[security bulletin] HPSBUX02351 SSRT080058 rev.2 - HP-UX Running BIND, Remote DNS Cache Poisoning

2008-07-19 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01506861 Version: 2 HPSBUX02351 SSRT080058 rev.2 - HP-UX Running BIND, Remote DNS Cache Poisoning NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

rPSA-2008-0231-1 bind bind-utils

2008-07-19 Thread rPath Update Announcements
rPath Security Advisory: 2008-0231-1 Published: 2008-07-19 Products: rPath Linux 2 Rating: Major Exposure Level Classification: Remote System User Deterministic Weakness Updated Versions: [EMAIL PROTECTED]:2/9.4.2_P1-2-0.1 [EMAIL PROTECTED]:2/9.4.2_P1-2-0.1 rPath Issue Tracking

Oracle Database Local Untrusted Library Path Vulnerability

2008-07-19 Thread Joxean Koret
Oracle Database Local Untrusted Library Path Vulnerability -- The Oracle July 2008 Critical Patch Update fixes a vulnerability which allows a user in the OINSTALL/DBA group to scalate privileges to root. Scalating Privileges from oracle to

RE: Lateral SQL Injection Revisited - No Special Privs Required

2008-07-19 Thread David Litchfield
Hi Alexandr, Not only sysdate function can be used in procedure without input parametres. For example using dbms_random.value in procedure without input parameters, we also can inject sql code. SQL ALTER SESSION SET NLS_NUMERIC_CHARACTERS = '''.' ; Thanks for pointing out

RE: Windows Vista Power Management Local Security Policy

2008-07-19 Thread Jim Harrison
Abe, Other than a denial-of-service from the console (is the power switch now a security vuln, too?), what can you do with this bug? It's absolutely, unquestionably a bug; the user should see behavior as dictated by logic and described in the documentation, but a security vulnerability? I