GLSA: mod_ssl

2002-10-28 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200210-009 - - PACKAGE : mod_ssl SUMMARY : cross site scripting DATE    :

Re: Buffer overflow in kadmind4

2002-10-28 Thread Chris Barnes
Hi! About the KTH Heimdal remote root exploit I can say it is really serious! About a week ago a hacker stole over 10'000 passwords from Stockholm University in Sweden for all students and staff by trapping the stack buffer overflow in kadmind4. You can imagine what problems this caused and

Substitution of document signed under new American format ECDSA.

2002-10-28 Thread Alexander Komlin
Introduction. Contemporary world is practically impossible without systems of electronic digital signature (EDS). Every Internet user imperceptibly for himself uses them. It is these methods which ensure functionality and efficiency of contemporary banking sector. Despite this fact the

Oracle9iAS Web Cache Denial of Service (a102802-1)

2002-10-28 Thread @stake advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 @stake, Inc. www.atstake.com Security Advisory Advisory Name: Oracle9iAS Web Cache Denial of Service Release Date: 10-28-2002 Application: Oracle9iAS Web

Re: Privilege Escalation Vulnerability In phpBB 2.0.0

2002-10-28 Thread x x
Hi, Note: phpBB versions above 2.0.0 are not vulnerable. Note that there are alot of modified/hacked versions of phpbb floating around the Net, such as the phpbbtonuke port for phpnuke. The phpbb port for phpnuke55 and 56 uses phpbb2.0, and there is no patch or available port upgrade. As a

GLSA: krb5

2002-10-28 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200210-011 - - PACKAGE : krb5 SUMMARY : buffer overflow DATE    :

MDaemon SMTP/POP/IMAP server DoS

2002-10-28 Thread D4rkGr3y
## #Product: MDaemon SMTP/POP/IMAP server # #Authors: Alt-N Technologies Ltd [www.mdaemon.com] # #Vulnerable versions: v.6.0.7 and bellow # #Vulnerability: buffer overflow # #Bugexploit by D4rkGr3y

CISCO as5350 crashes with nmap connect scan

2002-10-28 Thread Thomas Munn
I have managed to reduplicate at least five times the following scenario with a cisco as5250, with firmwrare 12.2 (11t) release firmware of cisco: nmap -dinsane -p 1-65535 ip.of.as5350 This causes a hard lockup, and the device must be powered off in order to have functionality restored to

GLSA: ypserv

2002-10-28 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200210-010 - - PACKAGE : ypserv SUMMARY : information leak DATE    :

Privilege Escalation Vulnerability In phpBB 2.0.0

2002-10-28 Thread nick84
Privilege Escalation Vulnerability In phpBB 2.0.0 - Rootsecure.net recently found a privilege escalation vulnerability in phpBB 2.0.0 which allows any person with a user level account to escalate their privileges to that of administrator

[SECURITY] [DSA 182-1] New kghostview packages fix buffer overflow

2002-10-28 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 182-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze October 28th, 2002

SCAN Associates Advisory : Multiple vurnerabilities on mailreader.com

2002-10-28 Thread pokleyzz
Products: Mailreader.com v 2.3.31 and below (http://www.mailreader.com) Date: 28 October 2002 Author: pokleyzz [EMAIL PROTECTED] Contributors: [EMAIL PROTECTED] [EMAIL PROTECTED] Description === Mailreader.com (http://www.mailreader.com) is web base pop3 email reader written in perl.

dobermann FORUM (php)

2002-10-28 Thread Frog Man
Informations : °° Product : dobermann FORUM version : 0.5 website : http://www.le-dobermann.com Problem : Include file PHP Code/location : °°° entete.php enteteacceuil.php topic/entete.php : -- ?php include $subpath.banniere.php;

Security Update: [CSSA-2002-040.0] Linux: uudecode performs inadequate checks on user-specified output files

2002-10-28 Thread security
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] __ SCO Security Advisory Subject:Linux: uudecode performs inadequate checks on user-specified output