[Full-disclosure] [ MDVSA-2009:299 ] xine-lib

2009-11-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:299 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2009:297 ] ffmpeg

2009-11-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:297 http://www.mandriva.com/security/

Re: [Full-disclosure] OS Commerce authentication bypass (ANONYMOUS REMOTE CODE EXECUTION)

2009-11-13 Thread Tim
Stu, > The file manager seems to be implicated in many attacks on the forums > (maybe this is the bit that permits the uploading, and subsequent > execution, of PHP code), however it is NOT required for a successful > authentication bypass, for example the email functionality can be > remotel

[Full-disclosure] [ MDVSA-2009:298 ] xine-lib

2009-11-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:298 http://www.mandriva.com/security/

Re: [Full-disclosure] OS Commerce authentication bypass (ANONYMOUS REMOTE CODE EXECUTION)

2009-11-13 Thread lsi
> See also: http://www.milw0rm.com/exploits/9556 > For those who can't read past three lines: This results in ANONYMOUS > REMOTE CODE EXECUTION due to the availability of the file manager > script. The file manager seems to be implicated in many attacks on the forums (maybe this is the bit that

[Full-disclosure] [USN-859-1] OpenJDK vulnerabilities

2009-11-13 Thread Kees Cook
=== Ubuntu Security Notice USN-859-1 November 13, 2009 openjdk-6 vulnerabilities CVE-2009-2409, CVE-2009-3728, CVE-2009-3869, CVE-2009-3871, CVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877, CVE-2009-3879, CVE

Re: [Full-disclosure] OS Commerce authentication bypass (ANONYMOUS REMOTE CODE EXECUTION)

2009-11-13 Thread Tim
I can confirm this vulnerability, having done research on it recently. See also: http://www.milw0rm.com/exploits/9556 For those who can't read past three lines: This results in ANONYMOUS REMOTE CODE EXECUTION due to the availability of the file manager script. > Patch: no official patches know

[Full-disclosure] OS Commerce authentication bypass

2009-11-13 Thread lsi
OS Commerce authentication bypass Description: Accessing administration pages should give a login screen to unauthenticated users, however instead, data is displayed, and administrative commands can be executed. Apparently any page in the admin directory can be accessed in this way (including

[Full-disclosure] [ MDVSA-2009:296 ] gimp

2009-11-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:296 http://www.mandriva.com/security/

Re: [Full-disclosure] Full-Disclosure Digest, Vol 57, Issue 17

2009-11-13 Thread RandallM
> > > -- > > Message: 5 > Date: Thu, 12 Nov 2009 14:09:12 + > From: Leandro Malaquias > Subject: [Full-disclosure] Microsoft Patents the "sudo" command > To: full-disclosure@lists.grok.org.uk > Message-ID: <4afc1708.7040...@gmail.com> > Content-Type: text/plain; cha

[Full-disclosure] MS09-053

2009-11-13 Thread Tomoki Sanaki
Hello, my name is Tomoki Sanaki. I remade based http://www.milw0rm.com/exploits/9559. #!/usr/local/bin/perl # remake based http://www.milw0rm.com/exploits/9559 # this exploited Win2k/JP SP0 # this exploited Win2k/JP SP1

[Full-disclosure] PHP 5.2.11/5.3.0 Multiple Vulnerabilities

2009-11-13 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ PHP 5.2.11/5.3.0 Multiple Vulnerabilities ] Author: Maksymilian Arciemowicz http://SecurityReason.com Date: - - Dis.: 01.10.2009 - - Pub.: 13.11.2009 Risk: Medium Affected Software: - - PHP 5.3.0 - - PHP 5.2.11 Original URL: http://securityreason

Re: [Full-disclosure] Microsoft Patents the "sudo" command

2009-11-13 Thread Larry Seltzer
> http://www.h-online.com/security/news/item/New-Microsoft-patent-may-put- Linux-security-components-at-risk-857848.html >From the article: > This behaviour is very similar to that of PolicyKit, with the only > apparent difference being that PolicyKit requires applications to > request privileg

Re: [Full-disclosure] Microsoft Patents the "sudo" command

2009-11-13 Thread Leandro Malaquias
Todd C. Miller wrote: > In message <7897.1258048...@turing-police.cc.vt.edu> > so spake (Valdis.Kletnieks): > > >> Umm... my check of my 'sudo' manpage says that the '-u username' is >> optional, and I don't remember having to use '-u root', so it's supported >> doing it without having to