Section:  .. / 0401-advisories  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 63
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: inn240.txt
Description:
A buffer overflow has been discovered in a portion of the control message handling code introduced in INN 2.4.0. It is likely that this overflow could be remotely exploited to gain access to the user innd runs as. INN versions 2.3.x and below are not affected.
Author:Russ Allbery, Katsuhiro Kondou
File Size:2579
Last Modified:Jan 8 19:26:58 2004
MD5 Checksum:7bac448a8e55a3bbb570c6ddd4b0d831

 ///  File Name: isec-0013-mremap.txt
Description:
The mremap system call in the Linux kernel memory management code has a critical security vulnerability due to incorrect bounds checking. Proper exploitation of this vulnerability may lead to local privilege escalation including execution of arbitrary code with kernel level access.
Author:Paul Starzetz, Wojciech Purczynski
Homepage:http://isec.pl/vulnerabilities/isec-0013-mremap.txt
File Size:3727
Related CVE(s):CAN-2003-0985
Last Modified:Jan 5 20:55:40 2004
MD5 Checksum:caae1f46b6f3b8b0c136d4ef83ebbcd2

 ///  File Name: isec-0013v2-mremap.txt
Description:
The mremap system call in the Linux kernel memory management code has a critical security vulnerability due to incorrect bounds checking. Proper exploitation of this vulnerability may lead to local privilege escalation including execution of arbitrary code with kernel level access. Updated version of the original release of this document.
Author:Paul Starzetz, Wojciech Purczynski
Homepage:http://isec.pl/vulnerabilities/isec-0013-mremap.txt
File Size:17065
Related CVE(s):CAN-2003-0985
Last Modified:Jan 15 23:18:00 2004
MD5 Checksum:fed40c0c67cafbea0cd615fdf1a54a29

 ///  File Name: KpyM_advisory.txt
Description:
KpyM telnet server versions 1.05 and below for Microsoft Windows NT/2000/XP fail to properly clean up when disconnecting users, allowing for a remote attacker to commit a denial of service attack.
Author:NoRpiUs
Homepage:http://norpius.altervista.org
File Size:1995
Last Modified:Jan 8 19:45:48 2004
MD5 Checksum:db7d4233952586e4397371701d0b607f

 ///  File Name: libtool152.txt
Description:
Versions below 1.5.2 of GNU's libtool have a symlink vulnerability that creates a temporary directory when a package using libtool is being compiled.
Author:Stefan Nordhausen
File Size:1716
Last Modified:Jan 30 11:14:00 2004
MD5 Checksum:d766b2d1a4e7de15f711c5c120268916

 ///  File Name: lotus602linux.txt
Description:
Lotus Notes version 6.0.2 on Linux installs with faulty permissions on its notes.ini file which would allow local attackers to compromise the system.
Author:l0om
Homepage:http://www.excluded.org
File Size:1821
Last Modified:Jan 8 01:43:45 2004
MD5 Checksum:ff479a3ada47d118cfedaa67912ff16d

 ///  File Name: mambo.txt
Description:
The Mambo Open Source web content management system allows for remote command execution as the webserver user id due to a lack of input validation.
Author:FraMe
Homepage:http://www.kernelpanik.org
File Size:1341
Last Modified:Jan 19 01:21:00 2004
MD5 Checksum:29380f7ad13cd94fe1f84ab35ed2bd6e

 ///  File Name: mephistoles.txt
Description:
The Mephistoles Internet Suite version 0.6.0final is susceptible to a cross site scripting attack.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:3238
Last Modified:Feb 10 06:29:14 2004
MD5 Checksum:4f6399a53e2ceb4e2b4da8288b6c443d

 ///  File Name: metadot.txt
Description:
MetaDot Portal versions 5.6.5.4b5 and below are susceptible to SQL injection vulnerabilities, Cross Site Scripting, and information disclosure attacks.
Author:JeiAr
Homepage:http://www.gulftech.org
File Size:5834
Last Modified:Jan 16 10:00:00 2004
MD5 Checksum:0d4a9035bca58094ede85f10afb14eb1

 ///  File Name: nCipher08.txt
Description:
nCipher Security Advisory No. 8 - Versions 1.3.12, 1.5.18, and 1.6.18 of the payShield SPP library may return Status_OK regardless of what the real reply status should be.
Homepage:http://www.ncipher.com/
File Size:6788
Last Modified:Jan 14 20:50:00 2004
MD5 Checksum:5680a67e7808fab40faa6e9f8ea97cc2

 ///  File Name: networker60.txt
Description:
A plausible symlink attack exists in networker version 6.0 in the shutdown script.
Author:l0om
File Size:1169
Last Modified:Jan 19 23:55:00 2004
MD5 Checksum:b0aa295afc5af5e52ad594417b9bdc82

 ///  File Name: nfshp2cbof-adv.txt
Description:
Need for Speed Hot Pursuit 2 has a vulnerable client that is susceptible to a buffer overflow attack by a hostile server. The buffer overflow occurs when too long of a string is sent back to the client during an information query. Electronic Arts has not bothered to even return e-mails regarding this problem.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:3482
Last Modified:Jan 23 01:45:00 2004
MD5 Checksum:b230abcd649ea7baef8f4888deaeae85

