Section:  .. / 0408-advisories  /

Page 1 of 6
<< 1 2 3 4 5 6 >> Files 1 - 25 of 147
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 00044-08232004.txt
Description:
GulfTech Security Advisory - Multiple Liveworld products suffer from cross site scripting flaws.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2785
Last Modified:Aug 26 21:17:05 2004
MD5 Checksum:fd60e55e1e12b2b8e39359c2d9b691b0

 ///  File Name: 08.02.04.txt
Description:
iDEFENSE Security Advisory 08.02.04: Netscape version 7.0, 7.1, and Mozilla 1.6 are susceptible to a SOAPParameter constructor integer overflow vulnerability that can allow for arbitrary code execution running in the context of the user running the browser.
Author:zen-parse
Homepage:http://www.idefense.com/application/poi/display?id=117
File Size:3412
Related CVE(s):CAN-2004-0722
Last Modified:Aug 5 07:17:45 2004
MD5 Checksum:3a271bc80b97cfa87b2e71e086f470a7

 ///  File Name: 08.03.04.txt
Description:
iDEFENSE Security Advisory 08.03.04: NGSEC StackDefender 1.10 vulnerable to remote/local Denial of Service which may crash the underlying system.
Homepage:http://www.idefense.com
File Size:3518
Related CVE(s):CAN-2004-0766
Last Modified:Aug 4 14:20:23 2004
MD5 Checksum:15c814b567f0ab46d764c09bd2293e74

 ///  File Name: 08.05.04.txt
Description:
iDEFENSE Security Advisory 08.05.04: Remote exploitation of a design error vulnerability in Thompson's SpeedTouch Home ADSL modem allows attackers to spoof TCP traffic on behalf of the device.
Homepage:http://www.idefense.com/application/poi/display?id=120
File Size:4479
Related CVE(s):CAN-2004-0641
Last Modified:Aug 6 20:58:41 2004
MD5 Checksum:a8b4d8e57a1d17dacac166231ba15b2b

 ///  File Name: 08.12.04-2.txt
Description:
iDEFENSE Security Advisory 08.12.04-2: Remote exploitation of a buffer overflow in the uudecoding feature of Adobe Acrobat Reader 5.0 for Unix allows an attacker to execute arbitrary code. The Unix and Linux versions of Adobe Acrobat Reader 5.0 automatically attempt to convert uuencoded docuements back into their original format. The vulnerability specifically exists in that Acrobat Reader fails to check the length of the filename before copying it into a fixed length buffer. This allows a maliciously constructed file to cause a buffer overflow resulting in the execution of arbitrary code.
Homepage:http://www.idefense.com/
File Size:3834
Related CVE(s):CAN-2004-0631
Last Modified:Aug 13 16:35:37 2004
MD5 Checksum:45369ed00a25fb0e94e908833a955e56

 ///  File Name: 08.12.04.txt
Description:
iDEFENSE Security Advisory 08.12.04: Remote exploitation of an input validation error in the uudecoding feature of Adobe Acrobat Reader (Unix) 5.0 allows an attacker to execute arbitrary code. The Unix and Linux versions of Adobe Acrobat Reader 5.0 automatically attempt to convert uuencoded documents back into their original format. The vulnerability specifically exists in the failure of Acrobat Reader to check for the backtick shell metacharacter in the filename before executing a command with a shell. This allows a maliciously constructed filename to execute arbitrary programs.
Author:Greg MacManus
Homepage:http://www.idefense.com/
File Size:3843
Related CVE(s):CAN-2004-0630
Last Modified:Aug 13 16:32:37 2004
MD5 Checksum:b6cbe26848f77b783a6bee2a27019ee8

 ///  File Name: 08.16.04.txt
Description:
iDEFENSE Security Advisory 08.16.04: Remote exploitation of an information disclosure vulnerability in Concurrent Versions Systems (CVS) allows attackers to glean information. The vulnerability exists within an undocumented switch to the history command implemented in src/history.c. The -X command specifies the name of the history file allowing an attacker to determine whether arbitrary system files and directories exist and whether or not the CVS process has access to them. This issue was patched in the latest (June 9th) releases of CVS, specifically 1.11.17 and 1.12.9.
Homepage:http://www.idefense.com/
File Size:3869
Related CVE(s):CAN-2004-0778
Last Modified:Aug 18 02:17:21 2004
MD5 Checksum:2edc37463ad39dabd231753b349d0d18

