BugTraq Mode:
(Page 1738 of 1748)  < Prev  1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743  Next >
[RHSA-2002:262-07] New kernel fixes local denial of service issue 2002-11-16
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: New kernel fixes local denial of service issue
Advisory ID: RHSA-2002:262-07
Issue date: 2002-09-23
Updated on: 2002-11-16
Product:

[ more ]  [ reply ]
Security Update: [CSSA-2002-047.0] Linux: KDE SSL and XSS vulnerabilities 2002-11-16
security caldera com

To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: Linux: KDE SSL and XSS vulnerabilities
Advisory number: C

[ more ]  [ reply ]
Remote Buffer Overflow vulnerability in Zeroo HTTP Server. 2002-11-16
dong-h0un U (xploit hackermail com)


========================================
INetCop Security Advisory #2002-0x82-004
========================================

* Title: Remote Buffer Overflow vulnerability in Zeroo HTTP Server.

0x01. Description

Zeroo HTTP Server is simple and fast webserver.
Many overflow bugs exist innumer

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-02:41.smrsh [REVISED] 2002-11-15
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----

========================================================================
=====
FreeBSD-SA-02:41.smrsh Security Advisory
The FreeBSD Project

Topic: smrsh restric

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-02:43.bind [REVISED] 2002-11-15
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----

========================================================================
=====
FreeBSD-SA-02:43.bind Security Advisory
The FreeBSD Project

Topic: multiple vuln

[ more ]  [ reply ]
[SECURITY] [DSA-196-1] New BIND packages fix several vulnerabilities 2002-11-14
Daniel Jacobowitz (dan debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 196-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Daniel Jacobowitz
November 14th, 2002

[ more ]  [ reply ]
[OpenPKG-SA-2002.011] OpenPKG Security Advisory (bind, bind8) 2002-11-15
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Security holes... Who cares? 2002-11-15
Eric Rescorla (ekr rtfm com)
I'd like to announce the availability for downlaod of the following
paper.

Security holes... Who cares?

Eric Rescorla
RTFM, Inc. <http://www.rtfm.com/>

We report on an observational study of user response following the
Op

[ more ]  [ reply ]
Re: ZDnet forum: IE formatting local drive 2002-11-14
Gossi The Dog (gossi lab6 com)
FYI, the HTML code is;

------------------------------------------------------------------------

<html>
<head>
</head>

<script LANGUAGE="JavaScript">

prog = 'command';
args = '/k format a: /autotest';

if (!location.hash) {
showHelp(location+"#1");
showHelp("iexplore.chm");
blur();
}
els

[ more ]  [ reply ]
Re: MS02-064 fix time 2002-11-15
Steven M. Christey (coley linus mitre org)

David Litchfield said:

>I warned MS of this back in on September 6th 1999 whilst 2k was still
>in BETA (See the bottom of the following mail)
>http://security-archive.merton.ox.ac.uk/bugtraq-199909/0145.html
>
>I wonder if this is the longest time it has taken for a "fix" to be
>made public after

[ more ]  [ reply ]
Unofficial statement re: tcpdump and libpcap 2002-11-13
Alan DeKok (aland freeradius org)
-----BEGIN PGP SIGNED MESSAGE-----

There was a post on Slashdot recently [1] about a trojan in tcpdump
and libpcap. The post referred to two web pages [2], and [3], which
describe the trojan.

Unfortunately, the web pages at this time say nothing about whether
or not the maintainers of tcpdump

[ more ]  [ reply ]
RE: When scrubbing secrets in memory doesn't work 2002-11-14
Michael Wojcik (Michael Wojcik microfocus com)
> From: Jan Echternach [mailto:jan (at) goneko (dot) de [email concealed]]
> Sent: Monday, November 11, 2002 11:47 AM

> On Fri, Nov 08, 2002 at 05:23:34PM +0100, Michael Zimmermann wrote:
> > Not to declare the intermediate storage for sensitive
> > data as 'volatile' is a coding flaw. An esily overlooked
> > one, yes, but nev

[ more ]  [ reply ]
MDKSA-2002:077 - bind update 2002-11-14
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: bind
Advisory ID:

[ more ]  [ reply ]
arp spoofing defence 2002-11-14
Ilya Teterin (alien npp-integris ru)
Here is a patch http://securitylab.ru/_tools/antidote2.diff.gz for linux
kernel (2.4.18 and .19 tested) to resisting ARP spoofing.

If applied, it brings a new sysctl parameter:

net.ipv4.neigh.<interface name>.arp_antidote

that defines kernel behaviour when changes in correspondence between MAC
an

[ more ]  [ reply ]
[CLA-2002:546] Conectiva Linux Security Announcement - bind 2002-11-14
secure conectiva com br
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : bind
SUMMARY : Remote vulnerabilities in the

[ more ]  [ reply ]
Security Update: [CSSA-2002-045.0] Linux: python insecure temporary files in os._execvpe 2002-11-14
security caldera com
To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: Linux: python insecure temporary files in os._execvpe
Advi

[ more ]  [ reply ]
GLSA: kdenetwork 2002-11-14
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200211-004
- - --------------------------------------------------------------------

PACKAGE : kdenetwork
SUMMARY : rlogin.protocol and telnet.pr

[ more ]  [ reply ]
Perception LiteServe HTTP CGI Disclosure Vulnerability 2002-11-14
mattmurphy (at) kc.rr (dot) com [email concealed] (mattmurphy kc rr com)
Christopher Fillion's "Perception" web site hosts the LiteServe combination
server for Win32. The server offers HTTP, FTP, SMTP, POP3, and Telnet
services. Included in the HTTP service is a Common Gateway Interface (CGI)
feature that allows you to specify a CGI alias, as well as "filters" that
are

[ more ]  [ reply ]
[CLA-2002:547] Conectiva Linux Security Announcement - syslog-ng 2002-11-14
secure conectiva com br
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : syslog-ng
SUMMARY : Buffer overflow vulnerabi

[ more ]  [ reply ]
Better security through shame 2002-11-14
Michael Bacarella (mbac netgraft com)
STAFF: Humbly submitted for your subscribers.

The Peon's Guide To Secure System Development

Abstract:

Increasingly incompetent developers are creeping their way into
important projects. Considering that most good programmers are pretty
bad at security, bad programmers with roles in important proj

[ more ]  [ reply ]
RE: Opera 7 vulnerabilities 2002-11-14
Thor Larholm (thor pivx com)
Monitoring which pages a user visits is also possible, and in general there
seems to be some oversights in this otherwise smooth rewrite.

Add to that some of the more odd bugs functionalitywise, and I would say
there is room for a beta 2 ;)

Regards
Thor Larholm, Security Researcher
PivX Solutions

[ more ]  [ reply ]
RE: ZDnet forum: IE formatting local drive 2002-11-14
Thor Larholm (thor pivx com)
This is just a copy of Andreas Sandblads advisory, with a new command :)

Regards
Thor Larholm, Security Researcher
PivX Solutions, LLC

Strike Now, StrikeFirst!
http://www.pivx.com/sf.html

-----Original Message-----
From: Alan Rouse [mailto:ARouse (at) n2bb (dot) com [email concealed]]
Sent: 11. november 2002 17:22
To: bugtra

[ more ]  [ reply ]
[ESA-20021114-029] BIND buffer overflow, DoS attacks. 2002-11-14
EnGarde Secure Linux (security guardiandigital com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+-----------------------------------------------------------------------
-+
| EnGarde Secure Linux Security Advisory November 14, 2002 |
| http://www.engardelinux.org/ ESA-20021114-029 |
|

[ more ]  [ reply ]
Opera 7 vulnerabilities 2002-11-14
GreyMagic Software (security greymagic com)
We've done some basic security tests, in cooperation with Tom Gilder, on the
new Opera 7 beta release and found two major security vulnerabilities. These
vulnerabilities are quite obvious and likely to be discovered by malicious
users.

Combined, they allow full read access to a victim's file system

[ more ]  [ reply ]
Netscape/Mozilla: Exploitable heap corruption via jar: URI handler. 2002-11-14
zen-parse (zen-parse gmx net)
The following is the text of an advisory (with a couple of typos fixed)
that was sent to Netscape in early July.
(-rw-r--r-- 1 root root 3210 Jul 8 17:07 jar-writeup)

This was one a several vulnerabilities reported in Netscape/Mozilla over
that period. (Others included the previou

[ more ]  [ reply ]
RE: Exploit code for IP Smart Spoofing 2002-11-14
Stephen Gill (gillsr yahoo com)
Laurent,
Thanks for your note. In reality IP Smartspoofing is no different than
ARP cache poisoning so I'm not entirely sure why a new name was
"invented". In this particular case one is able to prevent the
following:
- key ports and corresponding MAC entries are hardcoded and secured (ie
gateway

[ more ]  [ reply ]
(Page 1738 of 1748)  < Prev  1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus