+==+
| Ubizen Security Advisory: Raptor Firewall Weak ISN Vulnerability |
+==+
| [EMAIL PROTECTED] Friday August 02, 2002 |
no notification from the krb team?
the dangers of not writing your own rpc implementation.
/usr/home/dreign/useless/krb5-1.1-current/src/lib/rpc/xdr_array.c :
/*
* XDR an array of arbitrary elements
* *addrp is a pointer to the array, *sizep is the number of elements.
* If addrp is NULL (*sizep
Hi,
As the advisory says: ...Additional
commercial and open-source Unix operating systems use implementations of
SunRPC, and may also be vulnerable..
it seems that glibc based systems (eg: most, if not all, linuxes)
are also vulnerable to exactly the same xdr_array problem.
I am pleased to announce the immediate availability of the current
development code of Xprobe2.
Xprobe2 is an active operating system fingerprinting tool with a
different approach to operating system fingerprinting. Xprobe2 rely on
fuzzy signature matching, probabilistic guesses, multiple
-BEGIN PGP SIGNED MESSAGE-
Hello everyone,
I am pleased to announce the immediate, free availability of the Nmap
Security Scanner version 3.00 from http://www.insecure.org/nmap/ .
Nmap is a utility for network exploration or security auditing. It
supports ping scanning (determine which
Bugtraq has a large number of subscribers whose out-of-office replies
are sent even in response to mailing-list messages. Since this is a
major nuisance, the Reply-To address on this email is fake.
Please address replies to:
NetBSD Security Officer [EMAIL PROTECTED]
-BEGIN PGP SIGNED
Bugtraq has a large number of subscribers whose out-of-office replies
are sent even in response to mailing-list messages. Since this is a
major nuisance, the Reply-To address on this email is fake.
Please address replies to:
NetBSD Security Officer [EMAIL PROTECTED]
-BEGIN PGP SIGNED
Bugtraq has a large number of subscribers whose out-of-office replies
are sent even in response to mailing-list messages. Since this is a
major nuisance, the Reply-To address on this email is fake.
Please address replies to:
NetBSD Security Officer [EMAIL PROTECTED]
-BEGIN PGP SIGNED
On Wed, Jul 31, 2002 at 09:29:14PM +, Tina Bird wrote:
The vendors listed in the CERT advisory on the OpenSSL vulnerabilities are
all producing server-side software:
http://www.cert.org/advisories/CA-2002-23.html
Does anyone know if Netscape, Opera, Internet Explorer or any of the
Tina Bird [EMAIL PROTECTED] writes:
The vendors listed in the CERT advisory on the OpenSSL vulnerabilities are
all producing server-side software:
http://www.cert.org/advisories/CA-2002-23.html
Does anyone know if Netscape, Opera, Internet Explorer or any of the other
browsers are
-BEGIN PGP SIGNED MESSAGE-
MIT krb5 Security Advisory 2002-001
2002-08-02
Topic: Remote root vulnerability in MIT krb5 admin system
Severity: Remote user may be able to gain root access to a KDC host.
SUMMARY
===
There is an integer overflow bug in the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 141-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 1st, 2002
-
The vendors listed in the CERT advisory on the OpenSSL vulnerabilities are
all producing server-side software:
http://www.cert.org/advisories/CA-2002-23.html
Does anyone know if Netscape, Opera, Internet Explorer or any of the other
browsers are vulnerable to these issues?
Thanks in
+ Summary +
Several exploits allow users to conduct flooding of other users and create client
connections that are not visible to other users connected. These vulnerabilities
can create havoc in an, otherwise, friendly chat environment.
+ About Cyan Chat +
Cyan Chat (CC) is a simple chat
Affected Systems
--
The vulnerability was discovered on Xitami 2.5b5 for Win32,
so this may (not) be a Win32-specific issue. No data has been
collected on other versions, so such a determination would be
purely speculation and therefore not helpful to those running
potentially
I tried the same method as you suggested on Xitami 2.5b5 for Win32,
but my results are a bit different.
I recieved following errors:
Service Unavailable error
It Ignores session request
Although i tried it using a perl script flooding the GET requests in a
loop, instead of using browser
16 matches
Mail list logo