NB: this is extracted of [EMAIL PROTECTED]

WWWBoard Arbitrary Message Overwrite Vulnerability
BugTraq ID: 1795
Remote: Yes
Date Published: 1998-09-03
Relevant URL:
http://www.securityfocus.com/bid/1795

Matt Wright's bugs.

GnuPG Multiple Signed Message Modification Vulnerability
BugTraq ID: 1797
Remote: Yes
Date Published: 2000-10-12
Relevant URL:
http://www.securityfocus.com/bid/1797
Summary:

GnuPG is an open-source public/private key encryption system. There is a
serious vulnerability in all versions of GnuPG below version 1.0.3b 
involving verifying the integrity of files with multiple signed messages.
When verifying the integrity of these multiple-message files, GnuPG fails
to verify each signature [ ... ]

Elm 'filter' Arbitrary Mail Disclosure Vulnerability
BugTraq ID: 1802
Remote: No
Date Published: 1995-12-26
Relevant URL:
http://www.securityfocus.com/bid/1802
Summary:

Elm is a popular Unix mail client. A vulnerability exists in Elm's
'filter' utility which can grant an attacker access to any user's mail
spool. By exploiting a race condition which exists in the creation of
temporary files [ ... ]

cURL Remote Buffer Overflow Vulnerability
BugTraq ID: 1804
Remote: Yes
Date Published: 2000-10-13
Relevant URL:
http://www.securityfocus.com/bid/1804
Summary:

Curl is an open-source utility for sending or receiving files using URL
syntax. A vulnerability exists in the version of curl included with Debian
GNU/Linux 2.2 (although cURL runs on other platforms as well, and earlier
versions may be also vulnerable). Curl's error-logging feature improperly
tests the size of generated error messages, which are sent from a remote
client. [ ... ]

xlib Buffer Overflow Vulnerability
BugTraq ID: 1805
Remote: No
Date Published: 2000-10-12
Relevant URL:
http://www.securityfocus.com/bid/1805
Summary:

A vulnerability exists in xlib, the C language interface to the X Window
System protocol.

When applications linked to the xlib library are run, user-supplied values
for the DISPLAY environment variable (and the command-line argument
-display) are stored in buffers of predefined length. It is not verified
that the amount data is within the predefined size limits before it is
copied onto the stack during function calls.

[ ... ]

cmd5checkpw Qmail Remote Password Retrieval Vulnerability
BugTraq ID: 1809
Remote: Yes
Date Published: 2000-10-16
Relevant URL:
http://www.securityfocus.com/bid/1809
Summary:

The authentication program cmd5checkpw can function as a plugin to
qmail-smtpd-auth, a patch for qmail which supports the SMTP AUTH protocol.

Due to improper input validation and error trapping, supplying
cmd5checkpw with a non-existent username will cause it to segfault. In
turn, the qmail-smtpd-auth Qmail patch incorrectly interprets this failure
as a successful authentication.

[ ... ]

RedHat Linux ping Buffer Overflow Vulnerability
BugTraq ID: 1813
Remote: No
Date Published: 2000-10-18
Relevant URL:
http://www.securityfocus.com/bid/1813
Summary:

ping is a network diagnostic tool shipped with almost every operating
system. On unix/linux systems it is usually installed setuid root because
it needs to open a raw socket (to send and recieve ICMP messages).
The version of ping that ships with RedHat Linux (and quite possibly,
though uncomfirmed, others) is vulnerable to a buffer overflow attack.

[ ... ]

SAMBA Long Password Buffer Overflow Vulnerability
BugTraq ID: 1816
Remote: Yes
Date Published: 1997-09-25
Relevant URL:
http://www.securityfocus.com/bid/1816
Summary:

Samba is an open source software suite that provides seamless file and
print services to SMB/CIFS clients. Certain older versions of Samba had a
remotely exploitable buffer overflow vulnerability. This vulnerability was
in the password function of the authentication mechanism which is to say a
user could supply an overly long password to the Samba server and trigger
a buffer overflow.

S.u.S.E. ypbind-mt Format String Vulnerability
BugTraq ID: 1820
Remote: Yes
Date Published: 2000-10-18
Relevant URL:
http://www.securityfocus.com/bid/1820
Summary:

ypbind-mt is a rewrite of the NIS client software by Thorsten Kukuk for
S.u.S.E. Linux systems. It has been reported that this version is
vulnerable to a possibly remotely exploitable format string attack. The
problem has to do with user input being passed as part of the format
string argument for a *printf function. [ ... ]

Apache mod_cookies Buffer Overflow Vulnerability
BugTraq ID: 1821
Remote: Yes
Date Published: 1997-01-12
Relevant URL:
http://www.securityfocus.com/bid/1821
Summary:

The Apache Project is a collaborative software development effort aimed at
creating a robust, commercial-grade, featureful, and freely-available
source code implementation of an HTTP (Web) server.  Certain versions of
the Apache webserver shipped with a remotely exploitable buffer overflow
attack. This overflow was present in the function make_cookie, in
mod_cookies.c used a 100 byte buffer. Remote attackers, if they provided
more than 100 bytes, could exploit this vulnerabiltity to gain access to
the server running the Apache server.



--
Pour poster une annonce: [EMAIL PROTECTED]

Répondre à