Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL

2003-03-25 Thread Bryan Blackburn
- Forwarded message from Product Security [EMAIL PROTECTED] - Date: Mon, 24 Mar 2003 14:44:36 -0800 Subject: APPLE-SA-2003-03-24 Samba, OpenSSL From: Product Security [EMAIL PROTECTED] To: [EMAIL PROTECTED] Message-ID: [EMAIL PROTECTED] -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

@(#)Mordred Labs advisory - Integer overflow in PHP socket_iovec_alloc() function

2003-03-25 Thread Sir Mordred
//(#) Mordred Security Labs advisory Release date: March 25, 2003 Name: Integer overflow in PHP socket_iovec_alloc() function Versions affected: 4.3.2 Conditions: PHP must be compiled with --enable-sockets option, which is turned off by default Risk: average Author: Sir Mordred ([EMAIL

IRM 005: JWalk Application Server Version 3.2c9 DirectoryTraversal Vulnerability

2003-03-25 Thread IRM Advisories
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- IRM Security Advisory No. 005 JWALK application server version 3.2C9 Directory Traversal Vulnerability Vulnerablity Type / Importance: Information Leakage / High Problem discovered: November 28th 2002 Vendor contacted:

CSS in PHP WEB CHAT

2003-03-25 Thread Over_G
Product: PHP WEB CHAT Version: 2.0 OffSite: http://www.webscriptworld.com Problem: Cross Site Scripting Actions: 1)Register

[RHSA-2003:095-02] New samba packages fix security vulnerabilities

2003-03-25 Thread bugzilla
- Red Hat Security Advisory Synopsis: New samba packages fix security vulnerabilities Advisory ID: RHSA-2003:095-02 Issue date:2003-03-17 Updated on:2003-03-25 Product:

[SECURITY] [DSA 268-1] New mutt packages fix arbitrary code execution

2003-03-25 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 268-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze March 25th, 2003

Re: Check Point FW-1 NG FP3 FP3 HF1: DoS attack against syslog daemon possible

2003-03-25 Thread Rizan Sheikh Mohd
In-Reply-To: [EMAIL PROTECTED] Not exactly cause I have CPK FW-1 NG FP2 Build 52163. The logging server management are separated. It seems that syslog is running on port 514udp: $ ps -aef | grep syslog root 7239 7231 0 Mar23 ?00:00:01 syslog 514 all Maybe the wording Checkpoint

GLSA: glibc (200303-22)

2003-03-25 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - GENTOO LINUX SECURITY ANNOUNCEMENT 200303-22 - - - PACKAGE : glibc SUMMARY : integer

VChat

2003-03-25 Thread subj
Product : VChat Version : First WebSite : http://vchat.host.sk Problem : * View messages * Easy DoS Description: View messages: == File with all chat sessions are in txt file (msg.txt) and everybody can read it Easy DoS: = If the size

Re: Buffer overflows in ircII-based clients

2003-03-25 Thread caf
Attached is a set of official-ish patches to the BitchX 1.0c19 release to cover the mentioned buffer mishandling. Alternatively, you can upgrade to the latest CVS revision of BitchX. - caf. diff -ur BitchX.orig/source/banlist.c BitchX/source/banlist.c --- BitchX.orig/source/banlist.c

PHPNuke viewpage.php allows Remote File retrieving

2003-03-25 Thread Zero_X www . lobnan . de Team
viewpage.php is a part of PHPNuke. The Script allows an attacker to view all files on the System. Example: http://server.com/viewpage.php?file=/etc/passwd Zero X member of www.Lobnan.de

Emule 0.27b remote crash

2003-03-25 Thread Auriemma Luigi
## Application: Emule (http://emule-project.net) Versions:0.27b and previous versions Platform:Windows Bug: The program tries to read memory offset 0x if an attacker send a chat message

Re: PHPNuke viewpage.php and another SQL injections

2003-03-25 Thread Tibor Pittich
On 25. mar 2003, 16:32, Zero_X www. lobnan. de Team wrote: viewpage.php is a part of PHPNuke. The Script allows an attacker to view all files on the System. Example: http://server.com/viewpage.php?file=/etc/passwd great advisory.. about what version you are talking? latest 'stable'

Re: PHPNuke viewpage.php allows Remote File retrieving

2003-03-25 Thread DaiTengu
Zero_X www.lobnan.de Team wrote: viewpage.php is a part of PHPNuke. The Script allows an attacker to view all files on the System. Example: http://server.com/viewpage.php?file=/etc/passwd umm, what version of phpNuke is vulnerable to this? as far as I'm aware, there has not been any

SuSE Security Announcement: kernel (SuSE-SA:2003:021)

2003-03-25 Thread Roman Drahtmueller
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package:kernel Announcement-ID:SuSE-SA:2003:021 Date: Tuesday,

Axis Video and Camera Servers - System log access and file access/overwrite via HTTP/CGI

2003-03-25 Thread Axis Product Security
Date: 2003-03-25 1. Topic System log access and file access/overwrite via HTTP/CGI 2. Description CGI applications allowing file and directory creation and overwrites, and access to the system log has incorrect access permissions in a number of Axis products. In affected products a user

IIS 5.0 WebDAV -Proof of concept-. Fully documented.

2003-03-25 Thread Roman Medina
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, I wrote another exploit for the nt.dll bug some days ago. Explanation and a little documentation is included in the source file. It compiles in Linux/gcc without any error. http://www.rs-labs.com/exploitsntools/rs_iis.c [19.5 kbytes]

MDKSA-2003:037 - Updated glibc packages fix vulnerabilities in RPC XDR decoder

2003-03-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: glibc Advisory ID:

Re: PHPNuke viewpage.php allows Remote File retrieving

2003-03-25 Thread Jim Geovedi
On Tue, 25 Mar 2003 11:59:26 -0600 DaiTengu wrote: viewpage.php is a part of PHPNuke. The Script allows an attacker to view all files on the System. Example: http://server.com/viewpage.php?file=/etc/passwd umm, what version of phpNuke is vulnerable to this? as far as I'm aware,

Security Update: [CSSA-2003-015.0] Linux: apcupsd remote root vulnerability and buffer overflows

2003-03-25 Thread security
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] __ SCO Security Advisory Subject:Linux: apcupsd remote root vulnerability and buffer overflows Advisory number:

Re: IIS 5.0 WebDAV -Proof of concept-. Fully documented.

2003-03-25 Thread Dave Aitel
Actually option 2) is not any better in this particular case, since you are unable, as far as I can tell, to find a way to return into any .text segments with call ebx or ecx (which contain pointers to your shellcode in unicode form). This is not the only unicode exploit though, so you'll have a

MDKSA-2003:036 - Updated netpbm packages fix math overflow errors

2003-03-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: netpbm Advisory ID:

MDKSA-2003:035 - Updated openssl packages fix RSA-related insecurities

2003-03-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: openssl Advisory ID:

Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be forged

2003-03-25 Thread Vladimir Katalov
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be forged March 24, 2003 SUMMARY === Adobe Acrobat Reader supports plug-ins, i.e.

MDKSA-2003:034 - Updated rxvt packages fix escape sequence insecurities

2003-03-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: rxvt Advisory ID:

GLSA: mod_ssl (200303-23)

2003-03-25 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - GENTOO LINUX SECURITY ANNOUNCEMENT 200303-23 - - - PACKAGE : mod_ssl SUMMARY : timing