Section:  .. / 0402-advisories  /

Page 2 of 5
<< 1 2 3 4 5 >> Files 25 - 50 of 107
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: eEye.ASN1-1.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in Microsoft's ASN.1 library (MSASN1.DLL) that would allow an attacker to overwrite heap memory on a susceptible machine and cause the execution of arbitrary code. Because this library is widely used by Windows security subsystems, the vulnerability is exposed through an array of avenues, including Kerberos, NTLMv2 authentication, and applications that make use of certificates (SSL, digitally-signed e-mail, signed ActiveX controls, etc.).
Author:eEye Digital Security
Homepage:http://www.eEye.com
File Size:8247
Last Modified:Feb 11 02:32:00 2004
MD5 Checksum:c0156c394d63b5b3a7acf625bcfe9775

 ///  File Name: eEye.ASN1-2.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a second critical vulnerability in Microsoft's ASN.1 library (MSASN1.DLL) that allows an attacker to overwrite heap memory with data he or she controls and cause the execution of arbitrary code. ASN.1 is an industry standard used in a variety of binary protocols, and as a result, this flaw in Microsoft's implementation can be reached through a number of Windows applications and services. Ironically, the security-related functionality in Windows is especially adept at rendering a machine vulnerable to this attack, including Kerberos (UDP/88) and NTLMv2 authentication (TCP/135, 139, 445).
Author:eEye Digital Security
Homepage:http://www.eEye.com
File Size:7974
Last Modified:Feb 11 02:33:00 2004
MD5 Checksum:26ef179631af5d137184078e5afc6cc1

 ///  File Name: eEye.realsecure.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in both RealSecure and BlackICE. The vulnerability allows a remote attacker to reliably overwrite heap memory with user-controlled data and execute arbitrary code within the SYSTEM context. This attack will succeed with BlackICE using its most paranoid settings.
Author:eEye Digital Security
Homepage:http://www.eEye.com
File Size:4152
Last Modified:Feb 27 03:34:00 2004
MD5 Checksum:cf58862e37b168562457080264c01a9d

 ///  File Name: eEye.Zonelabs.txt
Description:
eEye Security Advisory - Zonelabs Pro/Plus/Integrity versions 4.0 and above are susceptible to a stack based buffer overflow within vsmon.exe that can be exploited to execute code with the context of the SYSTEM account. The vulnerability exists within the component responsible for processing the RCPT TO command argument.
Author:eEye Digital Security
Homepage:http://www.eEye.com
File Size:2910
Last Modified:Feb 19 22:50:00 2004
MD5 Checksum:2cb205821b026ed7fc8c0f56c3bd9e22

 ///  File Name: eggdropShare.txt
Description:
Eggdrop IRC robots versions 1.6.x to 1.6.15 have a programming flaw that allow remote attackers to turn on share status, allowing for complete compromise.
Author:Luca De Roberto, Dania Stolfi, Guiseppe Caulo
File Size:3843
Last Modified:Feb 9 21:40:00 2004
MD5 Checksum:93a00a1a498c904b2b0b37c58ee81349

 ///  File Name: eTrust60.txt
Description:
eTrust Virus Protection 6.0 InoculateIT for Linux is vulnerable to various symlink attacks and also creates multiple world writeable files and directories that can lead to system compromise.
Author:l0om
File Size:5252
Last Modified:Feb 9 22:52:00 2004
MD5 Checksum:c50f1b9150db331ae5c5cd26774d54d1

 ///  File Name: ezboardXSS.txt
Description:
ezBoard versions 7.3u and below are vulnerable to a cross site scripting attack.
Author:Cheng Peng Su
File Size:1206
Last Modified:Feb 23 23:01:00 2004
MD5 Checksum:763a44b4e5b0218d30ded5e7097fe284

 ///  File Name: ezContents.txt
Description:
PHP code injection vulnerabilities in ezContents versions 2.0.2 and prior allow for a remote attacker to access arbitrary files and execute commands on the server.
Author:Cedric Cochin
File Size:2677
Related CVE(s):CAN-2004-0132
Last Modified:Feb 11 03:32:00 2004
MD5 Checksum:ccdadfe3f61aaa24885a498f8a83a7f6

 ///  File Name: formmailphp.txt
Description:
A cross site scripting flaw exists in formmail.php.
Author:Nourredine Himeur
Homepage:http://www.security-challenge.com
File Size:2681
Last Modified:Feb 6 23:50:00 2004
MD5 Checksum:9248c882c366f3dec15135fdd84774cc

 ///  File Name: FreeBSD-SA-04:02.shmat
Description:
FreeBSD Security Advisory FreeBSD-SA-04:02.shmat - A programming error in the shmat(2) system call can result in a shared memory segment's reference count being erroneously incremented. It may be possible to cause a shared memory segment to reference unallocated kernel memory, but remain valid. This could allow a local attacker to gain read or write access to a portion of kernel memory, resulting in sensitive information disclosure, bypass of access control mechanisms, or privilege escalation.
Homepage:http://www.freebsd.org/security/
File Size:6360
Last Modified:Feb 5 21:03:00 2004
MD5 Checksum:eb0b33cf5fc0260b225915ceb6a3f377

 ///  File Name: FreeBSD-SA-04:03.jail.txt
Description:
FreeBSD Security Advisory FreeBSD-SA-04:03.jail - A vulnerability has been found where jailed processes can attach to other jails. A programming error has been found in the jail_attach(2) system call which affects the way that system call verifies the privilege level of the calling process. Instead of failing immediately if the calling process was already jailed, the jail_attach(2) system call would fail only after changing the calling process's root directory.
Homepage:http://www.freebsd.org/security/
File Size:3735
Last Modified:Feb 27 23:37:00 2004
MD5 Checksum:d2dd9443b680de4094398f1affe91b88

