MITKRB5-SA-2015-001 Vulnerabilities in kadmind, libgssrpc, gss_process_context_token

2015-02-03 Thread Greg Hudson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 MITKRB5-SA-2015-001 MIT krb5 Security Advisory 2015-001 Original release: 2015-02-03 Last update: 2015-02-03 Topic: Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092 CVE-2014-5352: gss_process_context_token() incorrectly fre

RE: Windows Vista Power Management & Local Security Policy

2008-07-28 Thread Greg
-Original Message- From: Abe Getchell [mailto:[EMAIL PROTECTED] Sent: Friday, 18 July 2008 12:39 PM To: bugtraq@securityfocus.com Subject: Windows Vista Power Management & Local Security Policy > When the security option "Shutdown: Allow system to be shutdown without having to log on" (

RE: Yet another SQL injection framework

2007-04-23 Thread Greg Merideth
The script simply hides or shows the link on the page which points to sf. http://sourceforge.net/projects/injection-fwk/ -Original Message- From: Nick Boyce [mailto:[EMAIL PROTECTED] Sent: Friday, April 20, 2007 9:13 AM To: bugtraq@securityfocus.com Cc: Guillermo Marro Subject: Re: Yet a

MS07-012 Not Fixed

2007-03-16 Thread Greg Sinclair
*The MS07-012 patch that came out on Black Tuesday in Feb 2007 is not a complete solution to the problem.* Title: MFC42u.dll Off-by-Two Overflow Date: 15 March 2007 Affected: Windows 2000, XP, 2003 (those that were affected by the MS07-012 patch) Reported by: Greg Sinclair (gssincla

RE: Internet Explorer vulnerbility

2006-06-12 Thread Greg Merideth (Forward Technology)
IE7 Beta 2 build [7.0.5346.5] parses without crashing. Greg Merideth Forward Technology, LLC. CTO & Other Wild Stuff [EMAIL PROTECTED] PGP Fingerprint 18C3CE191171736225D62C3829F7B18A00F2AC0C -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Thursday, Jun

Re: SYMSA-2006-003: Cisco Secure ACS for Windows - AdministratorPassword Disclosure

2006-05-10 Thread Greg owens
Does this include the ACS appliance engine. Greg Owens, CCNP CCSP CISSP Email:[EMAIL PROTECTED] -- Sent from my Samsung I730 Wireless Handheld -Original Message- >From: "Matthew Cerha"<[EMAIL PROTECTED]> >Sent: 5/8/06 6:15:

Re: security contact @lycos.com

2006-02-09 Thread Greg Rubin
got a the technical contact's address: [EMAIL PROTECTED] Hope those help. Greg R. sheeponhigh wrote: >hi, there > you could try this feedback form. >http://help.lycos.com/search/search_form.asp > > >2006/2/2, Spiros Antonatos <[EMAIL PROTECTED]>: > >>Anyone knows

RE: Did MS pull an Ilfak? (MS patch bindiff results)

2006-01-11 Thread Greg Wroblewski
The only attack vector we know about for Win9x, ME platforms is through printing. I'm afraid that "fixing" that would break some functionality. Greg This post is provided as is and confers no rights or whatever. -Original Message- From: Joe Polk [mailto:[

Re: Netscape 6/7 crashes by a simple stylesheet...

2003-02-27 Thread Greg Steuck
Yes, it had been known for a while. Searching for "style overflow scroll" in bugzilla brings up a list of bug reports. So, instead of posting to bugtraq you could have added a note to one of those bug reports. Then again, posting here might put some pressure on mozilla developers, who knows?

Re: Master Servers: yet another DDoS...

2003-02-21 Thread Greg Steuck
ters (number of IP addresses kept, keep-alive period) this mitigation technique may become more resource intensive for the operator than switching to TCP. Bye Greg

Gabber 0.8.7 leaks presence information without user authorization

2003-01-21 Thread Greg Troxel
Gabber 0.8.7 leaks presence information without user authorization Greg Troxel <[EMAIL PROTECTED]> DESCRIPTION Gabber 0.8.7 sends a presence message to the Jabber ID [EMAIL PROTECTED] at login and logout time. This is a privacy violation: that a user even exists

Efficient Networks 5861 DSL Router

2003-01-10 Thread Greg Bolshaw
Product:Efficient Networks 5861 DSL Router http://www.efficient.com/ebz/5800.html Tested version: 5.3.80 (Latest firmware) Advisory date: 10/01/2003 Severity: Moderate Background "Efficient Networks® Business Class IDSL, ADSL, or SDSL Routers

RE: White paper: Exploiting the Win32 API.

2002-08-28 Thread Rothe, Greg (G.A.)
r to do? We have here an exclusive or: Which is it - 1 or 2 or neither? Thanks, -Greg === Ford CIRT [EMAIL PROTECTED] === -Original Message- From: Paul Starzetz [mailto:[EMAIL PROTECTED]] Sent: Monday, August 26, 2002 10:47 AM To: Andrey Kolishak; [EMAIL PROT

Re: The Large-Scale Threat of Bad Data in DNS

2002-08-13 Thread Greg Steuck
o your DNS queries. It wouldn't take much to enhance your DNS cache (recursive resolver) software with ACLs that dictate which answers you expect to come from which source addresses. Megainfrastructure encompassing the whole world is not required for that. Bye Greg

Re: It takes two to tango

2002-07-31 Thread Greg A. Woods
can be done there needs to be some kind of law put in > place to protect the researchers who find the holes. IANAL, but I would hope no new laws are necessary -- the recognition of fair notice should be sufficient. -- Greg A. Wood

Apache Chunked Vulnerability on Many Dell Servers running NT?

2002-06-26 Thread greg
) do not run Apache. Greg Just thought I'd bring that up.

Redux: NIDS, fragrouter, and off-topic sanity [WAS: Snort exploit]

2002-04-22 Thread Greg Shipley
se NIDS evasion techniques would be synonymous to me posting a discovery that I can tunnel non-compliant app traffic through my stateful packet filtering firewall with ease. Most veteran security practitioners would probably respond with "No duh, Greg, use a proxy-based firewall if you are conce

Re: ansi outer join syntax in Oracle allows access to any data

2002-04-17 Thread Greg Williamson
NLSRTL Version 3.4.0.0.0 - Production SQL> Not sure if ANSI syntax is required (not testable in 8.1.6) and I don't have a 9i DB to test it on. Greg. > - Begin Forwarded Message - > The point is that I can see the dba_users view owned by SYS as a user > w

RE: hacker copyrights was [RE: telnetd exploit code]

2001-07-26 Thread Greg A. Woods
m/virus self- propagation the author must implictly relinquish his or her right to control redistribution, at least free redistribution, since nobody can prove one way or another how some second analyst might have obtained a copy of the code when all initial distribution is anonymous (and free). --

Re: hacker copyrights was [RE: telnetd exploit code]

2001-07-26 Thread Greg A. Woods
irectly or indirectly authorised agents) to analyze it and to publish the results of that analysis. -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Re: FIN_WAIT_1 DoS (netkill): Why the vulnerability still exists?

2001-07-25 Thread Greg A. Woods
I guess it is possible for the attacker(s) to work around this first-level defense though and ACK one or two data packets first, but will they? :-) -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> <[EMAIL P

Re: pam session

2001-06-24 Thread Greg Woods
to get around this. sshd is also the only application that has this problem. telnet and rlogin do not. --Greg

RE: SECURITY.NNOV: Netscape 4.7x Messanger user information retrival

2001-06-10 Thread Greg A. Woods
e actually doing then you may not have hidden it properly at all. -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Re: Mail delivery privileges (was: Solaris /usr/bin/mailx exploit)

2001-05-19 Thread Greg A. Woods
iously there are many problems with this trick, but it does avoid the need to make the LDA run as root. ;-) -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Re: Mail delivery privileges (was: Solaris /usr/bin/mailx exploit)

2001-05-18 Thread Greg A. Woods
t, but it can be done. Of course a mail storage system such as Cyrus IMAP can facilitate this much more readily, though it doesn't have to since it now has built-in, user-controllable, presumably secure, filtering. -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Re: Solaris /usr/bin/mailx exploit (SPARC)

2001-05-18 Thread Greg A. Woods
d on any mail reader program. (There never was in the first place, in so far as Solaris is concerned.) Please don't make excuses for a broken system. Please fix it! Please do your best to avoid potential new problems too, and don't just paper over them -- learn from history! -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Immunix OS Security update for minicom

2001-05-17 Thread Greg KH
:IMNX-2001-70-020-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: zenith parsec found numerous format string bugs in the version of minicom that is included in all versions of Immunix OS

Re: Solaris /usr/bin/mailx exploit (SPARC)

2001-05-17 Thread Greg A. Woods
In my estimation the risk resulting from a successfull group-ID "mail" compromise is still almost infinitely less than the risk of a root compromise, regardless of what the system involved is used for! -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Re: Solaris /usr/bin/mailx exploit (SPARC)

2001-05-16 Thread Greg A. Woods
he mail delivery agent and you can put your mailbox directory on a separate filesystem such that you don't have to use FS quotas there. BSD's setuid-root mail subsystem is stupidly insecure, but many of us do live with its risks every day..... :-( --

Re: Solaris /usr/bin/mailx exploit (SPARC)

2001-05-15 Thread Greg A. Woods
far back as SysIII (i.e. 1980) there's clear evidence that the entire AT&T UNIX mail system was leaning far away from using root privileges and would work entirely with just setgid. -- Greg A. Woods +1 416 218-0098 VE3TCP &l

Immunix OS Security update for samba

2001-05-10 Thread Greg KH
:IMNX-2001-70-019-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: A temp file race has been found in the all release of samba prior to 2.0.9. This could allow any local malicious user

Immunix OS Security update for gnupg

2001-04-30 Thread Greg KH
:IMNX-2001-70-018-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: A new version of GnuPG, 1.0.5, has been released that fixes a number of bugs and security problems, including a

Immunix OS Security update for gftp

2001-04-27 Thread Greg KH
:IMNX-2001-70-017-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: Richard Johnson has found a format string problem in the version of gftp that ships with Immunix 6.2 and 7.0 (fo

Re: Immunix OS Security update for netscape

2001-04-20 Thread Greg KH
On Fri, Apr 20, 2001 at 12:40:11PM +0300, Atro Tossavainen wrote: > Hello Greg, > > > Precompiled binary packages for Immunix 6.2 are available at: > > >http://immunix.org/ImmunixOS/6.2/updates/RPMS/netscape-common-4.77-0.6.2_StackGuard.i386.rpm > > and so

Immunix OS Security update for netscape

2001-04-16 Thread Greg KH
:IMNX-2001-70-014-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: Florian Wesch has found that Netscape versions prior to 4.77 are vulnerable to a buffer overflow bug in the way Ne

Immunix OS Security update for pine

2001-04-16 Thread Greg KH
:IMNX-2001-70-015-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: Versions of pine that shipped with Immunix 6.2, 7.0-beta, and 7.0 are vulnerable to temp file races which could

Immunix OS Security update for ntp and xntp3

2001-04-06 Thread Greg KH
:IMNX-2001-70-013-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: Przemyslaw Frasunek has found a buffer overflow in the ntpd package (see http://www.securityfocus.com/arc

Immunix OS Security update for kerberos

2001-03-29 Thread Greg KH
:IMNX-2001-70-012-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: RedHat has released updated kerberos packages that fixes a number of logical and temp file problems (see

