Section:  .. / 0410-advisories  /

Page 2 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 25 - 50 of 254
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: dsa-568-1.txt
Description:
Debian Security Advisory DSA 568-1 - A vulnerability has been discovered in the Cyrus implementation of the SASL library, the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. The library honors the environment variable SASL_PATH blindly, which allows a local user to link against a malicious library to run arbitrary code with the privileges of a setuid or setgid application.
Author:Martin Schulze
Homepage:http://www.debian.org/security/
File Size:7249
Related OSVDB(s):10555
Related CVE(s):CAN-2004-0884
Last Modified:Oct 16 10:27:00 2004
MD5 Checksum:ca048955d1c95cb73c5ea60975b98d24

 ///  File Name: dsa-569-1.txt
Description:
Debian Security Advisory 569-1 - invalid free(3) in netkit-telnet-ssl. This advisory describes patching for a hole found in netkit-telnet-ssl which may allow for remote code execution as whatever user runs telnetd, which would typically be the telnetd user. The issue is corrected in 0.17.17+0.1-2woody2 (stable) or 0.17.24+0.1-4 (unstable). Issue discovered by Michal Zalewski.
Author:Martin Schulze
Homepage:http://www.debian.org/security/
File Size:7238
Related CVE(s):CAN-2004-0911
Last Modified:Oct 18 02:38:00 2004
MD5 Checksum:39b60f0a1cd5b4210f55f1ea1aca641f

 ///  File Name: quakeII.txt
Description:
Quake II version 3.2.x is susceptible to multiple vulnerabilities. Due to unchecked input at various stages in the server, remote users are able to cause the server to crash, reveal sensitive information or potentially execute arbitrary code.
Author:Richard Stanway
Homepage:http://www.r1ch.net/
File Size:7121
Last Modified:Oct 28 16:30:02 2004
MD5 Checksum:7bc381702143ab0259af8b0b05e89b7b

 ///  File Name: saMultiple.txt
Description:
Secunia Research Advisory - Multiple browsers suffer from multiple vulnerabilities. It is possible for a inactive tab to spawn dialog boxes e.g. the JavaScript Prompt box or the Download dialog box, even if the user is browsing/viewing a completely different web site in another tab. It is also possible for an inactive tab to always gain focus on a form field in the inactive tab, even if the user is browsing/viewing a completely different web site in another tab.
Author:Jakob Balle
Homepage:http://secunia.com/
File Size:7032
Last Modified:Oct 27 04:23:13 2004
MD5 Checksum:5d9bcf2b56ac00a434ce9b989b602923

 ///  File Name: 57657.html
Description:
Sun Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to escalate their privileges. The vulnerability is caused by an unspecified problem when LDAP and RBAC (Role Based Access Control) is used together. This can be exploited to execute certain commands with root privileges.
Homepage:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57657-1
File Size:7030
Last Modified:Oct 26 05:48:03 2004
MD5 Checksum:07cb81112061f53059c84f7f2032bab9

 ///  File Name: dsa-554.txt
Description:
Debian Security Advisory DSA 554-1 - When installing sasl-bin to use sasl in connection with sendmail, the sendmail configuration script uses fixed user/password information to initialize the sasl database. Any spammer with Debian systems knowledge could utilize such a sendmail installation to relay spam.
Author:Hugo Espuny
Homepage:http://www.debian.org/security/
File Size:6983
Related CVE(s):CAN-2004-0833
Last Modified:Oct 1 16:51:33 2004
MD5 Checksum:a73003141a17de235cce8a6088f8e952

 ///  File Name: dsa-572.txt
Description:
Debian Security Advisory 572-1 - A problem has been discovered in ecartis, a mailing-list manager, which allows an attacker in the same domain as the list admin to gain administrator privileges and alter list settings.
Homepage:http://www.debian.org/security/
File Size:6888
Related CVE(s):CAN-2004-0913
Last Modified:Oct 27 04:54:57 2004
MD5 Checksum:c59cb109affb7708979f4e265d2c07c6

 ///  File Name: dsa-556.txt
Description:
Debian Security Advisory DSA 556-1 - Due to a bug in the netkit-telnet server (telnetd), an a remote attacker could cause the telnetd process to free an invalid pointer. This causes the telnet server process to crash, leading to a straightforward denial of service (inetd will disable the service if telnetd is crashed repeatedly), or possibly the execution of arbitrary code with the privileges of the telnetd process (by default, the 'telnetd' user).
Author:Michal Zalewski
Homepage:http://www.debian.org/security/
File Size:6865
Related CVE(s):CAN-2004-0911
Last Modified:Oct 13 05:09:03 2004
MD5 Checksum:381e124a65605035c51fddc3c31e3dfe

 ///  File Name: dsa-571.txt
Description:
Debian Security Advisory 571-1 - Several integer overflows have been discovered by its upstream developers in libpng, a commonly used library to display PNG graphics. They could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed.
Homepage:http://www.debian.org/security/
File Size:6715
Related CVE(s):CAN-2004-0955
Last Modified:Oct 27 04:31:11 2004
MD5 Checksum:b330f88534c82e30bbf221dbaa75002d

 ///  File Name: dsa-570.txt
Description:
Debian Security Advisory 570-1 - Several integer overflows have been discovered by its upstream developers in libpng, a commonly used library to display PNG graphics. They could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed.
Homepage:http://www.debian.org/security/
File Size:6647
Related CVE(s):CAN-2004-0955
Last Modified:Oct 27 04:32:37 2004
MD5 Checksum:a5eeff813aaaaaaf3c5a04b0266922fb

 ///  File Name: 57600.html
Description:
Sun Security Advisory - If a local unprivileged user executes the gzip(1) command and specifies the -force or -f command line option, files which are hard linked to the target file(s) will have their permissions changed. This could allow other local unprivileged users the ability to read or modify files owned by the invoking user, or system files if gzip(1) is issued by a local privileged user.
Homepage:http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-57600-1
File Size:6534
Last Modified:Oct 13 07:35:57 2004
MD5 Checksum:eb866a50ffaee2a84f8a48095049a924

 ///  File Name: DSA-561-1-tiff--heap-overflows
Description:
Debian Security Advisory DSA-567-1. This details which versions of libtiff are affected by issues where specially crafted TIFF graphics could cause a vulnerable client to execute arbitrary code or crash.
Homepage:http://www.debian.org/security/2004/dsa-567
File Size:6477
Related CVE(s):CAN-2004-0804
Last Modified:Oct 18 13:21:00 2004
MD5 Checksum:96a019423515f42c24680d30b5cec0af

 ///  File Name: navRant.txt
Description:
Long rant plus proof of concept regarding how easy it is to bypass Norton Antivirus.
Author:Daniel Milisic
File Size:6297
Last Modified:Oct 26 03:40:24 2004
MD5 Checksum:269cc3b2870ca1095531c26324fba906

 ///  File Name: eeye.AD20041012-shatter-attacks.txt
Description:
eEye Security Advisory - Windows VDM #UD Local Privilege Escalation. Describes in more detail but with different terminology the "shatter" attacks corrected by MS04-032, and also discussed in a paper by Brett Moore.
Homepage:http://www.eeye.com/html/research/advisories/AD20041012.html
Related File:SetWindowLong_Shatter_Attacks.pdf
File Size:5986
Last Modified:Oct 24 21:19:32 2004
MD5 Checksum:18ef69a018824f10c0a4a7a20f297046

 ///  File Name: flsa-2072.txt
Description:
Fedora Legacy Update Advisory - FLSA:2072. Updated CUPS packages fix security vulnerability. Updated cups packages that fix a denial of service vulnerability are now available. In versions of CUPS prior to 1.1.21, an attacker can craft packets to the IPP port which will result in a Denial of Service on the CUPS service.
Homepage:http://www.cups.org/str.php?L863
File Size:5531
Related OSVDB(s):9995
Related CVE(s):CAN-2004-0558
Last Modified:Oct 16 14:01:00 2004
MD5 Checksum:5a4b6093695b8aa55b1c6dcb0f015163

 ///  File Name: MDKSA-2004:109.txt
Description:
Mandrakelinux Security Update Advisory - affected versions of MDK: 10.0, 92, Corporate Server 2.1, Multi Network Firewall 8.2. Several vulnerabilities have been discovered in the libtiff package that could lead to arbitrary code execution.
Author:Mandrake Linux Security Team
Homepage:http://www.mandrakesoft.com/security/advisories
File Size:5490
Related OSVDB(s):10750
Related CVE(s):CAN-2004-0803
Last Modified:Oct 20 04:32:00 2004
MD5 Checksum:a6636c1f92368f3291c331749b2eca80

