-BEGIN PGP SIGNED MESSAGE-
Sent to NTBugtraq and Bugtraq.
re: http://www.securityfocus.com/level2/?go=vulnerabilitiesid=548
1. I incorrectly stated that it was password protected preventing the
viewing of the code. The code is readily visible, the formatting of
the spreadsheet sent me
On Wed, Aug 18, 1999 at 12:26:20PM +0200, Jochen Bauer wrote:
On Wed, 26 Nov 1997 Eric Augustus ([EMAIL PROTECTED]) posted a message
on BUGTRAQ about the fact, that the default Xaccess file allows XDMCP
connections from any host. As you know, this can be used to get a
login screen on any host
Aleph1,
I apologize if this has be brought up before, but with the recent
post concerning the QMS 2060 printers and the length of time I have sat on this
(4 months) I figured it should be released. I sent this information to OCE long
ago with no response. I am aware of the Intelligent
Richard Kettlewell [EMAIL PROTECTED] has reported a security
problem with trn. Trn comes with a newsgroups shell script that uses
a hardcoded filename in /tmp as temporary storage. As you all know,
this could be exploited to overwrite arbitrary files. If the file
already exists as symbolic
On Sun, Jul 04, 1999 at 03:19:38AM +0200, Michal Zalewski wrote:
Oh, haven't said, for clearance... I'm talking about terminfo support and
tgetent() function implemented in libncurses, which is buggy as well,
while ncurses allows '../' tricks.
Do you have any more information about this
Trojan being spread to clueless kiddies, claims to exploit portmap on
Redhat boxes, really adds a rootshell to your inetd.conf file and sends
other info like your ip address by executing ifconfig, it sends this mail
to [EMAIL PROTECTED]
Code below and also attached.
-BEGIN PGP SIGNED MESSAGE-
CiscoSecure Access Control Server for UNIX Remote Administration
Vulnerability
Revision 1.0
For public release Thursday, 1999 August 19, at 08:00AM US/Pacific (UTC-0700)
=
Summary