[Full-disclosure] [USN-185-1] CUPS vulnerability

2005-09-20 Thread Martin Pitt
=== Ubuntu Security Notice USN-185-1 September 20, 2005 cupsys vulnerability CAN-2004-2154 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog

[Full-disclosure] bacula insecure temporary file creation

2005-09-20 Thread Eric Romang / ZATAZ.com
# bacula insecure temporary file creation Vendor: http://www.bacula.org/ Advisory: http://www.zataz.net/adviso/bacula-09192005.txt Vendor informed: yes Exploit available: yes Impact : low Exploitation : low

[Full-disclosure] Secunia Research: Opera Mail Client Attachment Spoofing and Script Insertion

2005-09-20 Thread Secunia Research
== Secunia Research 20/09/2005 - Opera Mail Client Attachment Spoofing and Script Insertion - == Table of Contents Affected Software.

[Full-disclosure] phpBB 2.0.17 remote avatar size bug

2005-09-20 Thread SmOk3
Title: phpBB remote avatar size bug Software: phpBB 2.0.17 (and maybe prior versions) Discovered by: David Sopas Ferreira < david at systemsecure dot org > Original link: http://www.systemsecure.org/ssforum/viewtopic.php?t=272 » Email from phpBB « Your report "Avatar size" has been closed becaus

[Full-disclosure] [ GLSA 200509-14 ] Zebedee: Denial of Service vulnerability

2005-09-20 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200509-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200509-15 ] util-linux: umount command validation error

2005-09-20 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200509-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: [Full-disclosure] Re: Cisco IOS hacked?

2005-09-20 Thread Steve Smith
This may be a little off topic, but does anyone know where I can find technical details and solutions for Michael Lynne's IOS vulnerability?    I am concerned that my systems aren't patched and evern since Ciscogate, K-otik, Secunia, Security-Focus have all removed their original vulnerability advi

Re: [Full-disclosure] Cisco IOS hacked? (->CAN-2005-2451)

2005-09-20 Thread Juha-Matti Laurio
This may be a little off topic, but does anyone know where I can find technical details and solutions for Michael Lynne's IOS vulnerability? I am concerned that my systems aren't patched and evern since Ciscogate, K-otik, Secunia, Security-Focus have all removed their original vulnerability advis

[Full-disclosure] MDKSA-2005:165 - Updated cups packages fix vulnerability

2005-09-20 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: cups Advisory ID:

[Full-disclosure] Debian Security Host Bandwidth Saturation

2005-09-20 Thread Martin Schulze
http://www.debian.org/News/2005/20050920 - Debian Security Host Bandwidth Saturation The recently released security update of XFree86 in DSA 816 for sarge and woody has caused the host security.debian.org to saturate its

[Full-disclosure] Re: arc insecure temporary file creation

2005-09-20 Thread Joey Schulze
ZATAZ Audits wrote: > The vulnerability is caused due to temporary file being created insecurely. > The temporary file used for archive creation could be read by untrusted > users. This is not just an information leak, but also a symlink vulnerability since the temporary file is created without e

[Full-disclosure] Checkpoint VPN DoS woes

2005-09-20 Thread J. Oquendo
While tinkering with my VPN connections, servers, firewalls and routers, I brang down the network to its knees with an attack from one machine to itself using a spoofed private address. The program I was using was something I wrote and it shredded my Checkpoint and its VPN's to oblivion both inter

Re: [Full-disclosure] phpBB 2.0.17 remote avatar size bug

2005-09-20 Thread Brian Dessent
SmOk3 wrote: > I don't want to criticize the phpBB coders, but why is it dificult to > check out the size > of a image and telling the user that that size of image it's not > possible, or even block the > size on the viewtopic table, something like that. Having phpbb check the image size would ad

[Full-disclosure] UnixWare 7.1.4 : LibTIFF < 3.72 malformed data code exec

2005-09-20 Thread please_reply_to_security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SCO Security Advisory Subject:UnixWare 7.1.4 : LibTIFF < 3.72 malformed data code exec Advisory number:SCOSA-2005.34 Iss

Re: [Full-disclosure] UnixWare 7.1.4 : LibTIFF < 3.72 malformed data code exec

2005-09-20 Thread xyberpix
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Wow!! Are they still around?? xyberpix On 20 Sep 2005, at 23:30, [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SCO Securit

RE: [Full-disclosure] phpBB 2.0.17 remote avatar size bug

2005-09-20 Thread Paul
I agree. This is not a security issue. If you can get that same image to install a virus on the server, then make a deal out of it. Until then, don't waste our time. Paul Greyhats Security http://greyhatsecurity.org -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On

Re: [Full-disclosure] UnixWare 7.1.4 : LibTIFF < 3.72 malformed data code exec

2005-09-20 Thread Tim
> Wow!! > > Are they still around?? Yeah, comical isn't it? They frequently release patches for 4-6 month old holes. They are kinda like the Microsoft[1] of the Unix/Linux world. tim 1. http://www.eeye.com/html/research/upcoming/index.html ___ F

Re: [Full-disclosure] UnixWare 7.1.4 : LibTIFF < 3.72 malformed data code exec

2005-09-20 Thread KF (lists)
Even more comical is how they STILL can't patch that old ftp server of theirs. SITE EXEC loves SCO. Honeypot or stupidity, you decide... [EMAIL PROTECTED]:~$ ftp ftpput.sco.com Connected to ftpput.sco.com. 220 artemis FTP server (Version 2.1WU(1)) ready. Name (ftpput.sco.com:kfinisterre): anony

[Full-disclosure] perldiver

2005-09-20 Thread Morning Wood
- EXPL-A-2005-014 exploitlabs.com Advisory 043 - -perldiver - AFFECTED PRODUCTS = Perldiver v1.x and 2.x http://scriptsolut

[Full-disclosure] MDKSA-2005:166 - Updated clamv packages fix vulnerabilities

2005-09-20 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: clamav Advisory ID:

[Full-disclosure] MDKSA-2005:167 - Updated util-linux packages fix umount vulnerability

2005-09-20 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: util-linux Advisory ID

[Full-disclosure] MDKSA-2005:168 - Updated masqmail packages fix vulnerabilities

2005-09-20 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: masqmail Advisory ID: