[Full-disclosure] [CIRT.DK] Apple QuickTime 7.0.3 and earlier - JPG/PICT Buffer Overflow

2006-01-11 Thread CIRT.DK Advisory
Title: [CIRT.DK] Apple QuickTime 7.0.3 and earlier - JPG/PICT Buffer Overflow






Apple Quicktime are vulnerable to a buffer overflow in the handling of .JPG/.PICT files


Read the full advisory http://www.cirt.dk/advisories/cirt-41-advisory.pdf




CIRT.DK



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] QUICKTIME vuln: Apple pulls a Microsoft stunt

2006-01-11 Thread CIRT.DK Advisory
Title: QUICKTIME vuln: Apple pulls a Microsoft stunt






Hey there


Just an update it seems that Apple uses the same developers as Microsoft


Apple QuickTime is still vulnerable:


Tested on MAC OS X and Windows Platform


Save the following file and open with QuickTime http://www.cirt.dk/tools/exploits/Apple_VS_MS.jpg you could change the name to Apple_VS_MS.pict





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [CIRT.DK] Ipswitch Whatsup small Business 2004 - Directory Traversal

2005-11-02 Thread CIRT.DK Advisory
Title: [CIRT.DK] Ipswitch Whatsup small Business 2004 - Directory Traversal 






Vendor: IpSwitch

Product: Ipswitch Whatsup small Business 2004 


Description:

The Whatsup Small Business 2004 are vulnerable to a directory traversal attack using ../ 



Read the full advisory at http://www.cirt.dk





CIRT.DK



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [CIRT.DK] - Novell ZENworks Patch Management Server 6.0.0.52 - SQL injection

2005-10-27 Thread CIRT.DK Advisory
The Novell ZENworks Patch Management Server 6.0.0.52 is vulnerable to 
SQL injection in the management console.

To being able to exploit this issue the administrator have to 
manually created a none-privileged account as minimum, to allow
exploitation.

Fix:
Upgrade to ZENworks Patch Management version 6.2.2.181
(or newer hot fix via your PLUS server) found at http://download.novell.com.

Note:   
The 6.0.0.52 CD ISO image was on the Novell download site up until the 2nd
week of September, 2005. 
The ZENworks Patch Management CD ISO image that is currently available at
the download site at the 
time of this document being published
http://download.novell.com/Download?buildid=5_kRStyf9wU~ 

ISO Name:   ZEN_PatchMgmt_Upd6.2.iso Size: 323.8 MB
(339607552) MD5: aeb244ecdf29c83cb8388fae1a6a1919 


A technical description of the vulnerability can be read at: 
http://www.cirt.dk



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK - Advisory] Windows XP SP2 Local TFTP HEAP based Overflow

2005-10-03 Thread CIRT.DK Advisory
[Description]
The Windows XP tftp.exe software is vulnerable to a local Heap Based
overflow, 
allowing to run arbitrary commands on the system as the user issuing the
overflow.

[Complete advisory]
CIRT.DK Advisory 38 can be read at http://www.cirt.dk/

Regards
CIRT.DK

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK - Advisory 37] TAC Vista Webstation 3.0 Directory Traversal bug in webinterface

2005-09-16 Thread CIRT.DK Advisory

TAC Vista is based on open technologies, TAC VistaR is one of the most
advanced software solutions for building automation. 
TAC Vista efficiently and economically controls, checks and analyzes all
building operations, allowing system operators to control and monitor entire
systems on site or from remote locations. 

The Web application is running on a Microsoft IIS 5.0 Server in this case. 

The problem is occurring in the input field of where the Template is called,
resulting in the possibility to traverse into other parts of the system.

Read the full Advisory at http://www.cirt.dk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] 3 minor vulnerabilities in IPSwitch products

2005-09-09 Thread CIRT.DK Advisory
The following 3 minor vulnerabilities were found in the products Whatsup
Gold 8.04 and WhatsUp Small Business 2004

Ipswitch Whatsup Gold 8.04 - Access to view source code of all
files(CIRT-34-advisory)
Ipswitch Whatsup Gold 8.04 - Cross Site Scripting (CIRT-35-advisory)
Ipswitch Whatsup small Business 2004 - Source code disclosure
(CIRT-36-advisory)

Read the full advisories at http://www.cirt.dk




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK - Advisory] Novell iManager 2.0.2 ASN.1 Parsing vulnerability in Apache module

2005-06-12 Thread CIRT.DK Advisory
ID: NOVL102200 
Domain: primus 
Solution Class: Novell 
Fact: Novell iManager 2.02 
Fact: Apache 2.0.48 
Fact: OpenSSL 0.9.7 
Symptom: OpenSSL ASN.1 Parsing vulnerability in Apache 
Symptom: Server stops responding and an error occurs 
Cause: Multiple vulnerabilities were reported in the ASN.1 parsing code in
OpenSSL. 
These issues could be exploited to cause a denial of service or to execute
arbitrary code. 

Fix: These vulnerabilites are corrected in OpenSSL 0.9.7d. 
iManager 2.5 ships with OpenSSL 0.9.7d - to resolve the vulnerability
upgrading is suggested.

Read the full advisory at http://www.cirt.dk


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/