BugTraq Mode:
(Page 1747 of 1748)  < Prev  1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748  Next >
MDKSA-2002:073 - krb5 update 2002-10-29
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: krb5
Advisory ID:

[ more ]  [ reply ]
Gimp: Erased sections of images print in some cases 2002-10-29
Clark Mills (c mills auckland ac nz)
Hi people.

As part of documenting processes, I take screen captures and then chop
stuff out that I don't want the world to see. I do this within the Gimp
by setting an alpha channel on the screen capture and then _erasing_ the
parts of the image that I want to obscure. An example is at:

http

[ more ]  [ reply ]
[SECURITY] [DSA 183-1] New krb5 packages fix buffer overflow 2002-10-29
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 183-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 29th, 2002

[ more ]  [ reply ]
IP SmartSpoofing : How to bypass all IP filters relying on source IP address 2002-10-29
Vincent Royer (vroyer althes fr)
Hi,

In an article available at
http://www.althes.fr/ressources/avis/smartspoofing.htm, we describe a new
technique for spoofing an IP address using ARP cache poisoning and network
translation. The IP smart spoofing allows to run any application with a
spoofed IP address and thus, bypass many access

[ more ]  [ reply ]
Bypassing website filter in SonicWall 2002-10-29
Marc Ruef (marc ruef computec ch) (1 replies)
Hi!

I found a little weakness in SonicWall: I turn on the blocking
mechanism for websites (e.g. www.google.com). Now I can't reach
the website using the domainname. But if I choose the IP address of the
host (e.g. http://216.239.53.101/), I can contact the forbidden
website. The same issue I've dis

[ more ]  [ reply ]
Re: Bypassing website filter in SonicWall 2002-10-29
Kurt Seifried (bt seifried org)
Re: CISCO as5350 crashes with nmap connect scan 2002-10-29
Thomas Munn (munn bigfoot com)
In-Reply-To: <20021028165345.11929.qmail (at) mail.securityfocus (dot) com [email concealed]>

>Received: (qmail 7861 invoked from network); 28 Oct

2002 22:14:00 -0000

>Received: from outgoing2.securityfocus.com (HELO

outgoing.securityfocus.com) (205.206.231.26)

> by mail.securityfocus.com with SMTP; 28 Oct 2002

22:14:00

[ more ]  [ reply ]
Re: CISCO as5350 crashes with nmap connect scan 2002-10-29
Thomas Munn (munn bigfoot com)
In-Reply-To: <20021028165345.11929.qmail (at) mail.securityfocus (dot) com [email concealed]>

An update to my update:

If you don't have any ACL's applied, it doesn't crash,

just add this line to the config line and see what

happens!!!

access-list 115 (whatever number) deny tcp any host

1.1.1.1 (ip of fe0) range 200

[ more ]  [ reply ]
Security Update: [CSSA-2002-039.0] Linux: bzip2 file creation and symbolic link vulnerabilities 2002-10-29
security caldera com
To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: Linux: bzip2 file creation and symbolic link vulnerabiliti

[ more ]  [ reply ]
Re: MDaemon SMTP/POP/IMAP server DoS 2002-10-29
Muhammad Faisal Rauf Danka (mfrd attitudex com)
There have been earlier issues with UIDL and DoS conditions in MDaemon 2.8.5.0 (to be specific).
Check bid 1366, http://online.securityfocus.com/bid/1366/

The website still offers 6.0.7 (vulnerable) version for download,
So apparently no workaround exists except for shutting it down until
the patc

[ more ]  [ reply ]
RE: MDaemon SMTP/POP/IMAP server DoS 2002-10-29
Robert Feldbauer (wuher swrpg net)
I'm running MDaemon 3.1.2 and this does not have any adverse effect.
Here's my log:

+OK daisydata.com POP3 server ready
<MDAEMON-F200210291127.AA274532MD3626 (at) mydomain (dot) com [email concealed]>
USER myusername
+OK myusername... Recipient ok
PASS mypassword
+OK myusername (at) mydomain (dot) com [email concealed]'s mailbox has 0 total messages (0 oc

[ more ]  [ reply ]
Re: MDaemon SMTP/POP/IMAP server DoS 2002-10-29
Karl Pietri (kpietri nvps net)
5.0.7 not vulnerable (tested on registered pro server). tested dele and uidl
both with over 40b of 1.

-Karl Pietri
----- Original Message -----
From: "D4rkGr3y" <grey_1999 (at) mail (dot) ru [email concealed]>
To: <bugtraq (at) securityfocus (dot) com [email concealed]>; <submissions (at) packetstormsecurity (dot) com [email concealed]>;
<vulnwatch (at) vulnwatch (dot) org [email concealed]>
Sent: Sunday, Octobe

[ more ]  [ reply ]
Re: SUMMARY: Disabling Port 445 (SMB) Entirely 2002-10-29
dan hayden (cdhayden yahoo com)
In-Reply-To: <ILEPILDHBOLAHHEIMALBGEAMDMAA.jasonc (at) science (dot) org [email concealed]>

I was looking at some firewall logs and investigating this port traffic

when i came upon your comments.

After reading them i discovered a microsoft article that may show one more

piece of the puzzle.

Just thought id let you know t

[ more ]  [ reply ]
(Page 1747 of 1748)  < Prev  1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus