[USN-490-1] Firefox vulnerabilities

2007-07-20 Thread Kees Cook
=== Ubuntu Security Notice USN-490-1 July 19, 2007 firefox vulnerabilities CVE-2007-3089, CVE-2007-3285, CVE-2007-3656, CVE-2007-3734, CVE-2007-3735, CVE-2007-3736, CVE-2007-3737, CVE-2007-3738

rPSA-2007-0148-1 firefox thunderbird

2007-07-20 Thread rPath Update Announcements
rPath Security Advisory: 2007-0148-1 Published: 2007-07-20 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: firefox=/[EMAIL PROTECTED]:devel//1/1.5.0.12-0.2-1 thunderbird=/[EMAIL

rare bug in Opera 9.20 browser

2007-07-20 Thread jplopezy
In this opportunity I go to you with the purpose of communicating a strange fault to them that finds in operates. It consists of creating a document in HTML and in beating a chain of characters $/“(dollar, sweeps, comile) in hexadecimal serian (24 2F 22) this promouth that when trying to see

rPSA-2007-0147-1 tcpdump

2007-07-20 Thread rPath Update Announcements
rPath Security Advisory: 2007-0147-1 Published: 2007-07-20 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect System User Deterministic Unauthorized Access Updated Versions: tcpdump=/[EMAIL PROTECTED]:devel//1/3.9.5-2.1-1 References:

Re: Internet Explorer 0day exploit

2007-07-20 Thread Chris Stromblad
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Zow Terry Brugger wrote: ideal world. Many of the advisories I look at almost always cover the same type of vulnerability. Shouldn't we have learned by now, if we consider your argument? It's been a while, but one of the great things I've seen

Re: LFI On SMF 1.1.3

2007-07-20 Thread Cornelius Riemenschneider
[EMAIL PROTECTED] schrieb: Let me preface this by saying I'm not a security expert, however considering that the above line is immediately preceeded by: if (!isset($_REQUEST['action']) || !isset($actionArray[$_REQUEST['action']])) ...with a default action defined by either the theme or the

Re: Internet Explorer 0day exploit

2007-07-20 Thread Chris Stromblad
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, Bigby Findrake wrote: On Wed, 18 Jul 2007, Chris Stromblad wrote: deletia One more thing about advisories. I think it would be better to release them immediately and let people know what they are facing. With public dissemination of a

FLEA-2007-0032-1: flashplayer

2007-07-20 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2007-0032-1 Published: 2007-07-20 Rating: Major Updated Versions: flashplayer=/[EMAIL PROTECTED]:1/9.0.48.0-2-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.3.2-0.5-2 References:

UseBB 1.0.x Cross Site Scripting (XSS)

2007-07-20 Thread s4mi
# # Script...: UseBB version: 1.0.7 # # Script Site..: http://www.usebb.net # # Vulnerability: Cross Site Scripting (XSS) # # Acces: Remote

2007-07-20 - n.runs-SA-2007.018 - NOD32 Antivirus ASPACK and FSG parsing Divide by Zero Advisory

2007-07-20 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2007.018 20-Jul-2007 Vendor:

2007-07-20 - n.runs-SA-2007.016 - NOD32 Antivirus CAB parsing Arbitrary Code Execution Advisory

2007-07-20 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2007.016 20-Jul-2007 Vendor:

Re: Internet Explorer 0day exploit

2007-07-20 Thread Chad Perrin
On Wed, Jul 18, 2007 at 10:12:11PM +0200, Chris Stromblad wrote: Zow Terry Brugger wrote: What exactly constitutes a 0day? From my perspective naming a vulnerability 0day have absolutely no value whatsoever, it just doesn't make any sense. 0day for who? The person who release it, sure,

2007-07-20 - n.runs-SA-2007.017 - NOD32 Antivirus ASPACK parsing Infinite Loop Advisory

2007-07-20 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2007.017 20-Jul-2007 Vendor:

SYMSA-2007-006: Citrix EPA ActiveX Control Design Flaw

2007-07-20 Thread research
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Symantec Vulnerability Research http://www.symantec.com/research Security Advisory Advisory ID: SYMSA-2007-006 Advisory Title: Citrix EPA ActiveX Control Design Flaw