Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability

2008-05-12 Thread cxib
It is not apache issue. You recrive 403 status, so charset is set in Header. Charset should not be in meta tags. Issue exist, when apache send response without charset in header AND meta tags. Probably you are using old browser without standard settings. Best Regards, Maksymilian Arciemowic

[security bulletin] HPSBUX02334 SSRT071403 rev.1 - HP-UX Running ftp, Remote Denial of Service (DoS)

2008-05-12 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01446326 Version: 1 HPSBUX02334 SSRT071403 rev.1 - HP-UX Running ftp, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Re: Exploiting Google MX servers as Open SMTP Relays

2008-05-12 Thread Lamont Granquist
I was getting backscatter SPAM from google and enabled SPF rules in my DNS domain along with installing Vbounce in SpamAssassin and it has basically all stopped. SPF specifically addresses the Google bounce issue, since Google implements SPF. When a spammer sends a message to google with a

[SECURITY] [DSA 1574-1] New icedove packages fix several vulnerabilities

2008-05-12 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1574-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff May 12, 2008

Re: Re: Exploiting Google MX servers as Open SMTP Relays

2008-05-12 Thread pablo . ximenes
Hi, We are not talking about backscattering. Our attack uses Google's MX servers like open SMTP relays. Messages are delivered as sent, and not as a delivery failure notification. We are still expecting to hear from Google, but we will be releasing more details about the issue together with

[SECURITY] [DSA 1573-1] New php5 packages fix several vulnerabilities

2008-05-12 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1573-1 [EMAIL PROTECTED] http://www.debian.org/security/ Thijs Kinkhorst May 11, 2008

Confirmed Program for SyScan'08 Hong Kong

2008-05-12 Thread [EMAIL PROTECTED]
dear all the program for SyScan'08 Hong Kong is confirmed. date: May 29th and 30th, 2008 venue: Langham Place Hotel, Hong Kong Program: Attacking Telco Core Network - Philippe Langlois (TSTF) Real World Kernel Pool Exploitation - Kostya Kortchinsky (Immunity) Cyber Crime: Follow the Money - Ped

[ GLSA 200805-10 ] Pngcrush: User-assisted execution of arbitrary code

2008-05-12 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200805-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[SECURITY] [DSA 1572-1] New php5 packages fix several vulnerabilities

2008-05-12 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1572-1 [EMAIL PROTECTED] http://www.debian.org/security/ Thijs Kinkhorst May 11, 2008

Re: Exploiting Google MX servers as Open SMTP Relays

2008-05-12 Thread Bojan Zdrnja
On Sat, May 10, 2008 at 8:04 PM, Todd T. Fries <[EMAIL PROTECTED]> wrote: > Yes this is very frustrating. > > The details are not so hard to guess. Unless this post is different, > anyone can send an email to a nonexistent user at a google service and > they accept it and bounce back to the envelo

Re: Exploiting Google MX servers as Open SMTP Relays

2008-05-12 Thread Clifton Royston
On Sat, May 10, 2008 at 01:04:42PM -0500, Todd T. Fries wrote: > Yes this is very frustrating. > > The details are not so hard to guess. Unless this post is different, > anyone can send an email to a nonexistent user at a google service and > they accept it and bounce back to the envelope recipie

Joomla Component xsstream-dm 0.01 Beta SQL Injection

2008-05-12 Thread houssamix
#!/usr/bin/perl -w # # Joomla Component xsstream-dm 0.01 Beta Remote SQL Injection # # download : http://sstreamtv.com/index.php?option=com_docman&task=doc_details&gid=24 ##

[ MDVSA-2008:100 ] - Updated perl packages fix denial of service vulnerability

2008-05-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:100 http://www.mandriva.com/security/ ___

[SECURITY] [DSA 1573-1] New rdesktop packages fix several vulnerabilities

2008-05-12 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1573-1 [EMAIL PROTECTED] http://www.debian.org/security/ Thijs Kinkhorst May 11, 2008

[ GLSA 200805-09 ] MoinMoin: Privilege escalation

2008-05-12 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200805-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability

2008-05-12 Thread yos20053
Content type is set in Response header but not in the HTML meta tag - for example there is no definition like !!! That is the reason why it is still a vulnerability and was tested hundred times and still works. The solution is to set encoding for the response in when rendering the page, for