Securax Security Advisory: Windows98 contains a serious buffer overflow with long filenameextensions.

2000-04-21 Thread Zoa_Chien
= Securax-SA-02 Security Advisory belgian.networking.security Dutch = Topic:

pop3

2000-04-21 Thread spoon spoon
>I noticed the following behavior in the pop3 server as shipped with >Redhat 6.1 (still don't see Qualcomms POP servers have this problem as well, on linux, solaris, etc. Except the lock file gets stored where ever your users mail is stored. /var/mail(on a sun) or where ever. I guess a nice solut

unsafe fgets() in qpopper

2000-04-21 Thread 3APA3A
Hello, Topic: unsafe fgets() using in qpopper Software affected: qpopper 3.0 fc2, qpopper 2.53 and probably others Description:malicious user can remotely post message with spoofed or incorrect headers

Re: DOS attack against HP JetDirect Printers (fwd)

2000-04-21 Thread Gwendolynn ferch Elydyr
On Thu, 20 Apr 2000, Alfred Huger wrote: > In case anyone is interested, scanning HP printers with > tools such as nmap will cause the printer to lock up hard. > I discovered this while trying to diagnose a connection > problem we were having with a printer. > I've verified this with at least the

Remote vulnerability in LCDproc 0.4

2000-04-21 Thread Andrew Hobgood
-BEGIN PGP SIGNED MESSAGE- == === Title: Vulnerability in LCDproc === === Date: 20 April 2000 === === Author: Andrew Hobgood <[EMAIL PROTECTED]> === ==

Re: DOS attack against HP JetDirect Printers (fwd)

2000-04-21 Thread Hobbes Gobs Llin
FWIW, my external JetDirect isn't affected by this. I used nmap to preform a scan, and then printed a document. No problems. No lockups. The JetDirect reports itself as: ROM H.07.15, EEPROM H.07.17 Joel T. Osburn Gerald McDonnell & Associates

CMD.EXE overflow (CISADV000420)

2000-04-21 Thread Cerberus Security Team
Cerberus Information Security Advisory (CISADV000420) http://www.cerberus-infosec.co.uk/advisories.html Released: 20th April 2000 Name: CMD.EXE overflow Affected Systems : Windows NT/2000 Issue : See details Author

htimage info -- may apply to unix as well

2000-04-21 Thread Todd Sabin
I've spent some time looking at the htimage issue reported by [EMAIL PROTECTED], and have some additional info. First, the htimage.exe that comes with FrontPage appears to be a simple port of HTImage.c from the w3c-httpd distribution. You can view the source code at http://www.w3.org/Daemon/Impl

local user can delete arbitrary files on SuSE-Linux

2000-04-21 Thread Peter Münster
Hello, If MAX_DAYS_IN_TMP > 0 in /etc/rc.config on a SuSE-Linux system, a local user can delete arbitrary files by doing some commands like these: mkdir -p "/tmp/hhh /somedirectory" touch -t some-early-date "/tmp/hhh /somedirectory/somefile" sleep 1d The bug is in /etc/cron.daily/aaa_base for SuS

another WU imapd buffer overflow

2000-04-21 Thread Michal Szymanski
Hi, While doing code security audit, I discovered another buffer overflow in imapd. This time security flaw exist in standard rfc 1064 COPY command: * OK mail IMAP4rev1 v12.264 server ready * login siva9 secret * OK LOGIN completed * select inbox * 2 EXISTS * 0 RECENT * OK [UIDVALIDITY 956162550

Re: DOS attack against HP JetDirect Printers (fwd)

2000-04-21 Thread Ed Padin
I got an HP4000tn with version: ROM G.07.02, EEPROM G.07.03 and this nmap scan does not crash it. I'm using nmap 2.3BETA14. >-Original Message- >From: Alfred Huger [mailto:[EMAIL PROTECTED]] >Sent: Thursday, April 20, 2000 11:45 AM >To: [EMAIL PROTECTED] >Subject: DOS attack against

Re: More vulnerabilities in FP

2000-04-21 Thread .sozni
> As well, the file existence test listed under Problem#3 works for > files outside of the webroot but on the same volume. For example, > if your webroot is at d:\Inetpub\wwwroot, the request, > > http://server/cgi-bin/htimage.exe/test.doc?0,0 > > will test for the existence of a file d:\test.do

Microsoft Security Bulletin (MS00-026)

2000-04-21 Thread Microsoft Product Security
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. -BEGIN PGP SIGNED MESSAGE- Microsoft Security Bulletin

Remote DoS attack in RealServer

2000-04-21 Thread David Cotter
On April 20th, 2000, a RealServer Denial of Service exploit potentially affecting all RealServers was brought to the attention of RealNetworks. The specific exploit involves a stack overflow in the PNA protocol handling scheme and can ultimately cause the RealServer to discontinue serving streams

ZoneAlarm

2000-04-21 Thread Wally Whacker
ZoneAlarm (http://www.zonelabs.com) is a very popular personal firewall for Microsoft Windows computers and easy to use for newbies because it is application based, meaning, you apply network permission to applications instead of ports. Because it is application based, I was wondering how it

Microsoft Security Bulletin (MS00-027)

2000-04-21 Thread Microsoft Product Security
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. -BEGIN PGP SIGNED MESSAGE- Microsoft Security Bulletin

Re: Network Security and Privacy

2000-04-21 Thread dynamo
To answer some questions I've gotten in the mail publically, Heres some info on our advisory. 1 - The advisory makes it clear we are not talking about a "NEW HOLE" or anything like that. Originally, this paper was submitted as a 'wake up call' for admins who leave this sort of data available. T

RFP2K03: Contemplations on dvwssr.dll and its affects on life

2000-04-21 Thread rain forest puppy
RFP2K03 -- rfp.labs - Contemplations on dvwssr.dll and how it affects life RFP2K02 Addendum: further information - rain forest puppy / [EMAIL PROTECTED] This advisory does co

Re: IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy)

2000-04-21 Thread TAKAGI, Hiromitsu
On Tue, 18 Apr 2000 16:20:48 +0300 Georgi Guninski <[EMAIL PROTECTED]> wrote: > Georgi Guninski security advisory #10, 2000 > IE 5 security vulnerablity - circumventing Cross-frame security policy > using Java/JavaScript (and disabling Active Scripting is not that easy) > Usually, IE 5.x does not