Re: [Full-disclosure] some solutions for HITB 2006 CTF

2007-01-10 Thread matador matador
I posted an update. I'm going crazy on daemon01 and daemon02...if someone wanna help me is welcome. 2006/10/16, matador matador [EMAIL PROTECTED]: hi i did some solutions for HITB 2006 CTF daemons. at this website: http://matador.altervista.org

[Full-disclosure] Cisco Security Advisory: Cisco Unified Contact Center and IP Contact Center JTapi Gateway Vulnerability

2007-01-10 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco Unified Contact Center and IP Contact Center JTapi Gateway Vulnerability Advisory ID: cisco-sa-20070110-jtapi http://www.cisco.com/warp/public/707/cisco-sa-20070110-jtapi.shtml Revision 1.0 For Public Release 2007

[Full-disclosure] Cisco Security Advisory: DLSw Vulnerability

2007-01-10 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: DLSw Vulnerability Advisory ID: cisco-sa-20070110-dlsw http://www.cisco.com/warp/public/707/cisco-sa-20070110-dlsw.shtml Revision 1.0 For Public Release 2007 January 10 1600 UTC (GMT

[Full-disclosure] [ MDKSA-2007:006 ] - Updated OpenOffice.org packages fix WMF vulnerability

2007-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:006 http://www.mandriva.com/security/

Re: [Full-disclosure] CA BrightStor ARCserve Backup Tape Engine Exploit Security Notice

2007-01-10 Thread TheGesus
On 1/9/07, Williams, James K [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CA BrightStor ARCserve Backup Tape Engine Exploit Security Notice CA is aware that exploit code for a vulnerability in the Tape Engine component of CA BrightStor ARCserve Backup was posted

[Full-disclosure] EIQ Networks Network Security Analyzer DoS Vulnerability

2007-01-10 Thread Ethan Hunt
Title: --- EIQ Networks Network Security Analyzer DoS Vulnerability Vendor Notified: --- Now? Background Info: --- EIQ Networks Product Site: http://www.eiqnetworks.com/products/NetworkSecurityAnalyzer.shtml Description: ---

[Full-disclosure] DMA[2007-0107a] OmniWeb Javascript Alert Format String Vulnerabiity and DMA[2007-0109a] Apple Finder Disk Image Volume Label Overflow / DoS

2007-01-10 Thread K F (lists)
I've been subject to a few DoS attacks as of late so these did not quite make it out. Enjoy the typos as usual. =P -KF DMA[2007-0109a] - 'Apple Finder Disk Image Volume Label Overflow / DoS' Author: Kevin Finisterre Vendor(s): http://www.apple.com Product: '= OSX 10.4 (?)' References:

[Full-disclosure] [ MDKSA-2007:007 ] - Updated nvidia driver packages fix vulnerability

2007-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:007 http://www.mandriva.com/security/

[Full-disclosure] new class of printf issue: int overflow

2007-01-10 Thread Felix von Leitner
This is about two issues. First: abs within vasprintf. I just read some gnupg source code and stumbled upon their vasprintf implementation. Basically they make one pass over the format string to find out how much memory to malloc, and then they call sprintf on the malloced buffer. Here is an

[Full-disclosure] [ MDKSA-2007:008 ] - Updated kerberos packages fix vulnerability

2007-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:008 http://www.mandriva.com/security/

[Full-disclosure] [ MDKSA-2007:009 ] - Updated kdenetwork packages fix ksirc vulnerability

2007-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:009 http://www.mandriva.com/security/

[Full-disclosure] iDefense Q-1 2007 Challenge

2007-01-10 Thread contributor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Also available at: http://labs.idefense.com/vcp/challenge.php#more_q1+2007%3A+vulnerability+challenge *Challenge Focus: Remote Arbitrary Code Execution Vulnerabilities in Vista IE 7.0* Both Microsoft Internet Explorer and Microsoft Windows

[Full-disclosure] [ GLSA 200701-04 ] SeaMonkey: Multiple vulnerabilities

2007-01-10 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [Full-disclosure] [Dailydave] Adobe Reader Remote Heap Memory Corruption - SubroutinePointer Overwrite

2007-01-10 Thread Dave Korn
On 10 January 2007 05:06, Piotr Bania wrote: Orginal url: http://www.piotrbania.com/all/adv/adobe-acrobat-adv.txt I do like the custom 403's your site serves up when I try ascending that one directory component at a time! :-D cheers, DaveK -- Can't think of a witty .sigline