- Forwarded message from Product Security [EMAIL PROTECTED] -
Date: Mon, 24 Mar 2003 14:44:36 -0800
Subject: APPLE-SA-2003-03-24 Samba, OpenSSL
From: Product Security [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Message-ID: [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
//(#) Mordred Security Labs advisory
Release date: March 25, 2003
Name: Integer overflow in PHP socket_iovec_alloc() function
Versions affected: 4.3.2
Conditions: PHP must be compiled with --enable-sockets option, which is
turned off by default
Risk: average
Author: Sir Mordred ([EMAIL
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
IRM Security Advisory No. 005
JWALK application server version 3.2C9 Directory Traversal Vulnerability
Vulnerablity Type / Importance: Information Leakage / High
Problem discovered: November 28th 2002
Vendor contacted:
Product: PHP WEB CHAT
Version: 2.0
OffSite: http://www.webscriptworld.com
Problem: Cross Site Scripting
Actions:
1)Register
-
Red Hat Security Advisory
Synopsis: New samba packages fix security vulnerabilities
Advisory ID: RHSA-2003:095-02
Issue date:2003-03-17
Updated on:2003-03-25
Product:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 268-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 25th, 2003
In-Reply-To: [EMAIL PROTECTED]
Not exactly cause I have CPK FW-1 NG FP2 Build 52163. The logging server
management are separated. It seems that syslog is running on port 514udp:
$ ps -aef | grep syslog
root 7239 7231 0 Mar23 ?00:00:01 syslog 514 all
Maybe the wording Checkpoint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - -
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-22
- - -
PACKAGE : glibc
SUMMARY : integer
Product : VChat
Version : First
WebSite : http://vchat.host.sk
Problem :
* View messages
* Easy DoS
Description:
View messages:
==
File with all chat sessions are in txt file (msg.txt) and everybody can
read it
Easy DoS:
=
If the size
Attached is a set of official-ish patches to the BitchX 1.0c19 release
to cover the mentioned buffer mishandling.
Alternatively, you can upgrade to the latest CVS revision of BitchX.
- caf.
diff -ur BitchX.orig/source/banlist.c BitchX/source/banlist.c
--- BitchX.orig/source/banlist.c
viewpage.php is a part of PHPNuke.
The Script allows an attacker to view all files on the System.
Example:
http://server.com/viewpage.php?file=/etc/passwd
Zero X member of www.Lobnan.de
##
Application: Emule (http://emule-project.net)
Versions:0.27b and previous versions
Platform:Windows
Bug: The program tries to read memory offset 0x if an
attacker send a chat message
On 25. mar 2003, 16:32, Zero_X www. lobnan. de Team wrote:
viewpage.php is a part of PHPNuke.
The Script allows an attacker to view all files on the System.
Example:
http://server.com/viewpage.php?file=/etc/passwd
great advisory..
about what version you are talking? latest 'stable'
Zero_X www.lobnan.de Team wrote:
viewpage.php is a part of PHPNuke.
The Script allows an attacker to view all files on the System.
Example:
http://server.com/viewpage.php?file=/etc/passwd
umm, what version of phpNuke is vulnerable to this? as far as I'm aware,
there has not been any
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:kernel
Announcement-ID:SuSE-SA:2003:021
Date: Tuesday,
Date: 2003-03-25
1. Topic
System log access and file access/overwrite via HTTP/CGI
2. Description
CGI applications allowing file and directory creation and overwrites,
and access to the system log has incorrect access permissions in a
number of Axis products.
In affected products a user
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I wrote another exploit for the nt.dll bug some days ago.
Explanation and a little documentation is included in the source
file. It compiles in Linux/gcc without any error.
http://www.rs-labs.com/exploitsntools/rs_iis.c
[19.5 kbytes]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: glibc
Advisory ID:
On Tue, 25 Mar 2003 11:59:26 -0600 DaiTengu wrote:
viewpage.php is a part of PHPNuke.
The Script allows an attacker to view all files on the System.
Example:
http://server.com/viewpage.php?file=/etc/passwd
umm, what version of phpNuke is vulnerable to this? as far as I'm
aware,
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: apcupsd remote root vulnerability and buffer overflows
Advisory number:
Actually option 2) is not any better in this particular case, since you
are unable, as far as I can tell, to find a way to return into any
.text segments with call ebx or ecx (which contain pointers to your
shellcode in unicode form). This is not the only unicode exploit though,
so you'll have a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: netpbm
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: openssl
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be
forged
March 24, 2003
SUMMARY
===
Adobe Acrobat Reader supports plug-ins, i.e.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: rxvt
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - -
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-23
- - -
PACKAGE : mod_ssl
SUMMARY : timing
26 matches
Mail list logo