|
Colapse all |
Post message
Gimp: Erased sections of images print in some cases 2002-10-29 Clark Mills (c mills auckland ac nz) Hi people. As part of documenting processes, I take screen captures and then chop stuff out that I don't want the world to see. I do this within the Gimp by setting an alpha channel on the screen capture and then _erasing_ the parts of the image that I want to obscure. An example is at: http [ more ] [ reply ] [SECURITY] [DSA 183-1] New krb5 packages fix buffer overflow 2002-10-29 joey infodrom org (Martin Schulze) IP SmartSpoofing : How to bypass all IP filters relying on source IP address 2002-10-29 Vincent Royer (vroyer althes fr) Hi, In an article available at http://www.althes.fr/ressources/avis/smartspoofing.htm, we describe a new technique for spoofing an IP address using ARP cache poisoning and network translation. The IP smart spoofing allows to run any application with a spoofed IP address and thus, bypass many access [ more ] [ reply ] Bypassing website filter in SonicWall 2002-10-29 Marc Ruef (marc ruef computec ch) (1 replies) Hi! I found a little weakness in SonicWall: I turn on the blocking mechanism for websites (e.g. www.google.com). Now I can't reach the website using the domainname. But if I choose the IP address of the host (e.g. http://216.239.53.101/), I can contact the forbidden website. The same issue I've dis [ more ] [ reply ] Re: CISCO as5350 crashes with nmap connect scan 2002-10-29 Thomas Munn (munn bigfoot com) In-Reply-To: <20021028165345.11929.qmail (at) mail.securityfocus (dot) com [email concealed]> >Received: (qmail 7861 invoked from network); 28 Oct 2002 22:14:00 -0000 >Received: from outgoing2.securityfocus.com (HELO outgoing.securityfocus.com) (205.206.231.26) > by mail.securityfocus.com with SMTP; 28 Oct 2002 22:14:00 [ more ] [ reply ] Re: CISCO as5350 crashes with nmap connect scan 2002-10-29 Thomas Munn (munn bigfoot com) In-Reply-To: <20021028165345.11929.qmail (at) mail.securityfocus (dot) com [email concealed]> An update to my update: If you don't have any ACL's applied, it doesn't crash, just add this line to the config line and see what happens!!! access-list 115 (whatever number) deny tcp any host 1.1.1.1 (ip of fe0) range 200 [ more ] [ reply ] Security Update: [CSSA-2002-039.0] Linux: bzip2 file creation and symbolic link vulnerabilities 2002-10-29 security caldera com To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] ________________________________________________________________________ ______ SCO Security Advisory Subject: Linux: bzip2 file creation and symbolic link vulnerabiliti [ more ] [ reply ] Re: MDaemon SMTP/POP/IMAP server DoS 2002-10-29 Muhammad Faisal Rauf Danka (mfrd attitudex com) There have been earlier issues with UIDL and DoS conditions in MDaemon 2.8.5.0 (to be specific). Check bid 1366, http://online.securityfocus.com/bid/1366/ The website still offers 6.0.7 (vulnerable) version for download, So apparently no workaround exists except for shutting it down until the patc [ more ] [ reply ] RE: MDaemon SMTP/POP/IMAP server DoS 2002-10-29 Robert Feldbauer (wuher swrpg net) I'm running MDaemon 3.1.2 and this does not have any adverse effect. Here's my log: +OK daisydata.com POP3 server ready <MDAEMON-F200210291127.AA274532MD3626 (at) mydomain (dot) com [email concealed]> USER myusername +OK myusername... Recipient ok PASS mypassword +OK myusername (at) mydomain (dot) com [email concealed]'s mailbox has 0 total messages (0 oc [ more ] [ reply ] Re: MDaemon SMTP/POP/IMAP server DoS 2002-10-29 Karl Pietri (kpietri nvps net) 5.0.7 not vulnerable (tested on registered pro server). tested dele and uidl both with over 40b of 1. -Karl Pietri ----- Original Message ----- From: "D4rkGr3y" <grey_1999 (at) mail (dot) ru [email concealed]> To: <bugtraq (at) securityfocus (dot) com [email concealed]>; <submissions (at) packetstormsecurity (dot) com [email concealed]>; <vulnwatch (at) vulnwatch (dot) org [email concealed]> Sent: Sunday, Octobe [ more ] [ reply ] Re: SUMMARY: Disabling Port 445 (SMB) Entirely 2002-10-29 dan hayden (cdhayden yahoo com) In-Reply-To: <ILEPILDHBOLAHHEIMALBGEAMDMAA.jasonc (at) science (dot) org [email concealed]> I was looking at some firewall logs and investigating this port traffic when i came upon your comments. After reading them i discovered a microsoft article that may show one more piece of the puzzle. Just thought id let you know t [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
________________________________________________________________________
Mandrake Linux Security Update Advisory
________________________________________________________________________
Package name: krb5
Advisory ID:
[ more ] [ reply ]