Immunix OS Security update for vim

2001-03-29 Thread Greg KH
:IMNX-2001-70-011-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: An attacker could embed malicious VIM control codes into a file, and as soon as any user opened that file in vim-enhan

Immunix OS Security update for kernel

2001-03-27 Thread Greg KH
:IMNX-2001-70-010-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: The 2.2.19 kernel release fixes numerous security problems including the ptrace/execve race condition bug that was re

Immunix OS Security update for openssh

2001-03-26 Thread Greg KH
:IMNX-2001-70-009-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: Solar Designer has posted an excellent analysis of problems in current versions of numerous SSH protocol implement

Immunix OS Security update for slrn

2001-03-15 Thread Greg KH
:IMNX-2001-70-007-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: A buffer overflow in the slrn news reader has been reported by Bill Nottingham. This buffer is created on the heap, so

Immunix OS Security update for mutt

2001-03-15 Thread Greg KH
:IMNX-2001-70-006-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: The version of mutt shipped in Immunix 6.2 has a format string vulnerability. The version of mutt shipped in all I

Immunix OS Security update for sgml-tools

2001-03-15 Thread Greg KH
:IMNX-2001-70-008-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: Previous versions of the sgml-tools package would create temporary files without any special permissions in th

Immunix OS Security update for joe

2001-03-06 Thread Greg KH
-2001-70-005-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: The version of joe shipped in Immunix OS 6.2 and 7.0-beta looks for a configuration file in the current working directory, the

Immunix OS Security update for sudo

2001-02-27 Thread Greg KH
:IMNX-2001-70-004-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: The version of sudo shipped in Immunix OS 7.0-beta and 7.0 contains a buffer overflow of a variable that is on the heap

Immunix OS 6.2 Security updates for php, dump, and lpr

2001-02-26 Thread Greg KH
-2001-62-002-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: WireX was recently notified that three packages had not been updated for which there had been security updates for in the pas

Immunix OS Security update for vixie-cron

2001-02-20 Thread Greg KH
:IMNX-2001-70-003-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: RedHat has released an updated version of the vixie-cron packages which fixes a number of buffer overflows that

Re: Linux kernel sysctl() vulnerability

2001-02-10 Thread Greg KH
On Sat, Feb 10, 2001 at 10:28:01AM +0100, Florian Weimer wrote: > > The following trivial patch should fix this issue. Here's the patch that Alan accepted and put into 2.2.18-pre9 to fix this problem. greg k-h -- greg@(kroah|wirex).com http://immunix.org/~greg diff -Naur -X /home

Re: Immunix OS Security update for kernel

2001-02-09 Thread Greg KH
On Thu, Feb 08, 2001 at 02:52:45PM -0800, Greg KH wrote: > Chris Evans has discovered a security problem in the kernel select() This should have read "sysctl()". Sorry for any confusion. greg k-h -- greg@(kroah|wirex).com http://immunix.org/~greg PGP signature

Immunix OS Security update for kernel

2001-02-08 Thread Greg KH
:IMNX-2001-70-002-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: Chris Evans has discovered a security problem in the kernel select() call that can lead to information leakage in the

[ISC-Bugs #811] (bind9) yes, it seems NMAP can trivially crash BIND-9.1.0, at least on i386.... (forwarded)

2001-02-08 Thread Greg A. Woods
e { - - INSIST(dev->newsocket->address.type.sa.sa_family == sock->pf); - - dev->newsocket->address.length = addrlen; - - dev->newsocket->pf = sock->pf; } + + dev->newsocket->address.length = addrlen; + dev->newsocket-&

NMAP trivially crashes NET-SNMP-4.1.2's snmpd when smux support is enabled

2001-02-06 Thread Greg A. Woods
t=i386--netbsd --prefix=/usr/pkg --x-libraries=/usr/X11R6/lib --x-includes=/usr/X11R6/include OBJECT_FMT= ELF LICENSE= RESTRICTED= NO_SRC_ON_FTP= NO_SRC_ON_CDROM= NO_BIN_ON_FTP= NO_BIN_ON_CDROM= CC= cc-egcs-1.1.2 _PKGTOOLS_VER=2829 -- Greg A

yes, it seems NMAP can trivially crash BIND-9.1.0, at least on i386....

