[Full-disclosure] Use of function "log" in Perl module Net::Server can lead to format string vulnerability if syslog is used

2005-04-14 Thread Dr. Peter Bieringer
Hi, Module: Net::Server Affected version: 0.87 and probably below Latest available version: 0.87 from 14. Feb 2004 URL: during investigating a remote DoS against postgrey <= 1.18 (1.21 is already available now!) it was found with help of David Schwe

[Full-disclosure] Multiple vulnerabilities in Yager 5.24

2005-04-14 Thread Luigi Auriemma
### Luigi Auriemma Application: Yager http://www.yager-game.de Versions: <= 5.24 Platforms:Windows Bugs: A] nickname buffer-overflow B] data block buffer-

[Full-disclosure] Internet Explorer wininet.dll URL parsing memory corruption technical details

2005-04-14 Thread 3APA3A
Vendor: Microsoft Software: Internet Explorer 6.0, 5.5, 5.01 Problem:Memory corruption, code execution Remote: Yes Risk Level: Medium to low (hard to exploit) Authors:Axle (ICQ 755756) bug discovery 3APA3A, http://www.security.nnov.ru/ bu

Re: [Full-disclosure] #HACKPHREAK ADVISORY | BBQ CHICKEN WTF!

2005-04-14 Thread vulcanius
No, but you just reaffirmed my point. Too many dumbass, immature kids. I post quite frequently on others. FD has a good community but there are a few too many rotten eggs. On 4/13/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > > This reminds me of why I tend to stay away from FD. > > which is

[Full-disclosure] MyWebEx PC - anyone had a go?

2005-04-14 Thread Danny
Has anyone had a go - from a security point of view - with MyWebEx PC from WebEx? ActiveX component, I believe, with encrypted communication between client and server. As long as there is a strong password, it appears as though it's pretty secure relative to most remote access systems? ...D ___

[Full-disclosure] Re: Microsoft April Security Bulletin Webcast BS

2005-04-14 Thread Dave Korn
"Dave Aitel" wrote in message news:[EMAIL PROTECTED] > Hahah. Well, we released an exploit for mqsvc a few minutes after the > advisories came out. . . > Is it passing an overly-long search string to MQLocateBegin? It would be amusing if that one had regressed! cheers, DaveK -- Can

[Full-disclosure] [USN-112-1] PHP4 vulnerabilities

2005-04-14 Thread Martin Pitt
=== Ubuntu Security Notice USN-112-1 April 14, 2005 php4 vulnerabilities CAN-2005-1042, CAN-2005-1043 === A security issue affects the following Ubuntu releases: Ubuntu 4.10

[Full-disclosure] [USN-111-1] Squid vulnerability

2005-04-14 Thread Martin Pitt
=== Ubuntu Security Notice USN-111-1 April 14, 2005 squid vulnerability CAN-2005-0718 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog)

[Full-disclosure] MDKSA-2005:071 - Updated gaim packages fix multiple vulnerabilities

2005-04-14 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: gaim Advisory ID:

Re: [Full-disclosure] iDEFENSE Security Advisory 04.12.05: Microsoft Windows CSRSS.EXE Stack Overflow Vulnerability

2005-04-14 Thread monu
Hello, Beside the buffer overflow vulnerability, a DoS vulnerability is motioned as a result of a CONSOLE_STATE_INFO struct containing all zero's (divide-by-zero). Is this vulnerability also fixed MS05-018? MS05-018 doesn't say a word about it. Thanks in advance, -Monu [This mail has been sen