Section:  .. / 0404-advisories  /

Page 1 of 4
<< 1 2 3 4 >> Files 1 - 25 of 90
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 04.14.04.txt
Description:
iDEFENSE Security Advisory 04.14.04: The Linux kernel performs no length checking on symbolic links stored on an ISO9660 file system, allowing a malformed CD to perform an arbitrary length overflow in kernel memory. Symbolic links on ISO9660 file systems are supported by the 'Rock Ridge' extension to the standard format. The vulnerability can be triggered by performing a directory listing on a maliciously constructed ISO file system, or attempting to access a file via a malformed symlink on such a file system. Many distributions allow local users to mount CDs, which makes them potentially vulnerable to local elevation attacks. The issue affects the 2.4.x, 2.5.x and 2.6.x kernel. Other kernel implementations may also be vulnerable.
Author:Greg MacManus
Homepage:http://www.idefense.com/application/poi/display?id=101
File Size:5759
Related CVE(s):CAN-2004-0109
Last Modified:Apr 14 23:01:00 2004
MD5 Checksum:dc7eb7e05c50a61c6678c82437100df5

 ///  File Name: 04.15.04.txt
Description:
iDEFENSE Security Advisory 04.15.04: Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Universal Server could allow an attacker to restart and potentially disable the server.
Homepage:http://www.idefense.com/application/poi/display?type=vulnerabilities
File Size:3189
Related CVE(s):CAN-2004-0389
Last Modified:Apr 17 13:09:00 2004
MD5 Checksum:a6c52904a921ea898733b7cbc6af9a5a

 ///  File Name: 113579-03.txt
Description:
Patch 113579-03 that was released for Solaris 9 in mid-February introduces a security bug that affects anyone running a NIS server.
Author:Chris Thompson
File Size:2157
Last Modified:Apr 19 15:57:00 2004
MD5 Checksum:22a70ceff00e1f742c2b2ecb5a0c863f

 ///  File Name: 1stClass.txt
Description:
1st Class mail server 4.01 suffers from a directory traversal and cross site scripting vulnerabilities.
Author:Dr. Insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:1713
Last Modified:Apr 14 16:12:00 2004
MD5 Checksum:5028924fba9a2451ea6c3d82cb6d2d12

 ///  File Name: 20040401-01-P
Description:
SGI Security Advisory 20040401-01-P - It has been reported that there are several security issues affecting ftpd on IRIX. There is an ftpd DoS that is possible during PORT mode (SGI BUG 899364) not to mention that ftpd's ftp_syslog() doesn't work with anonymous FTP (SGI BUG 909172).
Homepage:http://support.sgi.com/
File Size:10066
Last Modified:Apr 2 11:29:00 2004
MD5 Checksum:7be6ff1c8fb3c76beb33200abd57a0fb

 ///  File Name: 246929.html
Description:
NISCC Vulnerability Advisory 236929 - Vulnerability Issues in TCP. The vulnerability described in this advisory affects implementations of the Transmission Control Protocol (TCP) that comply with the Internet Engineering Task Force'sā(IETF's) Requests For Comments (RFCs) for TCP, including RFC 793, the original specification, and RFC 1323, TCP Extensions for High Performance. If exploited, the vulnerability could allow an attacker to create a Denial of Service condition against existing TCP connections, resulting in premature session termination. The Border Gateway Protocol (BGP) is judged to be potentially most affected by this vulnerability.
Homepage:http://www.uniras.gov.uk/vuls/2004/236929/index.htm
Related Exploit:reset.zip"
File Size:41862
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 04:04:00 2004
MD5 Checksum:cff2aaba6bb7c03aa105c4ed0ce9e768

 ///  File Name: a042204-1.txt
Description:
Atstake Security Advisory A042204-1 - The SiteMinder Affiliate Agent plugin version 4.x is susceptible to a remotely exploitable heap overflow when the SMPROFILE cookie is passed a large value. This affect the Solaris, Windows, and HP-UX platforms.
Author:Jeremy Jethro
Homepage:http://www.atstake.com/research/advisories/2004/a042204-1.txt
File Size:3338
Related CVE(s):CAN-2004-0425
Last Modified:Apr 24 05:44:00 2004
MD5 Checksum:3e5b35e4323fe96cea4d9218a69b73c3

 ///  File Name: Adobe.Acrobat.txt
Description:
Adobe Acrobat versions 4 and 5 suffer from a denial of service vulnerability when too much memory gets allocated during file repair.
Author:Arman Nayyeri
Homepage:http://www.4rman.com
File Size:2681
Last Modified:Apr 11 11:30:00 2004
MD5 Checksum:5cb310317d967eb92536f1e941310e34

 ///  File Name: advguest.txt
Description:
Advanced Guestbook web application version 2.2 is susceptible to a SQL injection attack.
Author:JQ
File Size:296
Last Modified:Apr 22 10:14:00 2004
MD5 Checksum:601545f561f0a1de4ae46a1bbc7a06af

 ///  File Name: advisory-04.txt
Description:
paFileDB version 3.1 suffers from path disclosure and cross site scripting flaws.
Author:DarkBicho
Homepage:http://www.darkbicho.tk
File Size:2676
Last Modified:Apr 28 06:09:03 2004
MD5 Checksum:cae8846cd34224d112651b525dbbc79d

 ///  File Name: bitdefender.txt
Description:
BitDefender's online scanning service has Active-X related flaws that allow an attacker to run arbitrary code server side.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:4400
Last Modified:Apr 19 04:44:00 2004
MD5 Checksum:93cb75f93c620475277ed02cfa6865c7

