ISSalert: ISS Security Advisory: Multiple Root Compromise Vulnerabilities in Oracle Application Server

1999-11-10 Thread Aleph One
-BEGIN PGP SIGNED MESSAGE- ISS Security Advisory November 10, 1999 Multiple Root Compromise Vulnerabilities in Oracle Application Server Synopsis: Internet Security Systems (ISS) X-Force has discovered multiple vulnerabilities in the Oracle Application Server (OAS) that may lead to loc

F5 Networks Security Advisory (fwd)

1999-11-10 Thread Gwendolynn ferch Elydyr
-- Forwarded message -- Date: Thu, 11 Nov 1999 00:48:30 -0800 (PST) From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: F5 Networks Security Advisory It has recently come to our attention that a hashed (scrambled) version of the BIG/ip and 3DNS default sup

Re: BigIP - bigconf.cgi holes

1999-11-10 Thread Rob Gilde
Title: Re: BigIP - bigconf.cgi holes Guy Cohen writes: | unfortunately This effects version 2.1.2 too. | I have added (using the html interface) user with READ-ONLY access, logged | in as this user and by executing | 'bigconf.cgi?command=view_textfile&file=/etc/master.passwd&filters=;' I wa

Re: BIND NXT Bug Vulnerability

1999-11-10 Thread Richard Trott
You might wish to note that there is a fix: upgrade to 8.2.2 patchlevel 3. Of course, this will be obvious to anyone who follows the link... but for those that don't, the "Workaround: None" part will give the wrong impression. Rich On Wed, 10 Nov 1999, Elias Levy wrote: > http://www.isc.org/

BIND NXT Bug Vulnerability

1999-11-10 Thread Elias Levy
http://www.isc.org/products/BIND/bind-security-19991108.html Name: "nxt bug" Versions affected: 8.2, 8.2 patchlevel 1, 8.2.1 Severity: CRITICAL Exploitable: Remotely Type: Access possible Description: A bug in the processing of NXT records can theoretically allo

rpc.nfsd exploit code

1999-11-10 Thread Mariusz Marcinkiewicz
hi, patch was published so i can send you exploit code best regards, tmoggie __ Mariusz Marcinkiewicz | phone: +48 601 080 286 | mail: [EMAIL PROTECTED] System Administrator && Tech Support <[EMAIL PROTECTED]> http://www.zigzag.pl Security Advisor [*] [EMAIL PROTECTED] || [EMAIL PROT

Re: ImmuniX OS Security Alert: StackGuard 1.21 Released

1999-11-10 Thread Gerardo Richarte
Crispin Cowan wrote: Consider this vulnerable code: foo(char * arg) { char *p = arg;// a vulnerable pointer char a[25];// the buffer that makes the pointer vulnerable gets(a);// using gets() makes you vulnerable gets(p);// this is the good p

flaw in dmesg under Solaris

1999-11-10 Thread echo8
Under all versions of Solaris prior to 2.7, and under 2.7 prior to patch 106541-07, /usr/sbin/dmesg, when called with the "-" argument, creates /var/adm/msgbuf owned and writeable by the user who ran the utility, assuming that the file didn't already exist (it won't until someone runs dmesg -). On

[Cobalt] Security Advisory - cgiwrap

1999-11-10 Thread Jeff Bilicki
Cobalt Networks -- Security Advisory -- 11.09.1999 Problem: The current version of cgiwrap that runs on RaQ 2 and RaQ 3i, runs under incorrect effective permissions, which could let a malicious site-admin view or modify data in another virtual site on the same unit. Description: Thanks to Chris

Re: Security flaw in Cobalt RaQ2 cgiwrap

1999-11-10 Thread Chris Adams
Once upon a time, Nathan Neulinger <[EMAIL PROTECTED]> said: > Just wanted to point out - this is specific to the modifications that > Cobalt has made to cgiwrap for their server's structure. It is not an > issue with the regular version of cgiwrap. That is correct. I'm sorry if I wasn't clear a

Re: undocumented bugs - nfsd

1999-11-10 Thread Olaf Kirch
On Tue, Nov 09, 1999 at 11:39:39AM +0100, Mariusz Marcinkiewicz wrote: > After reading lcamtuf's posts I decided write this one. Few months ago one > of my friends - digit - found bug in linux nfsd daemon. I made example > sploit about IV 1999. Now in distributions is new nfsd and nowhere was > in

Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server Vulnerability

1999-11-10 Thread Ussr Labs
Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server Vulnerability PROBLEM UssrLabs found a Local/Remote DoS Attack in QVT/Term 'Plus' 4.2d FTP Server, the buffer overflow is caused by a long user name / password, 2000 characters, and the re-connection to the Ftp Server. There is not much to

No Subject

1999-11-10 Thread Ejovi Nuwere
Rob, w00w00 was planning on addressing this issue, but I just can't control the urge to speak... So if I understand correctly, F5 has made many improvements to the security of BigIP. Now was adding a second account with uid 0 without the knowlede of the user part of that plan? support:_J9..1fnH

Re: IE4/5 "file://" buffer overflow

1999-11-10 Thread Mikael Olsson
Hi! A couple of questions First of all, does this happen just by viewing the page, or do you have to click the link? If you have to click the link to get it to work, one might want to look into using: 1. Javascript redirect (document.location="file://A...") 2. Meta refresh tags 3. Downl

Re: BigIP - bigconf.cgi holes

1999-11-10 Thread Guy Cohen
Hello again, First of all i mast apologiz for the corrupt date of my last post. now: Rob Gilde wrote: .| .| Guy is discussing an issue that affects older versions of BIG/ip. .| As he points out, the risk is from internal users. In older versions .| of BIG/ip, there is effectively only one user

Re: [Re: FreeBSD 3.3's seyon vulnerability]

1999-11-10 Thread Brock Tellier
It would be nice if you: (a) filed a pr using send-pr(1) or the web interface or (b) contacted [EMAIL PROTECTED] or (c) sent mail to the maintainer of the port I've sent mail to [EMAIL PROTECTED] several times regarding the "faxalter" exploit and "amanda" exploit and recieved no response. Inte

Multiples Remotes DoS Attacks in Artisoft XtraMail v1.11 Vulnerability

1999-11-10 Thread Ussr Labs
Multiples Remotes DoS Attacks in Artisoft XtraMail v1.11 Vulnerability PROBLEM: UssrLabs found multiple places in XtraMail v1.11 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question. Example: The pop3 (110) service has an

Re: Insecure handling of NetSol maintainer passwords

1999-11-10 Thread Jefferson Ogata
I have also noticed a problem with Network Solutions' handling of passwords for CRYPT-PW authentication: when you submit the password initially, the form they generate with their New Contact Form web system runs the password you enter through crypt(), but the first two characters of the encrypted