[SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-04 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 187-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze November 4th, 2002

iDEFENSE Security Advisory 11.04.02b: Denial of Service Vulnerability in Xeneo Web Server

2002-11-04 Thread David Endler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 iDEFENSE Security Advisory 11.04.02b: http://www.idefense.com/advisory/11.04.02b.txt Denial of Service Vulnerability in Xeneo Web Server November 4, 2002 I. BACKGROUND Northern Solutions' Xeneo Web Server is a fast, compact web server that makes it

iDEFENSE Security Advisory 11.04.02a: Pablo FTP Server DoS Vulnerability

2002-11-04 Thread David Endler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 iDEFENSE Security Advisory 11.04.02a: http://www.idefense.com/advisory/11.04.02a.txt Pablo FTP Server DoS Vulnerability November 4, 2002 I. BACKGROUND Pablo Software Solutions' FTP Server is a multi-threaded FTP server for Windows 98, NT 4.0, 2000

Re: Allot Netenforcer problems, GNU TAR flaw

2002-11-04 Thread Felix Radensky
In-Reply-To: [EMAIL PROTECTED] Hello, Allot has addressed all security problems mentioned in the posting of Boldizsar Bencsath in our new version, 4.2.4, scheduled end November 2002. To be more specific, the following fixes were implemented: 1. SSH port forwarding was disabled. 2.

Oracle iSQL*Plus buffer overflow vulnerability (#NISR04112002)

2002-11-04 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: Oracle iSQL*Plus buffer overflow Systems: Oracle Database 9i R1,2 on all operating systems Severity: High Risk Vendor URL: http://www.oracle.com/ Author: David Litchfield ([EMAIL PROTECTED]) Advisory URL:

[Announce] AngeL v0.9.0

2002-11-04 Thread Paolo Perego
Hi guys from all over the world. I'm very happy to announce the world, the new development version of AngeL. AngeL is linux kernel module designed with security as goal. However, it is not AngeL's purpose to defend your host from your network neighbours. AngeL prevents your host from becoming a

[A3SC] MS IIS out of process privilege elevation vulnerability(A3CR@K-Vul-2002-06-002)

2002-11-04 Thread li0n
*** A3 Security Consulting: CR@K Vulnerability Research *** Title : MS IIS out of process privilege elevation vulnerability(A3CR@K-Vul-2002-06-002) Reporter : li0n ([EMAIL PROTECTED]) Affected software : IIS 4.0, 5.0, 5.1 Risk : High Local/Remote : Local Category : Windows - IIS - Privilege

Accesspoints disclose wep keys, password and mac filter (fwd)

2002-11-04 Thread Tom Knienieder
KHAMSIN Security News KSN Reference: 2002-11-01 0001 ULO --- Title - Accesspoints disclose wep keys, password and mac filter Date 2002-11-01 Description: GlobalSunTech develops

Re: Accesspoints disclose wep keys, password and mac filter (fwd)

2002-11-04 Thread Frank Louwers
On Sun, Nov 03, 2002 at 02:43:25PM +0100, Tom Knienieder wrote: KHAMSIN Security News KSN Reference: 2002-11-01 0001 ULO --- Title - Accesspoints disclose wep keys, password and mac filter Date

Re: Accesspoints disclose wep keys, password and mac filter (fwd)

2002-11-04 Thread Cliff Albert
On Sun, Nov 03, 2002 at 02:43:25PM +0100, Tom Knienieder wrote: Systems Affected Vulnerable, tested, OEM Version from GlobalSunTech: WISECOM GL2422AP-0T Possibly vulnerable, not tested, OEM Version from GlobalSunTech: D-Link

RE: Accesspoints disclose wep keys, password and mac filter (fwd)

2002-11-04 Thread Melson, Paul
The Linksys WAP11-V2.2 appears to be at least partially susceptible to this trick: $ ./ksn-wap Type: GL2422AP-00-0M0 T1.0 -02 Announced Name : yyy Admin Username : Admin Password : PaulM -Original Message- From: Tom Knienieder [mailto:knienieder;khamsin.ch] Sent: