|
Colapse all |
Post message
Poisonous Style for Dialog window turns the zone off. 2002-12-03 Liu Die Yu (liudieyuinchina yahoo com cn) MDKSA-2002:085 - Updated WindowMaker packages fix buffer overflow vulnerability 2002-12-03 Mandrake Linux Security Team (security linux-mandrake com) Local Netfilter / IPTables IP Queue PID Wrap Flaw 2002-12-03 James Morris (jmorris intercode com au) (1 replies) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Netfilter Core Team Security Advisory Subject: Local Netfilter / IPTables IP Queue PID Wrap Flaw Released: December 3, 2002. Effects: Under limited circumstances, an unprivileged local user may be able [ more ] [ reply ] Re: Local Netfilter / IPTables IP Queue PID Wrap Flaw 2002-12-03 James Morris (jmorris intercode com au) CORE-20021005: Vulnerability Report For Linksys Devices 2002-12-03 Carlos Sarraute (carlos corest com) CORE Security Technologies http://www.corest.com Vulnerability Report For Linksys Devices Date Published: 2002-12-02 Last Update: 2002-12-02 Advisory ID: CORE-20021005 Bugtraq ID: None currently assigned. CVE: None currently assigned. Title: Remotely exploitable Buffer overflows and Authent [ more ] [ reply ] MDKSA-2002:084 - Updated pine packages fix buffer overflow vulnerability 2002-12-03 Mandrake Linux Security Team (security linux-mandrake com) GLSA: pine 2002-12-02 Daniel Ahlberg (aliz gentoo org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200212-1 - - -------------------------------------------------------------------- PACKAGE : pine SUMMARY : remote DOS DATE : 2002-12-02 13:12 [ more ] [ reply ] Advisory: Lawson Financials RDBMS Insecurity 2002-12-02 John Eisenschmidt (jweisen eisenschmidt org) +----------------------------------------------------------------------- + | Advisory: lawson001 | | Author(s): John Eisenschmidt <john.w (at) eisenschmidt (dot) org [email concealed]> | | George Lewis <schvin (at) schvin (dot) net [email concealed]> | | Release Date: December 02, 2002 | | [ more ] [ reply ] Lag Security Advisory - Com21 cable modem configuration file feeding vulnerability 2002-11-28 David Laganière (spanska securinet qc ca) I have no idea if this went out somehow, but here it is. I completely apologize if this has been posted in the past. This is the second time I post this one on Bugtraq. It didn't get through for an unknown reason and there aren't any records about it on the SecurityFocus website so I guess it was [ more ] [ reply ] Advisory: Webster HTTP Server 2002-12-01 Matthew Murphy (mattmurphy kc rr com) ABSTRACT Webster HTTP Server is an HTTP/1.0 server written in C++ using Microsoft Foundation Classes (MFC). It runs on Windows 95, 98, NT, 2000, Me, and XP platforms. It was first published as a sample application in Microsoft Journal (MSJ). Multiple security flaws have been identified in Webste [ more ] [ reply ] Multiple pServ Remote Buffer Overflow Vulnerabilities 2002-12-01 Matthew Murphy (mattmurphy kc rr com) There are multiple buffer overflow bugs in pServ that could lead to a remote (root?) compromise of public servers running the daemon: ABSTRACT Pico Server (pServ) is a freeware web server available at pserv.sourceforge.net running on many POSIX compliant platforms. The package contains several ex [ more ] [ reply ] Re: CAIS-ALERT: Vulnerability in the sending requests control of BIND 2002-12-02 Robert Tracz (rtracz tele pw edu pl) Hi Ivan, Ivn Arce wrote: >>>+ /* >>>+ * The 16 bit space is very small and brute force attempts are >>>+ * entirly feasible, we skip a random number of transaction ids >>>+ * so that an attacker will not get sequential ids. >>>+ */ >> >>Using only brute force, the attack is very difficult to b [ more ] [ reply ] [RHSA-2002:196-19] Updated xinetd packages fix denial of service vulnerability 2002-12-02 bugzilla redhat com Bypassing Integrity Protection Driver (time vulnerability) 2002-12-02 Jan Rutkowski (jkrutkowski elka pw edu pl) Bypassing Pedestal Software Integrity Protection Driver (time vulnerability) Jan K. Rutkowski jkrutkowski (at) elka.pw.edu (dot) pl [email concealed] What is IPD? ------------ Taken from the IPD's readme: "The IPD is an Open Source device driver designed to prohibit the installation of new services and [ more ] [ reply ] [VU#317417] Denial of Service condition in vxworks ftpd/3com nbx 2002-12-02 Michael S. Scheidell (Scheidell secnap com) Information: Name: 3com NBX IP phone system Denial of Service Attack Systems: 3com NBX IP Phone Call manager, FW Versions through 4_1_4 Severity: Critical Category: Denial of Service Classification: Boundary Condition Error Vendor URL: http://www.3com.com Author: Michael S. Scheidell (scheide [ more ] [ reply ] pre-login buffer overflow in Cyrus IMAP server 2002-12-02 Timo Sirainen (tss iki fi) problem ------- Cyrus IMAP server has a a remotely exploitable pre-login buffer overflow. I checked versions 1.4 (oldest in web page) and 2.1.10 which both had it, so apparently all versions are affected. Problem is that literal lengths aren't verified to be in any reasonable range. The length + 2 [ more ] [ reply ] ShopFactory shopping cart price manipulation 2002-12-02 Richard van den Berg (richard trust-factory com) possible virus break in german exchange option of Inoculate IT 6.0 2002-12-02 tigerblue puzzleapuma de Hi there, there is a possible virus break through in Computer Associates E-Trust Inoculate IT 6.0 Exchange Option German on M$ Exchange 2000 German. The CA´s E-Trust Inoculate IT 6.0 Exchange-Option is a antivirus product which can be used to scan incoming email-traffic and background scan of the [ more ] [ reply ] Cyrus Sieve / libSieve buffer overflow 2002-12-02 Timo Sirainen (tss iki fi) problem ------- Cyrus' Sieve implementation contains a couple of classic string based buffer overflows in script parsing code. Anyone who can execute Sieve scripts can exploit these bugs. Versions up to libSieve 2.1.2 and Cyrus IMAP 2.1.10 are affected. Note that with Cyrus IMAP server exploiting [ more ] [ reply ] RE: Exploit for traceroute-nanog overflow 2002-12-02 Carl Livitt (carl learningshophull co uk) Hi all, Further to my email posting a working exploit for traceroute-nanog on SuSE boxes, it would appear the the patch provided by SuSE does not address the overflow my exploit... um... exploits. On a patched SuSE 7.2 box: carl@titan:~/exploits/traceroute-nanog > rpm -qa | grep traceroute tra [ more ] [ reply ] [SECURITY] [DSA 201-1] New Free/SWan packages fix denial of service 2002-12-02 joey infodrom org (Martin Schulze) Potential Vuln in McAfee VirusScan 451 2002-11-29 jari helenius mawaron com Potential security vulnerability in Network Associates McAfee VirusScan 4.5.1sp1 product with ability to run code of attackers choise BACKGROUND If Download Scan or Internet Filter is enabled program uses WebScanX.exe module. When running WebScanX.exe is hooked also in explorer.exe. If %HOMEDRIVE [ more ] [ reply ] Thatware (PHP) 2002-12-01 Frog Man (leseulfrog hotmail com) Informations : °°°°°°°°°°°°°° Versions : ? -> 0.3 -> 0.5.3 Website : http://www.thatware.org Problems : - Include file - SQL Injection PHP Code/Location : °°°°°°°°°°°°°°°°°°° artlist.php (v0.5.2, 0.5.3) : ------------------------------------- include $root_path.'thatfile.php'; -------------------- [ more ] [ reply ] RE: User downgraded from Administrator to User retains the ability to list other user's running tasks 2002-11-29 Eitan Caspi (eitan_c 012 net il) Hello John, 1. Yes, the downgrading process is made by the "master" admin while the test user is completely logged off and don't have any current local login session. Please read the reproduction steps to follow. The test user is logged off to make sure its profile has completely and correctly sav [ more ] [ reply ] |
|
Privacy Statement |
Poisonous Style for Dialog window turns the zone off.
("that's all" is the end of file if you are in a hurry)
[tested]
MSIEv6(CN version)
Patch: Q312461,Q328790(MS02-066)
{IEXPLORE.EXE file version: 6.0.2600.0000}
{MSHTML.DLL file version: 6.00.2600.0000}
[demo]
at
http://www16.brin
[ more ] [ reply ]