Security Advisory: Raptor Firewall Weak ISN Vulnerability

2002-08-02 Thread Kristof Philipsen
+==+ | Ubizen Security Advisory: Raptor Firewall Weak ISN Vulnerability | +==+ | [EMAIL PROTECTED] Friday August 02, 2002 |

kerberos rpc xdr_array

2002-08-02 Thread david evlis reign
no notification from the krb team? the dangers of not writing your own rpc implementation. /usr/home/dreign/useless/krb5-1.1-current/src/lib/rpc/xdr_array.c : /* * XDR an array of arbitrary elements * *addrp is a pointer to the array, *sizep is the number of elements. * If addrp is NULL (*sizep

Re: Remote Buffer Overflow Vulnerability in Sun RPC

2002-08-02 Thread Ricardo Quesada
Hi, As the advisory says: ...Additional commercial and open-source Unix operating systems use implementations of SunRPC, and may also be vulnerable.. it seems that glibc based systems (eg: most, if not all, linuxes) are also vulnerable to exactly the same xdr_array problem.

Xprobe2 - Tool Paper release

2002-08-02 Thread Ofir Arkin
I am pleased to announce the immediate availability of the current development code of Xprobe2. Xprobe2 is an active operating system fingerprinting tool with a different approach to operating system fingerprinting. Xprobe2 rely on fuzzy signature matching, probabilistic guesses, multiple

Nmap 3.00 Released -- http://www.insecure.org/

2002-08-02 Thread Fyodor
-BEGIN PGP SIGNED MESSAGE- Hello everyone, I am pleased to announce the immediate, free availability of the Nmap Security Scanner version 3.00 from http://www.insecure.org/nmap/ . Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which

NetBSD Security Advisory 2002-011: Sun RPC XDR decoder contains buffer overflow

2002-08-02 Thread NetBSD Security Officer
Bugtraq has a large number of subscribers whose out-of-office replies are sent even in response to mailing-list messages. Since this is a major nuisance, the Reply-To address on this email is fake. Please address replies to: NetBSD Security Officer [EMAIL PROTECTED] -BEGIN PGP SIGNED

NetBSD Security Advisory 2002-010: symlink race in pppd

2002-08-02 Thread NetBSD Security Officer
Bugtraq has a large number of subscribers whose out-of-office replies are sent even in response to mailing-list messages. Since this is a major nuisance, the Reply-To address on this email is fake. Please address replies to: NetBSD Security Officer [EMAIL PROTECTED] -BEGIN PGP SIGNED

NetBSD Security Advisory 2002-009: Multiple vulnerabilities in OpenSSL code

2002-08-02 Thread NetBSD Security Officer
Bugtraq has a large number of subscribers whose out-of-office replies are sent even in response to mailing-list messages. Since this is a major nuisance, the Reply-To address on this email is fake. Please address replies to: NetBSD Security Officer [EMAIL PROTECTED] -BEGIN PGP SIGNED

Re: OpenSSL Vulnerabilities

2002-08-02 Thread troy
On Wed, Jul 31, 2002 at 09:29:14PM +, Tina Bird wrote: The vendors listed in the CERT advisory on the OpenSSL vulnerabilities are all producing server-side software: http://www.cert.org/advisories/CA-2002-23.html Does anyone know if Netscape, Opera, Internet Explorer or any of the

Re: OpenSSL Vulnerabilities

2002-08-02 Thread Eric Rescorla
Tina Bird [EMAIL PROTECTED] writes: The vendors listed in the CERT advisory on the OpenSSL vulnerabilities are all producing server-side software: http://www.cert.org/advisories/CA-2002-23.html Does anyone know if Netscape, Opera, Internet Explorer or any of the other browsers are

MITKRB5-SA-2002-001: Remote root vulnerability in MIT krb5 adminsystem

2002-08-02 Thread Tom Yu
-BEGIN PGP SIGNED MESSAGE- MIT krb5 Security Advisory 2002-001 2002-08-02 Topic: Remote root vulnerability in MIT krb5 admin system Severity: Remote user may be able to gain root access to a KDC host. SUMMARY === There is an integer overflow bug in the

[SECURITY] [DSA 141-1] New mpack packages fix buffer overflow

2002-08-02 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 141-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 1st, 2002 -

RE: OpenSSL Vulnerabilities

2002-08-02 Thread Josh Welch
The vendors listed in the CERT advisory on the OpenSSL vulnerabilities are all producing server-side software: http://www.cert.org/advisories/CA-2002-23.html Does anyone know if Netscape, Opera, Internet Explorer or any of the other browsers are vulnerable to these issues? Thanks in

Multiple Cyan Chat Exploits

2002-08-02 Thread chip
+ Summary + Several exploits allow users to conduct flooding of other users and create client connections that are not visible to other users connected. These vulnerabilities can create havoc in an, otherwise, friendly chat environment. + About Cyan Chat + Cyan Chat (CC) is a simple chat

Xitami Connection Flood Server Termination Vulnerability

2002-08-02 Thread Matthew Murphy
Affected Systems -- The vulnerability was discovered on Xitami 2.5b5 for Win32, so this may (not) be a Win32-specific issue. No data has been collected on other versions, so such a determination would be purely speculation and therefore not helpful to those running potentially

Re: Xitami Connection Flood Server Termination Vulnerability

2002-08-02 Thread Muhammad Faisal Rauf Danka
I tried the same method as you suggested on Xitami 2.5b5 for Win32, but my results are a bit different. I recieved following errors: Service Unavailable error It Ignores session request Although i tried it using a perl script flooding the GET requests in a loop, instead of using browser