 ///  File Name: 08.18.04.txt
Description:
iDEFENSE Security Advisory 08.18.04 - Remote exploitation of a format string vulnerability in Double Precision Inc.'s, Courier-IMAP daemon allows attackers to execute arbitrary code. The vulnerability specifically exists within the auth_debug() function defined in authlib/debug.c. Versions below 3.0.7 are affected.
Homepage:http://www.idefense.com/
File Size:3700
Related CVE(s):CAN-2004-0777
Last Modified:Aug 20 09:27:49 2004
MD5 Checksum:568c7fb679b41674d8274e8e522f61bf

 ///  File Name: 08.25.04-2.txt
Description:
iDEFENSE Security Advisory 08.25.04-2 - Exploitation of a buffer overflow in the libDtHelp library included with CDE can allow local attackers to gain root privileges. The vulnerability specifically exists due to a lack of bounds checking on the LOGNAME environment variable. Local attackers can specify a long LOGNAME to trigger a buffer overflow in any application linked with libDtHelp. The overflow is activated once the help subsystem is accessed by selecting any option under the Help menu.
Homepage:http://www.idefense.com/
File Size:4214
Related CVE(s):CAN-2003-0834
Last Modified:Aug 26 23:53:32 2004
MD5 Checksum:78f592957d67bd46e19e9549026d4408

 ///  File Name: 08.25.04.txt
Description:
iDEFENSE Security Advisory 08.25.04 - Remote exploitation of a buffer overflow vulnerability in Ipswitch Inc.'s WhatsUp Gold allows attackers to execute arbitrary code under the privileges of the user that instantiated the application. The problem specifically exists in the _maincfgret.cgi script accessible through the web server installed by WhatsUp Gold. By posting a long string for the value of 'instancename', a buffer overflow occurs allowing an attacker to redirect the flow of control and eventually execute arbitrary code. Fixed in version 8.03 Hotfix 1.
Homepage:http://www.idefense.com/
File Size:3015
Related CVE(s):CAN-2004-0798
Last Modified:Aug 26 23:51:30 2004
MD5 Checksum:acc26795c70843096074444b58e4db2f

 ///  File Name: 08112004-1.txt
Description:
BlackIce Server Protect versions 3.6cno and below from Internet Security Systems installs a firewall ruleset that can be removed or modified by any trusted or local unprivileged user.
Author:Thomas Ryan, Paul Craig
File Size:4412
Last Modified:Aug 12 10:15:21 2004
MD5 Checksum:0eef793b3c7c3fea0a7027ca07b5e177

 ///  File Name: 20040801_01_P.asc
Description:
Two specific flaws may allow for local root exploit of systems with CDE (Common Desktop Environment) less than 5.3.4.
Homepage:ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P.asc
File Size:7532
Related CVE(s):CAN-2003-0834
Last Modified:Aug 4 14:09:48 2004
MD5 Checksum:91bc9abd5fc1b0b77c943346e7e8ffdf

 ///  File Name: 50051.html
Description:
With Service Pack 2, Microsoft introduces a new security feature which warns users before executing files that originate from an untrusted location (zone) such as the Internet. There are two flaws in the implementation of this feature: a cmd issue and the caching of ZoneIDs in Windows Explorer. The Windows command shell cmd ignores zone information and starts executables without warnings. Virus authors could use this to spread viruses despite the new security features of SP2.
Author:Jurgen Schmidt
Homepage:http://www.heise.de/
File Size:7107
Last Modified:Aug 18 00:35:21 2004
MD5 Checksum:c8e1fa7b42df9537fcc249701f41b6de

 ///  File Name: 57613.html
Description:
Sun Security Advisory - The XSLT processor included with the Java Runtime Environment (JRE) may allow an untrusted applet to read data from another applet that is processed using the XSLT processor and may allow the untrusted applet to escalate privileges. All variants of Sun Java JRE 1.4.x and Sun Java SDK 1.4.x are affected, except releases 1.4.2_05 and above.
Author:Marc Schoenefeld
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57613
File Size:5965
Last Modified:Aug 5 07:26:27 2004
MD5 Checksum:d87c0af157537d5cd6452d44facff79a

 ///  File Name: 57619.html
Description:
Sun Security Advisory - A vulnerability has been reported in Solaris, which can be exploited by malicious people to cause a denial of service. The vulnerability is caused due to an unspecified error within the processing of XDMCP requests. Successful exploitation crashes the X Display Manager (xdm).
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57619
File Size:5853
Last Modified:Aug 11 02:37:04 2004
MD5 Checksum:80579d07a67e98c925a4d7a282266605

