-BEGIN PGP SIGNED MESSAGE-
ISS Security Advisory
November 10, 1999
Multiple Root Compromise Vulnerabilities in Oracle Application Server
Synopsis:
Internet Security Systems (ISS) X-Force has discovered multiple
vulnerabilities in the Oracle Application Server (OAS) that may lead to
loc
-- Forwarded message --
Date: Thu, 11 Nov 1999 00:48:30 -0800 (PST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: F5 Networks Security Advisory
It has recently come to our attention that a hashed (scrambled) version of
the BIG/ip and 3DNS default sup
Title: Re: BigIP - bigconf.cgi holes
Guy Cohen writes:
| unfortunately This effects version 2.1.2 too.
| I have added (using the html interface) user with READ-ONLY access, logged
| in as this user and by executing
| 'bigconf.cgi?command=view_textfile&file=/etc/master.passwd&filters=;' I wa
You might wish to note that there is a fix: upgrade to 8.2.2 patchlevel
3.
Of course, this will be obvious to anyone who follows the link... but for
those that don't, the "Workaround: None" part will give the wrong
impression.
Rich
On Wed, 10 Nov 1999, Elias Levy wrote:
> http://www.isc.org/
http://www.isc.org/products/BIND/bind-security-19991108.html
Name: "nxt bug"
Versions affected: 8.2, 8.2 patchlevel 1, 8.2.1
Severity: CRITICAL
Exploitable: Remotely
Type: Access possible
Description:
A bug in the processing of NXT records can theoretically allo
hi,
patch was published so i can send you exploit code
best regards,
tmoggie
__
Mariusz Marcinkiewicz | phone: +48 601 080 286 | mail: [EMAIL PROTECTED]
System Administrator && Tech Support <[EMAIL PROTECTED]> http://www.zigzag.pl
Security Advisor [*] [EMAIL PROTECTED] || [EMAIL PROT
Crispin Cowan wrote:
Consider this vulnerable code:
foo(char * arg) {
char *p = arg;// a vulnerable pointer
char a[25];// the buffer that makes the pointer vulnerable
gets(a);// using gets() makes you vulnerable
gets(p);// this is the good p
Under all versions of Solaris prior to 2.7, and under 2.7 prior to patch
106541-07, /usr/sbin/dmesg, when called with the "-" argument, creates
/var/adm/msgbuf owned and writeable by the user who ran the utility, assuming
that the file didn't already exist (it won't until someone runs dmesg -). On
Cobalt Networks -- Security Advisory -- 11.09.1999
Problem:
The current version of cgiwrap that runs on RaQ 2 and RaQ 3i, runs under
incorrect effective permissions, which could let a malicious site-admin
view or modify data in another virtual site on the same unit.
Description:
Thanks to Chris
Once upon a time, Nathan Neulinger <[EMAIL PROTECTED]> said:
> Just wanted to point out - this is specific to the modifications that
> Cobalt has made to cgiwrap for their server's structure. It is not an
> issue with the regular version of cgiwrap.
That is correct. I'm sorry if I wasn't clear a
On Tue, Nov 09, 1999 at 11:39:39AM +0100, Mariusz Marcinkiewicz wrote:
> After reading lcamtuf's posts I decided write this one. Few months ago one
> of my friends - digit - found bug in linux nfsd daemon. I made example
> sploit about IV 1999. Now in distributions is new nfsd and nowhere was
> in
Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server Vulnerability
PROBLEM
UssrLabs found a Local/Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server,
the buffer overflow is caused by a long user name / password, 2000
characters,
and the re-connection to the Ftp Server.
There is not much to
Rob,
w00w00 was planning on addressing this issue, but I just can't control the
urge to speak...
So if I understand correctly, F5 has made many improvements to the
security of BigIP. Now was adding a second account with uid 0 without the
knowlede of the user part of that plan?
support:_J9..1fnH
Hi! A couple of questions
First of all, does this happen just by viewing the page, or do
you have to click the link?
If you have to click the link to get it to work, one might
want to look into using:
1. Javascript redirect (document.location="file://A...")
2. Meta refresh tags
3. Downl
Hello again,
First of all i mast apologiz for the corrupt date of my last post.
now:
Rob Gilde wrote:
.|
.| Guy is discussing an issue that affects older versions of BIG/ip.
.| As he points out, the risk is from internal users. In older versions
.| of BIG/ip, there is effectively only one user
It would be nice if you:
(a) filed a pr using send-pr(1) or the web interface
or
(b) contacted [EMAIL PROTECTED]
or
(c) sent mail to the maintainer of the port
I've sent mail to [EMAIL PROTECTED] several times regarding the
"faxalter" exploit and "amanda" exploit and recieved no response.
Inte
Multiples Remotes DoS Attacks in Artisoft XtraMail v1.11 Vulnerability
PROBLEM:
UssrLabs found multiple places in XtraMail v1.11 where they do not use
proper bounds checking.
The following all result in a Denial of Service against the service in
question.
Example:
The pop3 (110) service has an
I have also noticed a problem with Network Solutions' handling of passwords for
CRYPT-PW authentication: when you submit the password initially, the form they
generate with their New Contact Form web system runs the password you enter
through crypt(), but the first two characters of the encrypted
18 matches
Mail list logo