=
Securax-SA-02 Security Advisory
belgian.networking.security Dutch
=
Topic:
>I noticed the following behavior in the pop3 server as shipped with
>Redhat 6.1 (still don't see
Qualcomms POP servers have this problem as well, on linux, solaris, etc.
Except the lock file gets stored where ever your users mail is stored.
/var/mail(on a sun) or where ever. I guess a nice solut
Hello,
Topic: unsafe fgets() using in qpopper
Software affected: qpopper 3.0 fc2, qpopper 2.53 and probably
others
Description:malicious user can remotely post message
with spoofed or incorrect headers
On Thu, 20 Apr 2000, Alfred Huger wrote:
> In case anyone is interested, scanning HP printers with
> tools such as nmap will cause the printer to lock up hard.
> I discovered this while trying to diagnose a connection
> problem we were having with a printer.
> I've verified this with at least the
-BEGIN PGP SIGNED MESSAGE-
==
=== Title: Vulnerability in LCDproc ===
=== Date: 20 April 2000 ===
=== Author: Andrew Hobgood <[EMAIL PROTECTED]> ===
==
FWIW, my external JetDirect isn't affected by this. I used nmap to preform
a scan, and then printed a document. No problems. No lockups. The
JetDirect reports itself as:
ROM H.07.15, EEPROM H.07.17
Joel T. Osburn
Gerald McDonnell & Associates
Cerberus Information Security Advisory (CISADV000420)
http://www.cerberus-infosec.co.uk/advisories.html
Released: 20th April 2000
Name: CMD.EXE overflow
Affected Systems : Windows NT/2000
Issue : See details
Author
I've spent some time looking at the htimage issue reported by
[EMAIL PROTECTED], and have some additional info.
First, the htimage.exe that comes with FrontPage appears to be a
simple port of HTImage.c from the w3c-httpd distribution. You can
view the source code at
http://www.w3.org/Daemon/Impl
Hello,
If MAX_DAYS_IN_TMP > 0 in /etc/rc.config on a SuSE-Linux system, a local
user can delete arbitrary files by doing some commands like these:
mkdir -p "/tmp/hhh /somedirectory"
touch -t some-early-date "/tmp/hhh /somedirectory/somefile"
sleep 1d
The bug is in /etc/cron.daily/aaa_base for SuS
Hi,
While doing code security audit, I discovered another buffer overflow in imapd.
This time security flaw exist in standard rfc 1064 COPY command:
* OK mail IMAP4rev1 v12.264 server ready
* login siva9 secret
* OK LOGIN completed
* select inbox
* 2 EXISTS
* 0 RECENT
* OK [UIDVALIDITY 956162550
I got an HP4000tn with version: ROM G.07.02, EEPROM G.07.03
and this nmap scan does not crash it.
I'm using nmap 2.3BETA14.
>-Original Message-
>From: Alfred Huger [mailto:[EMAIL PROTECTED]]
>Sent: Thursday, April 20, 2000 11:45 AM
>To: [EMAIL PROTECTED]
>Subject: DOS attack against
> As well, the file existence test listed under Problem#3 works for
> files outside of the webroot but on the same volume. For example,
> if your webroot is at d:\Inetpub\wwwroot, the request,
>
> http://server/cgi-bin/htimage.exe/test.doc?0,0
>
> will test for the existence of a file d:\test.do
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
-BEGIN PGP SIGNED MESSAGE-
Microsoft Security Bulletin
On April 20th, 2000, a RealServer Denial of Service exploit potentially
affecting all RealServers was brought to the attention of RealNetworks. The
specific exploit involves a stack overflow in the PNA protocol handling
scheme and can ultimately cause the RealServer to discontinue serving
streams
ZoneAlarm (http://www.zonelabs.com) is a very popular
personal firewall for Microsoft Windows computers and easy
to use for newbies because it is application based,
meaning, you apply network permission to applications
instead of ports.
Because it is application based, I was wondering how it
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
-BEGIN PGP SIGNED MESSAGE-
Microsoft Security Bulletin
To answer some questions I've gotten in the mail publically, Heres some
info on our advisory.
1 - The advisory makes it clear we are not talking about a "NEW HOLE" or
anything like that. Originally, this paper was submitted as a 'wake up
call' for admins who leave this sort of data available. T
RFP2K03 -- rfp.labs -
Contemplations on dvwssr.dll and how it affects life
RFP2K02 Addendum: further information
- rain forest puppy / [EMAIL PROTECTED]
This advisory does co
On Tue, 18 Apr 2000 16:20:48 +0300
Georgi Guninski <[EMAIL PROTECTED]> wrote:
> Georgi Guninski security advisory #10, 2000
> IE 5 security vulnerablity - circumventing Cross-frame security policy
> using Java/JavaScript (and disabling Active Scripting is not that easy)
> Usually, IE 5.x does not
19 matches
Mail list logo