solaris lpd thing

2002-06-04 Thread ron1n .
I'm going through a rough period in my life -- I don't know what to do. Attached below is a shitty remote that I leaked to the kids last year. Now is a good time to submit it to Bugtraq. It's incredibly lame code, but why not get it working, and then go hack some stuff... Originally it was writt

Re: More ELF Buggery

2002-06-04 Thread silvio . cesare
Mayhem writes.. > > > This technique was known years ago by random > > people, note that gdb use it to resolve internal > > library symbols and put breakpoints on it (since > > shared libraries are ET_DYN objects, their > > absolute virtual address is not known at the > > process lau

IRIX rpc.passwd vulnerability

2002-06-04 Thread SGI Security Coordinator
-BEGIN PGP SIGNED MESSAGE- _ SGI Security Advisory Title: rpc.passwd vulnerability Number: 20020601-01-P Date: June 4, 2002 Reference: CA

CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9

2002-06-04 Thread CERT Advisory
-BEGIN PGP SIGNED MESSAGE- CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9 Original release date: June 04, 2002 Last revised: -- Source: CERT/CC A complete revision history can be found at the end of this file. Systems Affected * Domain Name S

Sun Security Bulletin #00219

2002-06-04 Thread Sun Security Coordination Team
-BEGIN PGP SIGNED MESSAGE- Sun Microsystems, Inc. Security Bulletin Bulletin Number:#00219 Date: June 04, 2002 Cross-Ref: http://www.entercept.com/d

SRT Security Advisory (SRT2002-06-04-1711): SCO crontab

2002-06-04 Thread zillion
== Strategic Reconnaissance Team Security Advisory (SRT2002-06-04-1611) Topic : SCO OpenServer crontab format string vulnerability Date : June 04, 2002 Credit : KF dotslash[at]snosoft.com Site : http://www.snosoft.com ===

[RHSA-2002:083-22] Ghostscript command execution vulnerability

2002-06-04 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Ghostscript command execution vulnerability Advisory ID: RHSA-2002:083-22 Issue date:2002-05-07 Updated on:2002-06-03 Product:

[RHSA-2002:105-09] Updated bind packages fix denial of service attack

2002-06-04 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated bind packages fix denial of service attack Advisory ID: RHSA-2002:105-09 Issue date:2002-06-02 Updated on:2002-06-04 Pr

SHOUTcast 1.8.9 bufferoverflow

2002-06-04 Thread eSDee
Netric Security Team - http://www.netric.org by eSDee SHOUTcast 1.8.9 remote bufferoverflow Type: Stack Overflow Priority: 2 [1] Description [2] Vulnerable [3] The exploit [4] Vendor response [1] Description Nullsoft's SHOUTcast 1.8.9 contains a bufferoverflow that is remotely

Re: MIME::Tools Perl module and virus scanners

2002-06-04 Thread David F. Skoll
Bennett Todd wrote: > Do MIME::Tools and/or MIMEDefang know about the punctuation marks > that some Windows MUAs silently ignore in filename extensions? MIMEDefang itself doesn't "know" anything, but the sample filter which comes with it will correctly (?!) reject ".exe." as well as ".exe" I've

SRT Security Advisory (SRT2002-06-04-1011): slurp

2002-06-04 Thread zillion
== Strategic Reconnaissance Team Security Advisory (SRT2002-06-04-1011) Topic : Slurp news retriever remote format string vulnerability Date : June 04, 2002 Credit : zillion[at]safemode.org Site : http://www.snosoft.com ==

Re: MIME::Tools Perl module and virus scanners

2002-06-04 Thread Bennett Todd
That's good research, and good work. And I agree with the conclusion you implied: > If you use MIMEDefang (which uses MIME::Tools), you may want to > unconditionally call action_rebuild in filter_begin(). This > forces the MIME message to be rebuilt by MIME::Tools, resulting in > a valid MIME m

[RHSA-2002:097-08] Updated xchat packages fix /dns vulnerability

2002-06-04 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated xchat packages fix /dns vulnerability Advisory ID: RHSA-2002:097-08 Issue date:2002-05-20 Updated on:2002-06-04 Product

Entercept Ricochet Security Advisory: Solaris snmpdx Vulnerabilities

2002-06-04 Thread Entercept Ricochet Team
Entercept Ricochet Advisory Solaris snmpdx Vulnerabilities http://www.entercept.com/news/uspr/06-03-02.asp DETAILS An unchecked buffer in Sun's Solaris SNMP component can be overrun and remotely exploited, allowing an attacker to execute arbitrary code with root privileges. There is also a form

sql injection in Logisense software

2002-06-04 Thread Akatosh
Background -- "LogiSense Corporation is a leading provider of performance software for service providers and enterprises. We offer a wide range of low-cost solutions designed to address common client billing and management, traffic congestion, network scalability, and latency issues." L

Buffer overflow in MSIE gopher code

2002-06-04 Thread Jouko Pynnonen
OVERVIEW Gopher is a protocol developed at the University of Minnesota in the early 1990's. Gopher servers offer hierarchically organized directories and files. These form a "gopherspace" which can be thought of as the predecessor of the World Wide Web. Gopher was mostly abandoned

[DER #11] - Remotey exploitable fmt string bug in squid

2002-06-04 Thread david evlis reign
--- - DAVID EVLIS REIGN SECURITY ADVISORY #11 - --- - WHAT - Remotely Exploitable Format string Hole - WHO - MSNT squid auth for NtDomains - DETAILS ON PRODUCT - This is an authentication module for the Squid proxy