 ///  File Name: open3sIDSontape.txt
Description:
A stack-based buffer overflow exists in the ONCONFIG environment variable read process when it is bigger than 495 bytes and read in by the IBM Informix IDSv9.40 ontape binary.
Author:Juan Manuel Pascual Escriba
Homepage:http://www.open3s.com
File Size:2249
Last Modified:Jan 28 19:55:00 2004
MD5 Checksum:17aba62d43551a5f45a47720c8ff8fa7

 ///  File Name: pablo-ftp.txt
Description:
Pablo FTP server version 1.77 allows for information disclosure by detecting whether or not a file exists outside of the FTP root directory, allow a remote attack to peruse the system at will.
Author:scrap
Homepage:http://www.securiteinfo.co
File Size:2544
Last Modified:Jan 19 06:19:00 2004
MD5 Checksum:f29de99e9408ded01ce5fc1b6d811ec3

 ///  File Name: phorum345.txt
Description:
Multiple cross site scripting and SQL injection vulnerabilities lie in Phorum versions 3.4.5 and below.
Author:Calum Power
File Size:6768
Last Modified:Jan 8 01:56:50 2004
MD5 Checksum:43a6d15e381300103edf8071bdcac0db

 ///  File Name: phpdig16x.txt
Description:
PhpDig version 1.6.x allows for remote command execution in its config.php script. Anybody can inject a url in the relative_script_path variable and obtain command execution with web server privileges.
Author:FraMe
Homepage:http://www.kernelpanik.org
File Size:1641
Last Modified:Jan 15 03:14:00 2004
MD5 Checksum:4d52897a1dc5a66a5a20520eebb3e251

 ///  File Name: postcal.txt
Description:
PostCalendar version 4.0.0 is susceptible to SQL injection attacks via its search functionality.
Author:Klavs Klavsen
File Size:1757
Last Modified:Jan 8 06:10:35 2004
MD5 Checksum:14f08c26adbdb194818d7625eca4adc9

 ///  File Name: qmailcrash.html
Description:
Georgi Guninski security advisory #65, 2004 - Qmail version 1.03 is susceptible to a couple attacks. A crash in qmail-smtpd occurs with a long SMTP session. The crash is not global, it affects only the current SMTP session. It is also possible to trigger a segmentation violation (SEGV) from the network.
Author:Georgi Guninski
Homepage:http://www.guninski.com/qmailcrash.html
File Size:12667
Last Modified:Jan 19 08:48:00 2004
MD5 Checksum:a3dd135400b8e81de6cc816382100e93

 ///  File Name: racoon.txt
Description:
racoon, KAME's IKE daemon, contains multiple flaws which allow for the unauthorized deletion of IPsec and ISAKMP SAs.
Author:Thomas Walpuski
File Size:4788
Last Modified:Jan 14 07:39:00 2004
MD5 Checksum:047dd6226cc82c29ac439d984e9d4be2

 ///  File Name: realnetxss.txt
Description:
RealNetworks fails to address a Cross-Site Scripting vulnerability in RealOne Player.
Author:Arman Nayyeri
File Size:3899
Last Modified:Jan 8 01:30:13 2004
MD5 Checksum:5d2034db3aa68a7f7754c8edf0e18fed

 ///  File Name: reptile.txt
Description:
Reptile, the web server written completely in Python, has a flaw that allows for completely CPU resource consumption which results in a denial of service.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1699
Last Modified:Jan 26 14:01:00 2004
MD5 Checksum:5b8e612733d379995d02da6b024a3cbd

 ///  File Name: sa10544.txt
Description:
Secunia Security Advisory SA10544 - A vulnerability has been identified in mpg321, allowing malicious people to execute arbitrary code. The problem is that certain strings in mp3 files are not properly verified before being used in a printf() function call. This could potentially be exploited to execute arbitrary code through malicious mp3 files and HTTP streams.
Homepage:http://www.secunia.com/advisories/10544/
File Size:1540
Last Modified:Jan 8 06:19:00 2004
MD5 Checksum:a27f5ace2541f0fd5c28b4418fe688a1

 ///  File Name: sa10561.txt
Description:
Secunia Security Advisory SA10561 - FSP Suite 2.x has two vulnerabilities. One allows malicious attackers to gain system access and view files outside of the web root. Another is an unspecified boundary error that can be exploited to cause a buffer overflow with the possibility of arbitrary code execution.
Homepage:http://www.secunia.com/advisories/10561/
File Size:1904
Last Modified:Jan 8 06:22:29 2004
MD5 Checksum:fab71eb8e2bce70767ef721a1a960f67

 ///  File Name: servu.txt
Description:
Serv-U FTP server versions 4.2 and below have an internal memory buffer that may be overrun while handling the site chmod command with a filename containing excessive data.
Author:kkqq
Homepage:http://www.0x557.org/release/servu.txt
File Size:1441
Last Modified:Jan 26 09:30:00 2004
MD5 Checksum:7c371527ce6128fefc45044ad4584576

 ///  File Name: snapstream.txt
Description:
SnapStream PVS LITE is susceptible to a cross site scripting attack.
Author:Rafel Ivgi
Homepage:http://theinsider.deep-ice.com
File Size:1630
Last Modified:Jan 8 01:35:53 2004
MD5 Checksum:181c70c842590696e303e00c6e614d1d