On Thu, Dec 16, 1999 at 01:33:10PM -0500, Tim Hollebeek wrote:
>
> In addition, the consequences of this flaw in a Windows environment are
> substantially different, due to the lack of access controls. As we
> discussed in the technical summary, while there is no perfect solution to
> this proble
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
Microsoft Security Bulletin (MS99-056)
-
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
Microsoft Security Bulletin (MS99-057)
-
Hopefully my last email answered your questions, but I will summarize
the relevant points if not:
1) The post you mentioned, their crack doesn't work on recent versions
of Windows Netscape, which is what we broke. These versions use a
much more complex algorithm, which is still very lame.
2) We
> > What you are missing is the following: upgrading to SSH 2
> implies upgrading to
> > version 2 of the protocol, in order to prevent the
> abovementioned problem you
> > can no longer support compatibility with version 1.x of the
> protocol. So you
> > have to update all your SSH servers and cl
At 12:01 PM 12/16/99 -0800, Richard Trott wrote:
>Where these buffer overflows and "other uses of '%s'" that were
>repaired only in qpopper 3.x? Are those of us running 2.53 not affected?
>Or do we need to upgrade?
These bugs only affected 3.0 betas.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
==
Network Associates, Inc.
SECURITY ADVISORY
December 16, 1999
Windows NT LSA Remote Denial of Se
> I was bit confused with this link (
> http://www.rstcorp.com/news/bad-crypto-tech.html ), since I am not quite
> clear if these guys are just reinventing the wheel, or have found
> something new.
It turns out that the Windows algorithm used in conjunction with the
registry is subtly different f
Where these buffer overflows and "other uses of '%s'" that were
repaired only in qpopper 3.x? Are those of us running 2.53 not affected?
Or do we need to upgrade?
Rich
On Wed, 1 Dec 1999, Qpopper Support wrote:
> All reported buffer overruns are fixed in qpopper3.0b22, which is
> available at
Emiel Kollof wrote:
> Emiliano Kargieman wrote:
> >
> > What you are missing is the following: upgrading to SSH 2 implies upgrading to
> > version 2 of the protocol, in order to prevent the abovementioned problem you
> > can no longer support compatibility with version 1.x of the protocol. So you
Something we failed to mention, which is rather important, is that only the
NT version of Ultraseek is affected.
Signed,
Marc
eEye Digital Security Team
http://www.eEye.com
| -Original Message-
| From: Bugtraq List [mailto:[EMAIL PROTECTED]]On Behalf Of
| luciano
| Sent: Thursday, Decem
BindView Security Advisory
Windows NT's SYSKEY feature
Issue date: December 16, 1999
Contact: Todd Sabin <[EMAIL PROTECTED]>
Topic:
Vulnerability in Windows NT's SYSKEY encryption
Overview:
SYSKEY does not fully protect the SAM from off-line attacks.
Specifically, dictionary and brute
-BEGIN PGP SIGNED MESSAGE-
Cisco Cache Engine Authentication Vulnerabilities
Revision 1.2
For public release Thursday, 1999 December 16, at 08:00AM US/Pacific (GMT-0800)
===
Summary
===
* A vulnerability
Well maybe some times the D.O.S no work in local mode, but in my computer works,
in local mode. anyway it works in Remote Mode
"Federico - Comnet S.A." wrote:
> Yes, we've tried the exploit various computers just for try it, and we can't
> use the exploit in the local machine, allways the explo
Emiliano Kargieman wrote:
>
> What you are missing is the following: upgrading to SSH 2 implies upgrading to
> version 2 of the protocol, in order to prevent the abovementioned problem you
> can no longer support compatibility with version 1.x of the protocol. So you
> have to update all your SSH
Just to make things clear. This is not particular to FreeBSD. This is
the xsoldier program compiled normally. In fact, in the distribution
of xsoldier, the Makefile precisely specifies that the program should
be installed suid:
install.bin::
@if [ -d $(BINDIR) ]; then set +x; else
I was bit confused with this link (
http://www.rstcorp.com/news/bad-crypto-tech.html ), since I am not quite
clear if these guys are just reinventing the wheel, or have found
something new.
Message at:
http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-04-15&[EMAIL PROTECTED]
c
USSR & eEye DS Present:
Infoseek Ultraseek 3.1 Remote Buffer Overflow
USSR Advisory Code:20
eEye DS Advisory Code: AD19991215
Release Date:
December 15, 1999
Systems Affected:
Infoseek Ultraseek 2.1 to 3.1 and possibly others.
The Opener:
T1 Internet Connection: $1,000/month
D
18 matches
Mail list logo