[Full-Disclosure] SuSE Security Announcement: susehelp (SuSE-SA:2003:005)

2003-01-20 Thread Sebastian Krahmer
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package:susehelp Announcement-ID:SuSE-SA:2003:005 Date: Mon Jan

FW: [Full-Disclosure] Navian Call Home

2003-01-20 Thread Richard M. Smith
A small amount of light on the Naviant issue: -Original Message- From: Shapiro, Bret [mailto:[EMAIL PROTECTED]] Sent: Monday, January 20, 2003 10:14 AM To: Richard M. Smith Cc: Dubner, Derek Subject: RE: [Full-Disclosure] Navian Call Home This is part of the registration program that

[Full-Disclosure] [SECURITY] [DSA 232-1] New CUPS packages fix several vulnerabilities

2003-01-20 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 232-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze January 20th, 2003

[Full-Disclosure] [RHSA-2003:012-07] Updated CVS packages available

2003-01-20 Thread bugzilla
- Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated CVS packages available Advisory ID: RHSA-2003:012-07 Issue date:2003-01-20 Updated on:2003-01-20 Product: Red

[Full-Disclosure] format strings on HP-UX

2003-01-20 Thread bt
I don't know if this question is applicable to this list, however : Are they exploitable? I was looking for a format strings exploit on HP-UX,but couldn't find any. Maybe because they are not exploitable???If they are,I would appreaciate very much if anyone could provide some information about

Re: [Full-Disclosure] format strings on HP-UX

2003-01-20 Thread KF
I am going to say yes they are exploitable I have not 100% finished my exploit for SITE EXEC on HPUX ftpd but I have definately been able to redirect the flow of execution. So far nothing special has been required except to remember you are on BigEndian hardware... -KF [EMAIL PROTECTED]

Re: [Full-Disclosure] format strings on HP-UX

2003-01-20 Thread Bruce Ediger
On Mon, 20 Jan 2003 [EMAIL PROTECTED] wrote: Are they exploitable? I was looking for a format strings exploit on HP-UX,but couldn't find any. Maybe because they are not exploitable???If they are,I would appreaciate very much if anyone could provide some information about that. I think

[Full-Disclosure] CVS REMOTE VULNERABILITY + STEFAN ESSER

2003-01-20 Thread Jack Ahz
__ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] MDKSA-2003:008 - Updated libpng packages fix potential remote compromise

2003-01-20 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: libpng Advisory ID:

[Full-Disclosure] CVS REMOTE VULNERABILITY + STEFAN ESSER : UNSCRUPULOUS

2003-01-20 Thread Jack Ahz
It comes to our attention that certain 'security professionals' abuse their knowledge of certain vulnerabilities or software - whether through the auditing of proprietary source trees that ISS does, or by faking GDB output But perhaps the greatest abuse is generated by the most unethical

[Full-Disclosure] Drive-by download from a spam email message

2003-01-20 Thread Richard M. Smith
Hi, I just tried to opt-out from a spam email message from some sort Internet keyword system. When I went to the opt-out page for the mailing list, I got hit with a drive-by download that asked me to install an ActiveX control called the Internet Marketing Agency. There isn't a clue on the

Re: [Full-Disclosure] Drive-by download from a spam email message

2003-01-20 Thread Stephen Menard
Don't let the net byte you ! why are you opting out of spam? is there some secret formula or just asking for trouble. is this just a newbie troll :-) You've gotta -TRUST- microsoft and all their software. Special install routines... Don't you update by windowsupdate website ? Did you realize

[Full-Disclosure] Security Update: [CSSA-2003-004.0] Linux: Multiple Security Vulnerabilities in the Common Unix Printing System (CUPS)

2003-01-20 Thread security
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] __ SCO Security Advisory Subject:Linux: Multiple Security Vulnerabilities in the Common Unix Printing