Web server vulnerability in Axis Network Cameras, Video Servers and DVRs

2002-12-20 Thread Axis Product Security
Date: 20 December 2002 1. Topic Web server vulnerability in Axis Network Cameras, Video Servers and Network Digital Video Recorders. 2. Description A potential stack buffer overflow has been found in the authentication code of the modified version of Boa used in some of the embedded Linux

[RAZOR] Problems with mkstemp()

2002-12-20 Thread Michal Zalewski
Common use of 'tmpwatch' utility and its counterparts triggers race conditions in many applications Michal Zalewski [EMAIL PROTECTED], 12/05/2002 Copyright (C) 2002 by Bindview Corporation 1) Scope and exposure info -- A common practice of installing

RE: Directory traversal vulnerabilities in several archivers processing .tar

2002-12-20 Thread konto mailingowe
W licie z ro, 18-12-2002, godz. 06:18, Andrew Kopp pisze: I don't really think this falls into vulnerability because most software will prompt you before it overwrites any file by default. And if anyone would actually allow their own SSHd binary to be over written deserves to be hacked. and

GLSA: perl

2002-12-20 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200212-6 - - PACKAGE : perl SUMMARY : broken safe compartment DATE    :

[SecurityOffice] Polycom Video Conference System Management Server Authentication Bypass Vulnerability

2002-12-20 Thread Tamer Sahin
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 - --[ Polycom Video Conference System Management Server Authentication Bypass Vulnerability ]-- - --[ Type Design Error - --[ Release Date December 19, 2002 - --[ Product / Vendor The Polycom ViewStation FX set top video system provides

SuSE Security Announcement: cyrus-imapd (SuSE-SA:2002:048)

2002-12-20 Thread Sebastian Krahmer
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package:cyrus-imapd Announcement-ID:SuSE-SA:2002:048 Date: Fri

SPGpartenaires (PHP)

2002-12-20 Thread Frog Man
Informations : °° Version : ? - 3.0.1 Website : http://www.scripts-php-gratuits.com Problem : SQL Injection - Access to member's accounts PHP Code/Location : °°° modif/ident.php : -- [...] $sql=SELECT nomsite FROM

nCipher Advisory #6: Access control defects in PKCS#11 keys

2002-12-20 Thread nCipher Support
nCipher Security Advisory No. 6 Access control defects in PKCS#11 keys -- SUMMARY === As a function of internal QA testing, nCipher has identified that, under certain unusual circumstances, keys created by the

GLSA: wget

2002-12-20 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200212-7 - - PACKAGE : wget SUMMARY : directory traversal DATE    :

RealNetworks HELIX Server Buffer Overflow Vulnerabilities (#NISR20122002)

2002-12-20 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name:Muliple Buffer overruns RealNetworks Helix Universal Server 9.0 Systems Affected: Windows, FreeBSD, HP-UX, AIX, Linux, Sun Solaris 2.7 2.8 Severity: High Risk Category: Buffer Overrun Vendor URL: http://www.real.com/ Author: Mark

PHP-Nuke mail CRLF Injection vulnerabilities

2002-12-20 Thread Ulf Harnhammar
PHP-Nuke mail CRLF Injection vulnerabilities PROGRAM: PHP-Nuke VENDOR: Fransisco Burzi et al. HOMEPAGE: http://phpnuke.org/ VULNERABLE VERSIONS: 6.0 (the only supported version) IMMUNE VERSIONS: 6.0 with my patch applied LOGIN REQUIRED: no DESCRIPTION: PHP-Nuke is a Web portal and online

RE: Foundstone Research Labs Advisory - Multiple Exploitable Buffer Overflows in Winamp (fwd)

2002-12-20 Thread Shutters, Mike
I went ahead and installed the latest 2.81, even though it was dated as you said. After the install I found a file in the Plugins directory named IN_MP3.DLL, which is 132K in size and dated December 16, 2002, 1:55 PM. Perhaps this is the file which created the fix. Unfortunately, I didn't check

Re: Foundstone Research Labs Advisory - Multiple Exploitable Buff er Overflows in Winamp (fwd)

2002-12-20 Thread Mischa Krilov
On Thursday 19 December 2002 07:17 pm, Shutters, Mike wrote: I went ahead and installed the latest 2.81, even though it was dated as you said. After the install I found a file in the Plugins directory named IN_MP3.DLL, which is 132K in size and dated December 16, 2002, 1:55 PM. Perhaps this

[SECURITY] [DSA 214-1] New kdentwork packages fix buffer overflows

2002-12-20 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 214-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze December 20th, 2002

Re: XSS and PHP include bug in W-Agora

2002-12-20 Thread Marc Druilhe
Thanks for pointing out this bug. I will fix it ASAP. Notice that only users that have system administrator privilege are concerned. These users are usually trusted and should have all the accesses to the w-agora installation, so IMHO the security hole is not that sensible. Nethertheless, I will

Cisco Security Advisory: Cisco Security Advisory: SSH Malformed Packet Vulnerabilities

2002-12-20 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: SSH Malformed Packet Vulnerabilities Revision 1.0: INTERIM For Public Release 2002 December 19th 23:00 GMT - -- Please provide your feedback on

Security Update: [CSSA-2002-059.0] Linux: multiple vulnerabilities in BIND (CERT CA-2002-31)

2002-12-20 Thread security
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] __ SCO Security Advisory Subject:Linux: multiple vulnerabilities in BIND (CERT CA-2002-31) Advisory

XSS and PHP include bug in W-Agora

2002-12-20 Thread xatr0z
I have found some bugs in W-Agora's forum configuration filesystem. In the page editform.php, an admin or root user can open any file, with the PHP Include bug. A sample of the script: ***editform.php*** ?php # the script gets the parameter file, puts .php after this, and includes the file in the