Section:  .. / 0412-advisories  /

Page 6 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 125 - 150 of 253
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: abc2mtex.txt
Description:
abc2mtex version 1.6.1 has a boundary error condition in the process_abc() function that allows for arbitrary code execution.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt
File Size:2039
Last Modified:Dec 30 10:42:26 2004
MD5 Checksum:e12f113d24d952fbfdf7bf71b1622856

 ///  File Name: sa13492.txt
Description:
Secunia Security Advisory - A security issue has been reported in Windows XP SP2, which erroneously causes the firewall to allow connections from the Internet. The problem is caused by the way certain dialers configure the routing table and how local subnets are interpreted when the 'My network (subnet) only' option is used in the Microsoft Windows Firewall. This issue only affects Windows XP with Service Pack 2 in combination with a dial-up network connection.
Homepage:http://secunia.com/advisories/13492/
File Size:1946
Last Modified:Dec 30 10:40:12 2004
MD5 Checksum:f5a3acbe598e4e33576f61305734742b

 ///  File Name: abcm2ps.txt
Description:
A boundary error condition in the put_words() function of abcm2ps version 3.7.20 allows for arbitrary code execution.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/abcm2ps.txt
File Size:1831
Last Modified:Dec 30 10:39:18 2004
MD5 Checksum:54e0f622e9324e40942a6ebaf0eb7e71

 ///  File Name: nasm.txt
Description:
A boundary error condition in NASM version 0.98.38 allows for local system compromise.
Author:Jonathan Rockway
Homepage:http://tigger.uic.edu/~jlongs2/holes/nasm.txt
File Size:1949
Last Modified:Dec 30 10:38:04 2004
MD5 Checksum:43a8545b814a79e23cdb1e28d400355f

 ///  File Name: cups2.txt
Description:
Various errors in lppasswd under CUPS 1.x allows for /usr/local/etc/cups/passwd file manipulation/truncation.
Author:Bartlomiej Sieka
Homepage:http://tigger.uic.edu/~jlongs2/holes/cups2.txt
File Size:1623
Last Modified:Dec 30 10:36:34 2004
MD5 Checksum:61ea133082d16f3b0424f6de8d6096d5

 ///  File Name: cups.txt
Description:
A boundary error in the ParseCommand() function of CUPS version 1.x allows for a buffer overflow attack.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/cups.txt
File Size:1710
Last Modified:Dec 30 10:35:01 2004
MD5 Checksum:dc39406cac000791b41cbd2c2f4e58ac

 ///  File Name: tnftp.txt
Description:
A flaw in tnftp exists where it fails to properly validate file names provided by the server. Successful exploitation allows overwriting local files, but requires that a user connects to a malicious ftp server and downloads files.
Author:Yosef Klein
Homepage:http://tigger.uic.edu/~jlongs2/holes/tnftp.txt
File Size:1349
Last Modified:Dec 30 10:33:16 2004
MD5 Checksum:d58a198fffb693611506577277aafb20

 ///  File Name: gameport.txt
Description:
GamePort versions 3.0, 3.1, and 4.0 suffer from multiple vulnerabilities including reversal of the admin password.
Author:AmoXi and Dr. VaXin
File Size:3617
Last Modified:Dec 30 10:31:11 2004
MD5 Checksum:b7560aef6bf4b2b4549bdb18a6a44329

 ///  File Name: xine-lib.txt
Description:
A boundary error condition in xine-lib versions 1-rc5 and 1-rc7 allows for arbitrary code execution.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt
File Size:1793
Last Modified:Dec 30 10:28:38 2004
MD5 Checksum:ff26c74368757ae959f8e15478702404

 ///  File Name: 2fax-djb.txt
Description:
A boundary error condition in ArBas 2fax allow for arbitrary code execution. Version 3.04 was found susceptible.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/2fax.txt
File Size:1613
Last Modified:Dec 30 10:26:58 2004
MD5 Checksum:1b879f49f13ed4a55da16edb0f3d5479

 ///  File Name: mpg123.txt
Description:
A boundary error condition in mpg123 version 0.59r allows for remote compromise.
Author:Bartlomiej Sieka
Homepage:http://tigger.uic.edu/~jlongs2/holes/mpg123.txt
File Size:2011
Last Modified:Dec 30 10:23:47 2004
MD5 Checksum:15ba7341715ed64b72f881b11018077d

 ///  File Name: gadugadu.txt
Description:
Gadu-Gadu is susceptible to script execution in the local zone and remote denial of service flaws.
Author:Blazej Miga, Jaroslaw Sajko
File Size:1731
Last Modified:Dec 30 10:20:55 2004
MD5 Checksum:328eed129e3efbbd707100fbfdfafb1d

 ///  File Name: NetBSD-2004-010.txt
Description:
NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall.
Author:Evgeny Demidov
Homepage:http://www.netbsd.org/
File Size:4659
Last Modified:Dec 30 10:10:46 2004
MD5 Checksum:1caeb75665bcbb5ebf85d997096369d2

 ///  File Name: singapore0910.txt
Description:
Multiple vulnerabilies have been found in the Singapore Image Gallery Web Application version 0.9.10 including arbitrary file download, directory deletion, and cross site scripting flaws.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/vuln/singapore0910.html
File Size:2483
Last Modified:Dec 30 10:08:35 2004
MD5 Checksum:9575c63773bd9433a1cc1532ca27c69c

