Date: 20 December 2002
1. Topic
Web server vulnerability in Axis Network Cameras, Video Servers and
Network Digital Video Recorders.
2. Description
A potential stack buffer overflow has been found in the authentication
code of the modified version of Boa used in some of the embedded
Linux
Common use of 'tmpwatch' utility and its counterparts triggers race
conditions in many applications
Michal Zalewski [EMAIL PROTECTED], 12/05/2002
Copyright (C) 2002 by Bindview Corporation
1) Scope and exposure info
--
A common practice of installing
W licie z ro, 18-12-2002, godz. 06:18, Andrew Kopp pisze:
I don't really think this falls into vulnerability because most software
will prompt you before it overwrites any file by default. And if anyone
would actually allow their own SSHd binary to be over written deserves
to be hacked.
and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
GENTOO LINUX SECURITY ANNOUNCEMENT 200212-6
- -
PACKAGE : perl
SUMMARY : broken safe compartment
DATE :
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
- --[ Polycom Video Conference System Management Server Authentication Bypass
Vulnerability ]--
- --[ Type
Design Error
- --[ Release Date
December 19, 2002
- --[ Product / Vendor
The Polycom ViewStation FX set top video system provides
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:cyrus-imapd
Announcement-ID:SuSE-SA:2002:048
Date: Fri
Informations :
°°
Version : ? - 3.0.1
Website : http://www.scripts-php-gratuits.com
Problem : SQL Injection - Access to member's accounts
PHP Code/Location :
°°°
modif/ident.php :
--
[...]
$sql=SELECT nomsite FROM
nCipher Security Advisory No. 6
Access control defects in PKCS#11 keys
--
SUMMARY
===
As a function of internal QA testing, nCipher has identified that,
under certain unusual circumstances, keys created by the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
GENTOO LINUX SECURITY ANNOUNCEMENT 200212-7
- -
PACKAGE : wget
SUMMARY : directory traversal
DATE :
NGSSoftware Insight Security Research Advisory
Name:Muliple Buffer overruns RealNetworks Helix Universal Server 9.0
Systems Affected: Windows, FreeBSD, HP-UX, AIX, Linux, Sun Solaris 2.7
2.8
Severity: High Risk
Category: Buffer Overrun
Vendor URL: http://www.real.com/
Author: Mark
PHP-Nuke mail CRLF Injection vulnerabilities
PROGRAM: PHP-Nuke
VENDOR: Fransisco Burzi et al.
HOMEPAGE: http://phpnuke.org/
VULNERABLE VERSIONS: 6.0 (the only supported version)
IMMUNE VERSIONS: 6.0 with my patch applied
LOGIN REQUIRED: no
DESCRIPTION:
PHP-Nuke is a Web portal and online
I went ahead and installed the latest 2.81, even though it was dated as you
said. After the install I found a file in the Plugins directory named
IN_MP3.DLL, which is 132K in size and dated December 16, 2002, 1:55 PM.
Perhaps this is the file which created the fix. Unfortunately, I didn't
check
On Thursday 19 December 2002 07:17 pm, Shutters, Mike wrote:
I went ahead and installed the latest 2.81, even though it was dated as
you said. After the install I found a file in the Plugins directory
named IN_MP3.DLL, which is 132K in size and dated December 16, 2002,
1:55 PM. Perhaps this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 214-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
December 20th, 2002
Thanks for pointing out this bug. I will fix it ASAP.
Notice that only users that have system administrator privilege are concerned. These
users are usually
trusted and should have all the accesses to the w-agora installation, so IMHO the
security hole is not that
sensible.
Nethertheless, I will
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: SSH Malformed Packet Vulnerabilities
Revision 1.0: INTERIM
For Public Release 2002 December 19th 23:00 GMT
- --
Please provide your feedback on
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: multiple vulnerabilities in BIND (CERT CA-2002-31)
Advisory
I have found some bugs in W-Agora's forum configuration filesystem. In the
page editform.php, an admin or root user can open any file, with the PHP
Include bug. A sample of the script:
***editform.php***
?php
# the script gets the parameter file, puts .php after this, and includes
the file in the
18 matches
Mail list logo