|
Colapse all |
Post message
[SECURITY] [DSA-190-1] buffer overflow in Window Maker 2002-11-07 Wichert Akkerman (wichert wiggy net) Linksys security contact 2002-11-07 David Endler (dendler idefense com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 FYI starting today, Linksys has created the address security (at) linksys (dot) com [email concealed] to receive information on vulnerabilities within any of their products. Additionally the iDEFENSE advisory, 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast [ more ] [ reply ] [CLA-2002:544] Conectiva Linux Security Announcement - linuxconf 2002-11-06 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : linuxconf SUMMARY : Open relay in mailconf mo [ more ] [ reply ] How to execute programs with parameters in IE - Sandblad advisory #10 2002-11-06 Andreas Sandblad (sandblad acc umu se) Re: Oracle Security Contact 2002-11-06 Steven M. Christey (coley linus mitre org) (1 replies) On the full-disclosure list, low halo asked: >Could someone please give me the security contact address for Oracle >Corporation? It seems as though their marketing department's >"Unbreakable" slogan makes them think that its OK to bury their >security advisories & contact info deep within their s [ more ] [ reply ] [SECURITY] [DSA 189-1] New luxman packages fix local root exploit 2002-11-06 joey infodrom org (Martin Schulze) iDEFENSE Security Advisory 11.06.02: Non-Explicit Path Vulnerability in LuxMan 2002-11-06 David Endler (dendler idefense com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 iDEFENSE Security Advisory 11.06.02: http://www.idefense.com/advisory/11.06.02.txt Non-Explicit Path Vulnerability in LuxMan November 6, 2002 I. BACKGROUND Frank McIngvale's LuxMan is a Linux-based game similar to Pac Man. More information about it is [ more ] [ reply ] Re: ZoneEdit Account Hijack Vulnerability 2002-11-06 securityfocus zoneedit com In-Reply-To: <000701c284d5$ccf1e2e0$0300a8c0 (at) SECONDMOTION (dot) LOCA [email concealed]L> > >The webmasters of this site were informed of this vulnerability on >05 November 2002. To date, no useable information on protecting >against this vulnerability has been received. > Matt and Paul were contacted on 05 Novem [ more ] [ reply ] [CLA-2002:535] Conectiva Linux Security Announcement - glibc 2002-10-29 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : glibc SUMMARY : Fix for several vulnerabiliti [ more ] [ reply ] [CLA-2002:538] Conectiva Linux Security Announcement - tar/unzip 2002-10-29 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : tar/unzip SUMMARY : Directory transversal vul [ more ] [ reply ] [CLA-2002:542] Conectiva Linux Security Announcement - gv/kghostview 2002-10-31 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : gv/kghostview SUMMARY : Buffer overflow vulne [ more ] [ reply ] [CLA-2002:534] Conectiva Linux Security Announcement - krb5 2002-10-25 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : krb5 SUMMARY : Buffer overflow vulnerability [ more ] [ reply ] [CLA-2002:537] Conectiva Linux Security Announcement - tetex 2002-10-29 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : tetex SUMMARY : dvips command execution vulne [ more ] [ reply ] [CLA-2002:540] Conectiva Linux Security Announcement - heartbeat 2002-10-30 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : heartbeat SUMMARY : Remote format string vuln [ more ] [ reply ] [CLA-2002:541] Conectiva Linux Security Announcement - mod_ssl 2002-10-30 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : mod_ssl SUMMARY : Cross site scripting vulner [ more ] [ reply ] [CLA-2002:539] Conectiva Linux Security Announcement - ypserv 2002-10-30 secure conectiva com br -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : ypserv SUMMARY : Ypserv memory leak DATE [ more ] [ reply ] GLSA: MailTools 2002-11-06 Daniel Ahlberg (aliz gentoo org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200211-001 - - -------------------------------------------------------------------- PACKAGE : MailTools SUMMARY : remote command execution DATE [ more ] [ reply ] RE: [security bulletin] SSRT2265 HP TruCluster Server Interconnect Potential Security Vulnerability (fwd) 2002-11-05 Dave Ahmad (da securityfocus com) David Mirza Ahmad Symantec 0x26005712 8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SECURITY BULLETIN REVISION: 0 TITLE: SSRT2265 HP TruCluster Server Interconnect Potential Security Vulnerability NOTICE: There are no restri [ more ] [ reply ] When scrubbing secrets in memory doesn't work 2002-11-05 Michael Howard (mikehow microsoft com) (1 replies) During the Windows Security Push in Feb/Mar 2002, we noticed an 'interesting' anomaly with code to scrub passwords that looks like this: bool DoSensitiveStuff() { bool fOK = false; const size_t cbPwd = 64; char szPwd[cbPwd]; if (GetUserPassword(szPwd,cbPwd-1)) if (DoSomethingWithPassword(szP [ more ] [ reply ] networking_utils.php 2002-11-05 Tacettin Karadeniz (tacettinkaradeniz yahoo com) Title: The bug in networking_utils.php (http://www.sourcecraft.org/downloads) networking_utils(PHP) Show Files Vulnerability Summary: networking_utils.php Includes a ping function, a traceroute function, and an nslookup function. Vulnerable systems: networking_utils networking_utils.php of the net [ more ] [ reply ] SnortCenter 0.9.5 temp file naming problems... 2002-11-05 Clint Byrum (cbyrum spamaps org) Hello. I am releasing this very late, as SnortCenter v0.9.6 has been released for a few weeks now. This bug was discovered a couple of months ago, but not released at the request of Stefan Dens, the author of SnortCenter. SnortCenter is a php based tool for aggregating many snort sensors into one pl [ more ] [ reply ] A technique to mitigate cookie-stealing XSS attacks 2002-11-05 Michael Howard (mikehow microsoft com) (1 replies) During the Windows Security Push in Feb/Mar 2002, the Microsoft Internet Explorer team devised a method to reduce the risk of cookie-stealing attacks via XSS vulnerabilities. In a nutshell, if Internet Explorer 6.0 SP1 detects a cookie that has a trailing HttpOnly (case insensitive) it will retur [ more ] [ reply ] Re: A technique to mitigate cookie-stealing XSS attacks 2002-11-05 Florian Weimer (Weimer CERT Uni-Stuttgart DE) IRIX CDE ToolTalk rpc.ttdbserverd vulnerabilities 2002-11-05 SGI Security Coordinator (agent99 sgi com) |
|
Privacy Statement |
- ------------------------------------------------------------------------
Debian Security Advisory DSA-190-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Wichert Akkerman
November 7, 2002
- -----------------------
[ more ] [ reply ]