 ///  File Name: 12.16.04-5.txt
Description:
iDEFENSE Security Advisory 12.16.2004-5 - Remote exploitation of a stack-based buffer overflow vulnerability in Veritas Backup Exec allows attackers to execute arbitrary code. The vulnerability specifically exists within the function responsible for receiving and parsing registration requests. The registration request packet contains the hostname and connecting TCP port of the client which is stored in an array on the stack. An attacker can send a registration request with an overly long hostname value to overflow the array and take control of the saved return address to execute arbitrary code.
Author:Patrik Karlsson
Homepage:http://www.idefense.com/
File Size:3337
Related CVE(s):CAN-2004-1172
Last Modified:Dec 30 10:05:22 2004
MD5 Checksum:0bdbea7721db97f2068ded18fe5b51af

 ///  File Name: 12.16.04-4.txt
Description:
iDEFENSE Security Advisory 12.16.2004-4 - Remote exploitation of a heap overflow vulnerability in Unix MPlayer could allow attackers to gain access to the computer. The vulnerability specifically exists due to a lack of bounds checking within the demux_open_bmp() routine defined in /libmpdemux/demux_bmp.c. If a specially crafted file specifies a large value for the biClrUsed field, an overflow is triggered in stream_read().
Homepage:http://www.idefense.com/
File Size:3799
Last Modified:Dec 30 10:04:16 2004
MD5 Checksum:7c969c0d4f32b1e66552c76570fa7bf7

 ///  File Name: 12.16.04-2.txt
Description:
iDEFENSE Security Advisory 12.16.2004-2 - Remote exploitation of a heap overflow vulnerability in Unix MPlayer could allow attackers to gain access to the computer. The vulnerability specifically exists due to a lack of bounds checking within the demux_open_bmp() routine defined in /libmpdemux/demux_bmp.c. If a specially crafted file specifies a large value for the biClrUsed field, an overflow is triggered in stream_read().
Homepage:http://www.idefense.com/
File Size:3890
Last Modified:Dec 30 10:03:28 2004
MD5 Checksum:0d2fc3ba8fe14f5e6379a670da388d15

 ///  File Name: 12.16.04-3.txt
Description:
iDEFENSE Security Advisory 12.16.2004-3 - Remote exploitation of a stack overflow vulnerability in MPlayer could allow remote users to gain access to the computer. The vulnerability specifically exists due to a lack of bounds checking in /libmpdemux/asf_mmst_straming.c. If a specially crafted file specifies a large value for the length field, the overflow is triggered in get_data().
Homepage:http://www.idefense.com/
File Size:3351
Last Modified:Dec 30 10:01:37 2004
MD5 Checksum:7d592e631fccdfd26500f0fd932e90f8

 ///  File Name: ikonboard.txt
Description:
Ikonboard 3.1.x is susceptible to multiple SQL injection attacks.
Homepage:http://www.maxpatrol.com
File Size:2825
Last Modified:Dec 30 09:58:20 2004
MD5 Checksum:0a41418045d782d373ab81e4acda33f8

 ///  File Name: 12.16.04.txt
Description:
iDEFENSE Security Advisory 12.16.2004 - Remote exploitation of an integer overflow vulnerability in all versions of Samba's smbd prior to and including 3.0.8 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.
Author:Greg MacManus
Homepage:http://www.idefense.com/
File Size:4476
Related CVE(s):CAN-2004-1154
Last Modified:Dec 30 09:55:52 2004
MD5 Checksum:2c5eb7877612ca336ef84e4cf73eab47

 ///  File Name: sambaRemote.txt
Description:
Remote exploitation of an integer overflow vulnerability in the smbd daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to and including 3.0.9 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.
Homepage:http://www.samba.org/
File Size:2488
Related CVE(s):CAN-2004-1154
Last Modified:Dec 30 09:54:35 2004
MD5 Checksum:51b3d15b606105f2c8e98b5768a8bf0d

 ///  File Name: phpMeta.txt
Description:
PHP version 4.3.9 is vulnerable to meta character attacks. The bug could enable an attacker to read arbitrary files from the filesystem of a webserver that hosts PHP scripts. In addition PHP versions 4.3.6 until 4.3.9 as well as PHP versions 5.0.0 until 5.0.2 contain a bug that enables an attacker to manipulate the file name of uploaded files to perform directory traversal.
Author:Daniel Fabian
File Size:4548
Last Modified:Dec 30 09:53:09 2004
MD5 Checksum:74b268a99f4a6aaefbb8d9e621614730

 ///  File Name: djbrelease.txt
Description:
Widely deployed open source software is commonly believed to contain fewer security vulnerabilities than similar closed source software due to the possibility of unrestricted third party source code auditing. Predictably, most users of open source software do not invest a significant amount of time to audit the applications they use and now a class of 25 students has discovered 44 vulnerabilities during a CS course.
Homepage:http://tigger.uic.edu/~jlongs2/holes/
File Size:11567
Last Modified:Dec 30 09:51:19 2004
MD5 Checksum:7b5e1faec9b98b0f9334fd73c3305797

 ///  File Name: SSA-20041215-19.txt
Description:
STG Security Advisory: MediaWiki versions 1.3.8 and below have an input validation flaw that can allow malicious attackers the ability to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:1560
Last Modified:Dec 30 09:40:03 2004
MD5 Checksum:ce30c0ea30a77f1397fa37a3336c979f

 ///  File Name: SSA-20041215-18.txt
Description:
STG Security Advisory: phpBB Attachment Mod is file upload module for phpBB. However, an input validation flaw can cause malicious attackers to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user. Attachment module 2.3.10 and below is susceptible.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:1955
Last Modified:Dec 30 09:38:31 2004
MD5 Checksum:3abc59c49deb724310ded2e6b6779685