 ///  File Name: freechat111a.txt
Description:
FreeChat version 1.1.1a has problems parsing certain strings resulting in a denial of service.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1432
Last Modified:Feb 25 21:01:00 2004
MD5 Checksum:c03ec67f5051430b8705f4b618675070

 ///  File Name: GamespySDK.txt
Description:
The Gamespy SDK used for online cd-keys validation in third party code has various vulnerabilities. Game servers getting crashed and privacy problems persist. Gamespy themselves sent the author a cease and desist due to his research.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:16589
Last Modified:Feb 24 23:19:00 2004
MD5 Checksum:2329acac06ac4148eabd9dd778fd046c

 ///  File Name: ghostrecon.txt
Description:
The Ghost Recon engine versions 1.4 and below along with some other games developed by Redstorm are vulnerable to a remote crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:2267
Last Modified:Feb 24 23:17:00 2004
MD5 Checksum:22c10d2cb22a420e9ad7f8ef47678b3d

 ///  File Name: gigabytebb.txt
Description:
Gigabyte Broadband Router version Gn-B46B with firmware version 1.003.00 is vulnerable to a remote authorization bypass.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:16451
Last Modified:Feb 24 21:36:00 2004
MD5 Checksum:898f3ace7d6904b65998fc22270a0e18

 ///  File Name: haegemonia.txt
Description:
Haegemonia versions 1.07 and below have a remote vulnerability where the reading of unallocated memory causes a crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1649
Last Modified:Feb 24 22:23:00 2004
MD5 Checksum:0bb1907284719014c8060b11d83e4222

 ///  File Name: IBM.cloudscape.txt
Description:
IBM cloudscape SQL Database (DB2J) version 5.1 on Windows with jdk 1.4.2 is vulnerable to remote command injection, denial of service attacks, and information leakage via specially crafted SQL statements.
Author:Marc Schoenefeld
Homepage:http://www.illegalaccess.org
File Size:4037
Last Modified:Feb 5 02:58:00 2004
MD5 Checksum:34808051fb93ae87a4b41af19b89a69d

 ///  File Name: innomedia.txt
Description:
The InnoMedia VideoPhone version au75200xvi04010x on the Windows platform is susceptible to an authorization bypass when attempting to via a file as a folder. The underlying webserver is GoAhead-Webs.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2311
Last Modified:Feb 28 20:17:00 2004
MD5 Checksum:9bc0a3993865e43e93e00e3419d29c32

 ///  File Name: isec-0014-mremap-unmap.txt
Description:
A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code. Versions affected: 2.2 up to 2.2.25, 2.4 up to 2.4.24, 2.6 up to 2.6.2.
Author:Paul Starzetz
Homepage:http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt
File Size:6435
Related CVE(s):CAN-2004-0077
Last Modified:Feb 18 22:01:00 2004
MD5 Checksum:d2250a6f166b77301fc08235625db115

 ///  File Name: ISS_alert_163
Description:
ISS X-Force has discovered a flaw in the ISAKMP processing for both the Checkpoint VPN-1 server and Checkpoint VPN clients(Securemote/ SecureClient). The IKE component of these products allows for the unidirectional or bidirectional authentication of two remote nodes as well as the negotiation of cryptographic capabilities and keys. A buffer overflow vulnerability exists when attempting to handle large certificate payloads. A remote attacker may exploit this flaw to remotely compromise any VPN-1 server and/or client system running Securemote/SecureClient.
Homepage:http://xforce.iss.net/
File Size:-
Last Modified:Remote File
MD5 Checksum:-

 ///  File Name: jgs010.txt
Description:
jgs version 0.1.0 on the win32 platform is vulnerable to a cross site scripting attack.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2448
Last Modified:Feb 25 18:18:00 2004
MD5 Checksum:da1b5872e4f4db6887707d7f2ed04ff8

 ///  File Name: Lam3rZ-012004.txt
Description:
Lam3rZ Security Advisory #1/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. Specific input data strings can be constructed and can cause failure of the eauth binary, leading to the code execution under root privileges.
Author:Tomasz Grabowski
File Size:2569
Last Modified:Feb 23 22:38:00 2004
MD5 Checksum:b06f31ba8f0744c1eb238dbf50b9d56b

 ///  File Name: Lam3rZ-022004.txt
Description:
Lam3rZ Security Advisory #2/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. The eauth binary can be exploited to send commands to LSF on behalf of a different user. In this way a user could submit and control jobs on behalf of other users.
Author:Tomasz Grabowski
File Size:3924
Last Modified:Feb 23 22:39:00 2004
MD5 Checksum:397d31ea3101cee97e37668955aaa325

 ///  File Name: Lam3rZ-032004.txt
Description:
Lam3rZ Security Advisory #3/2004 - Confirm versions 0.62 and below allow for forged email headers to execute arbitrary code as the uid the script runs under for procmail.
Author:Mariusz Woloszyn
File Size:1121
Last Modified:Feb 24 03:45:00 2004
MD5 Checksum:af6a46460589f4b374f74859982daf70

 ///  File Name: lansuite.txt
Description:
Lan Suite Web Mail version 602Pro running server WEB602/1.04 has multiple vulnerabilities that include path disclosure, cross site scripting problems, and directory listings.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2599
Last Modified:Feb 28 20:23:00 2004
MD5 Checksum:f1485a401a2a427f6e16b82c0140d653