 ///  File Name: blaxxun3D.txt
Description:
blaxxun3d Platform 7 is susceptible to a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:13939
Last Modified:Apr 6 10:32:00 2004
MD5 Checksum:b89b552158300259e0059595dd443b21

 ///  File Name: cfdos.txt
Description:
ColdFusion MX versions 6.0 and below suffer from a denial of service vulnerability when memory usage gets saturated due to an oversized string being returned as part of an error message.
Author:K. K. Mookhey
Homepage:http://www.nii.co.in/vuln/cfdos.html
File Size:4285
Last Modified:Apr 17 13:06:00 2004
MD5 Checksum:2277133d43ddfc7f423ecfe473aceec0

 ///  File Name: chpasswd.txt
Description:
The chpasswd binary plugin version 3.x that comes with SquirrelMail is susceptible to a buffer overflow.
Author:Matias Neiff
File Size:500
Last Modified:Apr 17 04:20:00 2004
MD5 Checksum:925dc53e7334dfe39f26d2606f0a1b52

 ///  File Name: cisco-sa-20040407-username.txt
Description:
Cisco Security Advisory 2004040 - A default username/password pair is present in all releases of the Wireless LAN Solution Engine (WLSE) and Hosting Solution Engine (HSE) software. A user who logs in using this username has complete control of the device. This username cannot be disabled. There is no workaround.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040407-username.shtml
File Size:9133
Last Modified:Apr 9 00:01:48 2004
MD5 Checksum:c7046e6dc8988f3f60d0365243991618

 ///  File Name: cisco-sa-20040408-vpnsm.txt
Description:
Cisco Security Advisory 20040408 - A malformed Internet Key Exchange (IKE) packet may cause the Cisco Catalyst 6500 Series Switch or the Cisco 7600 Series Internet Router hardware, with the VPNSM installed, to crash and reload.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040408-vpnsm.shtml
File Size:10921
Last Modified:Apr 8 16:08:00 2004
MD5 Checksum:a138dc472b2634d83c967d5f833aefc9

 ///  File Name: cisco-sa-20040420-tcp-ios.txt
Description:
Cisco Security Advisory: Multiple IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
Related File:246929.html
File Size:60677
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 09:16:00 2004
MD5 Checksum:663728941831d9d63a38198a2d659230

 ///  File Name: cisco-sa-20040420-tcp-nonios.txt
Description:
Cisco Security Advisory: Multiple non-IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml
Related File:246929.html
File Size:21737
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 09:14:00 2004
MD5 Checksum:ab5fb916f6cb82da579a4d6ff70daf27

 ///  File Name: citadel.txt
Description:
Citadel/UX Security Advisory 2004-01 - Citadel/UX versions 5.00 through 6.14 had loose permission settings for database related files, allowing any local shell user to gain access to any data on the system.
Homepage:http://www.citadel.org/
File Size:2646
Last Modified:Apr 13 02:12:00 2004
MD5 Checksum:1e68b0ba30529c69dfb7485ff20eb410

 ///  File Name: crackalaka.txt
Description:
Crackalaka version 1.0.8 is susceptible to a denial of service attack when it attempts to manage an unallocated sector of memory.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1648
Last Modified:Apr 9 12:59:00 2004
MD5 Checksum:0c433f7ca6760e11f7859c73b5f33e7a

 ///  File Name: digiwww.txt
Description:
DiGi WWW Server version Compieuw.1 suffers from a DoS vulnerability due to a malformed URL.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1781
Last Modified:Apr 28 06:07:38 2004
MD5 Checksum:10aed3b00ae6eea78f8f8d5e157fb1ab

 ///  File Name: Director31ad.html
Description:
IBM Director 3.1 Agent for Windows is vulnerable to a remote denial of service attack when being scanned.
Author:Juanma Merino
Homepage:http://t3k.ibernet.com
File Size:4585
Last Modified:Apr 5 19:04:00 2004
MD5 Checksum:ff7d1e01c78a1e1c364b6203cf8b48fd

 ///  File Name: dreamweaver.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR05042004B - To aid in the development of web applications that require database connectivity, certain test scripts are created and uploaded to a website when using Macromedia's Dreamweaver. These scripts help to test database connectivity. If left these scripts can allow an attacker to gain access to the backend database server, without the attacker having to supply a user ID and password. Systems affected are IIS/Dreamweaver MX and UltraDev 4.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/dreamweaver.txt
File Size:2470
Last Modified:Apr 5 18:54:00 2004
MD5 Checksum:abb3079d80716b54b6dfdfd18f1be2bc

 ///  File Name: dsa-483.txt
Description:
Debian Security Advisory DSA 483-1 - The scripts mysqld_multi and mysqlbug in MySQL allow local users to overwrite arbitrary files via symlink attacks.
Author:Martin Schulze
Homepage:http://www.debian.org/security/
File Size:10806
Related CVE(s):CAN-2004-0381, CAN-2004-0388
Last Modified:Apr 15 17:01:00 2004
MD5 Checksum:0f717ded78c223aca3285044ec416b55

 ///  File Name: dsa-484.txt
Description:
Debian Security Advisory DSA 484-1 - Steve Kemp discovered a vulnerability in xonix, a game, where an external program was invoked while retaining setgid privileges. A local attacker could exploit this vulnerability to gain gid games.
Author:Matt Zimmerman
Homepage:http://www.debian.org/security/
File Size:4632
Related CVE(s):CAN-2004-0157
Last Modified:Apr 15 13:44:00 2004
MD5 Checksum:9693a21027f500ff242c8194b200b1d1