2001-02-06 Thread Greg A. Woods
down, but I suspect others are doing / have done that. -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Immunix 6.2 OS Security update for glibc (revised)

2001-02-02 Thread Greg KH
-001-01 Replaces Advisory ID: IMNX-2000-62-044-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- **UPDATED PACKAGES** Description: The glibc packages that WireX released for Immunix 6.2 on January 19,

Immunix OS Security update for bind

2001-01-30 Thread Greg KH
:IMNX-2001-70-001-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: The people at COVERT Labs have discovered a number of security problems with all previous versions of Bind (see

Immunix 6.2 OS Security update for glibc

2001-01-22 Thread Greg KH
-043-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: There is a bug in the current version of the GNU C Library (glibc) that is shipped with Immunix Linux 6.2. This bug can allow unpriv

Immunix OS Security update for glibc

2001-01-19 Thread Greg KH
-70-029-01 Author: Greg Kroah-Hartman <[EMAIL PROTECTED]> --- Description: There is a bug in the current version of the GNU C Library (glibc) that is shipped with Immunix Linux 7.0-beta. This bug can

Re: Immunix OS Security update for lots of temp file problems

2001-01-10 Thread Greg KH
Third time's the charm, right? On Wed, Jan 10, 2001 at 02:04:42PM -0800, Greg KH wrote: > - there is no function called tempname(), I should have said > tmpname(). It's either tmpnam() or tempnam(). I'll get this right someday :) greg k-h -- greg@(

Re: Immunix OS Security update for lots of temp file problems

2001-01-10 Thread Greg KH
Ok, three nice typos that I missed: - all of the dates should say 2001, not 2000. - it's 'affected' not 'effected' - there is no function called tempname(), I should have said tmpname(). Sorry about that, greg k-h -- greg@(kroah|wire

Re: Immunix OS Security update for lots of temp file problems

2001-01-10 Thread Greg KH
a version with the mkstemp patch. We prefer to have multiple levels of security (like our patch to inn shows.) Hope this helps clear up things with regards to this package update. greg k-h -- greg@(kroah|wirex).com http://immunix.org/~greg

Immunix OS Security update for lots of temp file problems

2001-01-10 Thread Greg KH
--- Immunix OS Security Advisory Summary Date: January 10, 2000 Advisory ID:IMNX-2000-70-028-01 Author: Greg Kroah-Hartman <[EMAIL PROTEC

Re: Future of s/key (Re: S/Key & OPIE Database Vulnerability)

2000-02-01 Thread Greg A. Woods
citly) to be installed from source. There are probably a couple of papers here for anyone with the time to do some deeper research and write them up! :-) -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> Planix,

Re: Future of s/key (Re: S/Key & OPIE Database Vulnerability)

2000-01-31 Thread Greg A. Woods
e accounted for is of course critical with any "one-time password" scheme. Unfortunately people will still use shared accounts (eg. root!) making such auditing very difficult and almost never done. I personally will never use s/key again. --

Re: Wmmon under FreeBSD

1999-12-29 Thread Greg A. Woods
ut hopefully generic, user-level interface tool. -- Greg A. Woods +1 416 218-0098 VE3TCP <[EMAIL PROTECTED]> Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Re: AW: Mac OS 9 Idle Lock Bug

1999-11-01 Thread Greg Francis
he process and forget cleanly > exiting the application. Perhaps sending the 'quit' event first and then killing those that don't quit in a certain period of time. Greg Greg FrancisGonzaga University Unix System Administrator Spokane Washington [EMAIL PROTECTED] 509-323-6896