) [void.at Security Advisory VSA0301] Clanmod[1] is a plugin for the "Half-Life Server", hosting the most popular online game today, "Counter-Strike", among others. Overview ======== Due to a format string bug in clanmod, it is possible for a remote attacker who knows the rcon-password to remotely [ more ] [ reply ] More information regarding Etherleak 2003-01-10 Ofir Arkin (ofir sys-security com) This e-mail's purpose is to clear several issues surrounding the Etherleak paper: - Who is Vulnerable? - Why this vulnerability is so wide spread? - Why the examples are only with Linux device drivers? - Why we have contacted CERT? - Are Device Drivers under Microsoft-based OSs are vulnerable? - H [ more ] [ reply ] BRS WebWeaver FTP Server vulnerabilities 2003-01-10 euronymous (just-a-user yandex ru) =:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::= topic: BRS WebWeaver FTP Server vulnerabilities product: BRS WebWeaver 1.01 (FTP Server) vendor: http://www.bsoutham.org/WebWeaver/ risk: high date: 01/10/2k3 discovered by: euronymous /F0KP /R00tC0de advisory urls: http://f0kp.iplus.ru/bz/012.en.t [ more ] [ reply ] MDKSA-2003:001 - Updated CUPS packages fix multiple vulnerabilities 2003-01-10 Mandrake Linux Security Team (security linux-mandrake com) MDKSA-2003:003 - Updated dhcpcd packages fix character expansion vulnerability 2003-01-10 Mandrake Linux Security Team (security linux-mandrake com) Efficient Networks 5861 DSL Router 2003-01-10 Greg Bolshaw (greg optionsinternet com) Product: Efficient Networks 5861 DSL Router http://www.efficient.com/ebz/5800.html Tested version: 5.3.80 (Latest firmware) Advisory date: 10/01/2003 Severity: Moderate Background "Efficient Networks® Business Class IDSL, ADSL, or SDSL Routers provide DSL access for up to 100 or more users wi [ more ] [ reply ] WebIntelligence session hijacking vulnerability 2003-01-09 Dirk Van Droogenbroeck (dirk vandroogenbroeck ubizen com) Ubizen Security Intelligence Lab Security Advisory SIL/03/001 ---------------------------------------- Product: WebIntelligence(r) Tested version: 2.7.1 Advisory date: Jan 09, 2003 Vulnerability type: session hijacking leading to remote unauthorized access Severity: High ------------------------- [ more ] [ reply ] Security Update: [CSSA-2003-001.0] Linux: fetchmail at-sign buffer overflow vulnerability 2003-01-09 security caldera com To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] ________________________________________________________________________ ______ SCO Security Advisory Subject: Linux: fetchmail at-sign buffer overflow vulnerability Adv [ more ] [ reply ] IMP 2.x SQL injection vulnerabilities 2003-01-08 Jouko Pynnonen (jouko solutions fi) (1 replies) IMP is a popular webmail package written in PHP. It ships with some UNIX systems and is also used on Windows servers. The version 2 of the program contains some SQL injection flaws which allow any remote user to access the webmail system's database. Valid user authentication is not required in [ more ] [ reply ] RE: KaZaA - Bad Zone 2003-01-08 Young, Keith (Keith Young co mo md us) (slightly off topic) > Kazaa lite doesnt have ads or spyware. http://www.kazaalite.com/ > > PLUS it works great with Wine (http://www.winehq.com/) :) One problem (at least to firewall administrators trying to block P2P apps) is that KazaaLite pre-populates a specific registry key that has inform [ more ] [ reply ] Re: KaZaA - Bad Zone 2003-01-08 Gideon12 (gideon12 rocketmail com) Just be aware that, in order to stop pop up ads, Kazaa Light installs its own HOSTS file into %Windir%. This has the negative affect of not allowing you to view several legitimate web sites, including Yahoo Maps, since the HOSTS file redirects the URL to your loopback adapter. ------ Kazaa lite d [ more ] [ reply ] Re[2]: Opentype font file causes Windows to restart. 2003-01-07 Andrew (aconnell xtra co nz) I have not yet investigated the problem thoroughly, but as far as I'm aware it's caused by complicated outlines -- the font file contains only 1 character, with about 1000 points in it. If anyone wishes to examine the file in depth, I'd recommend using TTX (http://www.letterror.com/code/ttx/ ) - it [ more ] [ reply ] a.shopKart Shopping Cart remote vulnerabilities 2003-01-08 Ignacio Vazquez (infosecmanager centaura com ar) Centaura Technologies Security Research Lab Advisory Product Name: a.shopKart Web Shopping Cart Systems: Windows NT/2000/.NET Server Severity: High Risk Remote: Yes Category: Insuficient input checking Vendor URL: http://www.urlogy.com Advisory Author: Ignacio Vazquez Advisory URL: http://www.centa [ more ] [ reply ] IEHK Project 2003-01-08 Valgasu (valgasu rstack org) The past months (years ?) several people found a lot of methods and/or vulnerabilities on Internet Explorer which could be exploit for silent delivery and arbitrary program execution. This people are well known : Jelmer, Malware, SandBlad, Guninski, GreyMagic, Thor Larholm, Liu Die Yu, ... When I s [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 226-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 10th, 2003
[ more ] [ reply ]