 ///  File Name: 57627.html
Description:
Sun Security Advisory - A buffer overflow in the Sun Solaris CDE Mailer dtmail allows for arbitrary code execution with mail group privileges.
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57627
File Size:6085
Last Modified:Aug 26 20:47:37 2004
MD5 Checksum:5a7c0c8e8e253ca73f9b7c84f4fb1a7a

 ///  File Name: adv03-y3dips-2004.txt
Description:
JetboxOne CMS version 2.0.8 keeps system passwords in an unencrypted state and also has a remote code execution flaw.
Author:y3dips
Homepage:http://y3dips.echo.or.id/
File Size:4750
Last Modified:Aug 5 08:12:20 2004
MD5 Checksum:752a4e9ece4d9839fe95cfbf85265b8a

 ///  File Name: adv04-y3dips-2004.txt
Description:
PHP-Fusion version 4.00 has a full path disclosure vulnerability and a flaw that allows an attacker to download the database backup file that can be used to gain administrative access.
Author:y3dips
Homepage:http://echo.or.id/adv/adv04-y3dips-2004.txt
File Size:4581
Last Modified:Aug 19 10:48:40 2004
MD5 Checksum:d0374134c5331166a92e979e90f26c9b

 ///  File Name: advisory-20040811-1.txt
Description:
KDE Security Advisory - The SUSE security team was alerted that in some cases the integrity of symlinks used by KDE are not ensured and that these symlinks can be pointing to stale locations. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly (Denial of Service). All versions of KDE up to KDE 3.2.3 inclusive.
Homepage:http://www.kde.org/info/security/advisory-20040811-1.txt
File Size:3283
Related CVE(s):CAN-2004-0689
Last Modified:Aug 12 09:57:58 2004
MD5 Checksum:5e936e04e596ff5e7b7f27abebeb6c7e

 ///  File Name: advisory-20040811-2.txt
Description:
KDE Security Advisory - The Debian project was alerted that KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application. Affected are version KDE 3.2.x up to KDE 3.2.3 inclusive.
Homepage:http://www.kde.org/info/security/advisory-20040811-2.txt
File Size:2040
Related CVE(s):CAN-2004-0690
Last Modified:Aug 12 10:00:52 2004
MD5 Checksum:586cb120613346465749ca546dd7eed2

 ///  File Name: advisory-20040811-3.txt
Description:
KDE Security Advisory - The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open. A malicious website could abuse Konqueror to insert its own frames into the page of an otherwise trusted website. As a result the user may unknowingly send confidential information intended for the trusted website to the malicious website.
Homepage:http://www.kde.org/info/security/advisory-20040811-3.txt
File Size:2474
Related CVE(s):CAN-2004-0721
Last Modified:Aug 12 10:03:44 2004
MD5 Checksum:ebdde55dbc6bfb05aac19e72f83bee1c

 ///  File Name: advisory-20040823-1.txt
Description:
KDE Security Advisory - Konqueror suffers from a Cross-Domain Cookie Injection vulnerability.
Homepage:http://www.kde.org/info/security/advisory-20040823-1.txt
File Size:2735
Related CVE(s):CAN-2004-0746
Last Modified:Aug 24 09:45:25 2004
MD5 Checksum:20dd8cfea48eed3ff3a2e76f30cc6985

 ///  File Name: Aim.DoS.8_9.pdf
Description:
A buffer overflow vulnerability has been discovered in AOL Instant Messenger 5.x that can allow for arbitrary code execution.
Author:Ryan McGeehan, Kevin Benes
Homepage:http://TheBillyGoatCurse.com
File Size:16322
Last Modified:Aug 10 01:51:02 2004
MD5 Checksum:cc4acdf40c3a7425037d1540dc289281

 ///  File Name: birdChat161.txt
Description:
Bird Chat version 1.61 is susceptible to a denial of service attack.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1408
Last Modified:Aug 24 10:27:45 2004
MD5 Checksum:a195c0f9b087b5ba971b60c69e7669ea

 ///  File Name: c030807-001.txt
Description:
Corsaire Security Advisory - Clearswift MAILsweeper versions prior to 4.3.15 do not detect a number of common compression formats, for which it is listed as compatible, and in certain circumstances also fails to identify the name of file attachments when they are encoded.
Author:Martin O'Neal
Homepage:http://www.corsaire.com/
File Size:7568
Related CVE(s):CAN-2003-0928, CAN-2003-0929, CAN-2003-0930
Last Modified:Aug 14 19:06:07 2004
MD5 Checksum:1261bb38d37f7d7587ce84ad91bc9f48