 ///  File Name: dBpowerAMP.txt
Description:
dbPowerAmp Music Converter 10.0 and Player 2.0 suffer from multiple buffer overflow and denial of service vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:5126
Last Modified:Oct 7 05:22:46 2004
MD5 Checksum:9a8c97ebf269ec1effe09284ec32c029

 ///  File Name: dsa-558.txt
Description:
Debian Security Advisory DSA 558-1 - Julian Reschke reported a problem in mod_dav of Apache 2 in connection with a NULL pointer dereference. When running in a threaded model, especially with Apache 2, a segmentation fault can take out a whole process and hence create a denial of service for the whole server.
Homepage:http://www.debian.org/security/
File Size:5118
Last Modified:Oct 13 06:32:50 2004
MD5 Checksum:2a63811cc7e3645b8e94d34d4fc10c6b

 ///  File Name: ASPR-2004-10-14-1-PUB.txt
Description:
ACROS Security Problem Report #2004-10-14-1 - An HTML injection vulnerability exists in JRun Management Console, enabling attackers to hijack administrative sessions using cross site scripting. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.
Author:Mitja Kolsek
Homepage:http://www.acrossecurity.com/
File Size:5018
Last Modified:Oct 26 03:26:22 2004
MD5 Checksum:4c1cbc2e092094e137278585bb4198a5

 ///  File Name: MDKSA-2004:107.txt
Description:
Mandrakelinux Security Update Advisory - A number of vulnerabilities were fixed in mozilla 1.7.3, the following of which have been backported to mozilla packages for Mandrakelinux 10.0: "Send page" heap overrun, javascript clipboard access, buffer overflow when displaying VCard, BMP integer overflow, javascript: link dragging, Malicious POP3 server III.
Author:Mandrake Linux Security Team
Homepage:
File Size:4935
Last Modified:Oct 20 04:20:00 2004
MD5 Checksum:4d18d10aa28e7007ab193e70ee40fe35

 ///  File Name: proftpd12x.txt
Description:
ProFTPD 1.2.x suffers from a vulnerability that allow for remote user enumeration. It is possible to determine which user names are valid, which are special, and which ones do not exist on the remote system. This can be accomplished by code execution path timing analysis attack at the ProFTPD login procedure.
Homepage:http://security.lss.hr/
File Size:4917
Last Modified:Oct 26 04:29:35 2004
MD5 Checksum:1aeaa1eb452e6441593f2ccfbff5242d

 ///  File Name: dsa-574.txt
Description:
Debian Security Advisory 574-1 - The upstream developers discovered a problem in cabextract, a tool to extract cabinet files. The program was able to overwrite files in upper directories. This could lead an attacker to overwrite arbitrary files.
Homepage:http://www.debian.org/security/
File Size:4886
Related CVE(s):CAN-2004-0916
Last Modified:Oct 28 16:50:00 2004
MD5 Checksum:faf7cc0d58aa4be289b79b9fa7f2fc66

 ///  File Name: dsa-555.txt
Description:
Debian Security Advisory DSA 555-1 - It has been noticed that the freenet6 tspc.conf file is world readable by default, allowing a local attacker to retrieve password information.
Author:Simon Josefsson
Homepage:http://www.debian.org/security/
File Size:4818
Related CVE(s):CAN-2004-0563
Last Modified:Oct 7 05:45:04 2004
MD5 Checksum:63fdfc7347c5a17bb4aef486f9460f3f

 ///  File Name: dsa-559.txt
Description:
Debian Security Advisory DSA 559-1 - Stefan Nordhausen has identified a local security hole in net-acct, a user-mode IP accounting daemon. Old and redundant code from some time way back in the past created a temporary file in an insecure fashion.
Homepage:http://www.debian.org/security/
File Size:4756
Related CVE(s):CAN-2004-0851
Last Modified:Oct 13 07:31:47 2004
MD5 Checksum:967fc681eff45d4be117c7d5f323cc64

 ///  File Name: pppdDoS.txt
Description:
Improper verification of header fields lets an attacker make the pppd server from ppp-241 access memory it isn't allowed to, resulting in a crash of the server. There is no possibility of code execution, as there is no data being copied, just a pointer dereferenced.
Author:sean
File Size:4690
Last Modified:Oct 27 07:27:38 2004
MD5 Checksum:71d4cc7fc3b54237ca3ba0d2e1ecd78b