Exploit code for IP Smart Spoofing

2002-11-12 Thread Laurent Licour
Hello As we reported in our previous article: IP Smartspoofing (http://www.althes.fr/ressources/avis/smartspoofing.htm), we introduced a new method for IP Spoofing, allowing full-connexion from any client software. The exploit code smartspoof.pl is a proof of concept (for educational purpose onl

Security Update: [CSSA-2002-042.0] Linux: libpng progressive image loading vulnerabilities and other buffer overflows

2002-11-12 Thread security
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] __ SCO Security Advisory Subject:Linux: libpng progressive image loading vulnerabilities and other buf

[SecurityOffice] INweb Mail Server v2.01 Denial of Service Vulnerability

2002-11-12 Thread Tamer Sahin
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 - --[ INweb Mail Server v2.01 Denial of Service Vulnerability ]-- - --[ Type Denial of Service - --[ Release Date November 12, 2002 - --[ Product / Vendor The INweb Mail Server is a standard Internet POP3 and SMTP mail server that runs flawlessly

APBoard - post threads to protected forums and possibility to hijack forum-password

2002-11-12 Thread ProXy
Product: Another PHP Program - APBoard Versions: tested on 2.02, 2.03 Vulnerability: post threads to protected forums and possibility to hijack forum-password Date: November 12, 2002 Discovered by: ProXy <[EMAIL PROTECTED]> Introduction: Normal Users can submit threads to password prot

[Fwd: Notice of serious vulnerabilities in ISC BIND 4 & 8]

2002-11-12 Thread Aaron Howell
-Forwarded Message- From: Peter Losher <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Notice of serious vulnerabilities in ISC BIND 4 & 8 Date: 12 Nov 2002 10:02:25 -0800 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ISC is aware of several bugs which can result in serious vulnerabi

Fresh hole in W3Mail (fwd)

2002-11-12 Thread Tim Brown
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The attached advisory supercedes my previous effort regarding W3Mail (NDSA20020719). It seems that in fixing the original holes, CascadeSoft introduced a new one. Their fix for the original hole was as I suggested, to move the MIME attachments d

EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities

2002-11-12 Thread Marc Maiffret
Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities Release Date: November 12, 2002 Severity: High (Remote SYSTEM level code execution) Systems Affected: Macromedia Coldfusion 6.0 and prior (IIS ISAPI) Macromedia JRun 4.0 and prior (IIS ISAPI) Description: Macromedia JRun a

ISS Security Advisory: Multiple Remote Vulnerabilities in BIND4 andBIND8 (fwd)

2002-11-12 Thread Dave Ahmad
David Mirza Ahmad Symantec 0x26005712 8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12 -- Forwarded message -- Return-Path: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] Received: (qmail 800 invoked from network); 12 Nov 2002 17:04:55 - Received: from atla-

NOVL-2002-2963827 - Remote Manager Security Issue - NW5.1

2002-11-12 Thread Ed Reed
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 For Immediate Disclosure == Summary == Security Alert: NOVL-2002-2963827 Title: Remote Manager Security Issue - NW5.1 Date: 16-Oct-2002 Revision: Original Produc

RE: When scrubbing secrets in memory doesn't work

2002-11-12 Thread Michael Wojcik
Reposted. > -Original Message- > From: Michael Wojcik > Sent: Wednesday, November 06, 2002 12:25 AM > To: 'Michael Howard' > Cc: [EMAIL PROTECTED] > Subject: RE: When scrubbing secrets in memory doesn't work > > > > From: Michael Howard [mailto:mikehow@;microsoft.com] > > Sent: Tuesday,

RE: A technique to mitigate cookie-stealing XSS attacks

2002-11-12 Thread Jason Coombs
Aloha, Everyone interested in preventing XSS should review and understand http://www.xwt.org/sop.txt which is a vulnerability that combines XSS with bad data in DNS to allow an attacker to hijack a Web browser (IE) and force it to function as a proxy for requests of the attacker's choosing -- re

SuSE Security Announcement: KDE lanbrowser vulnerability (SuSE-SA:2002:042)

2002-11-12 Thread Olaf Kirch
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package:kdenetwork Announcement-ID:SuSE-SA:2002:042 Date: Tue Nov

[SECURITY] [DSA 194-1] New masqmail packages fix buffer overflows

2002-11-12 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 194-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze November 12th, 2002

KDE Security Advisory: rlogin.protocol and telnet.protocol URL KIO Vulnerability

2002-11-12 Thread Andreas Pour
KDE Security Advisory: rlogin.protocol and telnet.protocol URL KIO Vulnerability Original Release Date: 2002-11-11 URL: http://www.kde.org/info/security/advisory-2002-1.txt 0. References None. 1. Systems affected: All KDE 2 releases starting with KDE 2.1 and all KDE 3 rele

RE: A technique to mitigate cookie-stealing XSS attacks

2002-11-12 Thread jasonk
> -Original Message- > From: Ulf Harnhammar [mailto:ulfh@;update.uu.se] > Sent: Sunday, 10 November 2002 2:22 PM > To: Justin King > Subject: Re: A technique to mitigate cookie-stealing XSS attacks > > On Thu, 7 Nov 2002, Justin King wrote: > > > I would be very interested in major brow

NOVL-2002-2963767 - Remote Manager Security Issue - eDir 8.6.2

2002-11-12 Thread Ed Reed
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 For Immediate Disclosure == Summary == Security Alert: NOVL-2002-2963767 Title: Remote Manager Security Issue - eDir 8.6.2 Date: 22-Oct-2002 Revision: Original Pr

Remote Buffer Overflow vulnerability in Light HTTPd

2002-11-12 Thread dong-h0un U
INetCop Security Advisory #2002-0x82-002 * Title: Remote Buffer Overflow vulnerability in Light HTTPd. 0x01. Description Lhttpd that is improved in ghttpd for more convenient and strong

GLSA: apache

2002-11-12 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200211-003 - - PACKAGE : apache SUMMARY : Cross-Site Scripting Vulnerabili

WebChat for XOOPS RC3 SQL INJECTION

2002-11-12 Thread vALDEUx
Text available at http://www.phpsecure.org/tutos/webchat.1-5.xoops.rc3.sql.injection.txt Patch available on phpsecure.org XOOPS RC3 WebChat Module SQL Injection Tested with : Xoops RC3 WebChat 1-5 Author :val2 - phpsecure.org for more info and ~patchs~ Lines 291-299 from modules

KDE Security Advisory: resLISa / LISa Vulnerabilities

2002-11-12 Thread Andreas Pour
KDE Security Advisory: resLISa / LISa Vulnerabilities Original Release Date: 2002-11-11 URL: http://www.kde.org/info/security/advisory-2002-2.txt 0. References iDEFENSE Security Advisory 11.11.02 (http://www.idefense.com/advisory/11.11.02.txt). 1. Systems affected: A

[SecurityOffice] Hyperion Ftp Server v2.8.1 Directory Traversal Vulnerability

2002-11-12 Thread Tamer Sahin
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 - --[ Hyperion Ftp Server v2.8.1 Directory Traversal Vulnerability ]-- - --[ Type Directory Traversal - --[ Release Date November 12, 2002 - --[ Product / Vendor Hyperion FTP Server is a powerful, reliable FTP server for Windows 95/98/NT/2000, and