Section:  .. / 0412-advisories  /

Page 1 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 1 - 25 of 253
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 012004.txt
Description:
Hardened-PHP Project Security Advisory - Several vulnerabilities within PHP allow local and remote execution of arbitrary code. PHP4 versions 4.3.9 and below and PHP5 version 5.0.2 and below are affected.
Author:Stefan Esser
Homepage:http://www.hardened-php.net/
File Size:5986
Related CVE(s):CAN-2004-1018, CAN-2004-1019, CAN-2004-1063, CAN-2004-1064
Last Modified:Dec 30 09:24:36 2004
MD5 Checksum:0a640e9df71b3112012863be676b587e

 ///  File Name: 12.03.2004.txt
Description:
iDEFENSE Security Advisory 12.03.2004 - Remote exploitation of an input validation vulnerability in Apple Computer Inc.'s Darwin Streaming Server allows attackers to cause a denial of service condition. The vulnerability specifically occurs due to insufficient sanity checking on arguments to DESCRIBE requests.
Homepage:http://www.idefense.com/
File Size:4013
Related CVE(s):CAN-2004-1123
Last Modified:Dec 12 08:38:26 2004
MD5 Checksum:207b318ba5859970b748e9b0f1af24d2

 ///  File Name: 12.13.04-2.txt
Description:
iDEFENSE Security Advisory 12.13.2004-2 - Remote exploitation of a format string vulnerability in version 6.0.2 of Adobe's Reader could allow attackers to execute arbitrary code.
Author:Greg MacManus
Homepage:http://www.idefense.com/
File Size:3668
Related CVE(s):CAN-2004-1153
Last Modified:Dec 30 08:41:55 2004
MD5 Checksum:28b6adbc87245d6c8f9bd22394e1fca9

 ///  File Name: 12.13.04.txt
Description:
iDEFENSE Security Advisory 12.13.2004 - Remote exploitation of an integer overflow vulnerability in various vendors' implementations of the read_prf_file method in the xzgv program could allow for arbitrary code execution.
Author:Infamous41md
Homepage:http://www.idefense.com/
File Size:3427
Related CVE(s):CAN-2004-0994
Last Modified:Dec 30 07:38:31 2004
MD5 Checksum:9094914ae014dcd01d35b12600763815

 ///  File Name: 12.14.04-2.txt
Description:
iDEFENSE Security Advisory 12.14.2004-2 - Remote exploitation of a buffer overflow vulnerability in Microsoft Corp.'s Word 6.0/95 Document Converter could allow attackers to exploit arbitrary code under the privileges of the target user.
Author:Lord Yup
Homepage:http://www.idefense.com/
File Size:5378
Related CVE(s):CAN-2004-0901
Last Modified:Dec 30 08:40:13 2004
MD5 Checksum:0ba6340c496f1bc64bb84a6d7d92bf6f

 ///  File Name: 12.14.04.txt
Description:
iDEFENSE Security Advisory 12.14.2004 - Remote exploitation of a buffer overflow in version 5.09 of Adobe Acrobat Reader for Unix could allow for execution of arbitrary code.
Author:Greg MacManus
Homepage:http://www.idefense.com/
File Size:4377
Related CVE(s):CAN-2004-1152
Last Modified:Dec 30 08:30:05 2004
MD5 Checksum:d6ab8d341e59e026f3e8d4964a226a1d

 ///  File Name: 12.15.04.txt
Description:
iDEFENSE Security Advisory 12.15.2004 - Local exploitation of an insecure permission vulnerability in Computer Associates eTrust EZ Antivirus allows attackers to escalate privileges or disable protection.
Homepage:http://www.idefense.com/
File Size:4539
Related CVE(s):CAN-2004-1149
Last Modified:Dec 30 09:18:27 2004
MD5 Checksum:0ffd199d5e1d8a56f70823a1ed530f79

 ///  File Name: 12.16.04-2.txt
Description:
iDEFENSE Security Advisory 12.16.2004-2 - Remote exploitation of a heap overflow vulnerability in Unix MPlayer could allow attackers to gain access to the computer. The vulnerability specifically exists due to a lack of bounds checking within the demux_open_bmp() routine defined in /libmpdemux/demux_bmp.c. If a specially crafted file specifies a large value for the biClrUsed field, an overflow is triggered in stream_read().
Homepage:http://www.idefense.com/
File Size:3890
Last Modified:Dec 30 10:03:28 2004
MD5 Checksum:0d2fc3ba8fe14f5e6379a670da388d15

 ///  File Name: 12.16.04-3.txt
Description:
iDEFENSE Security Advisory 12.16.2004-3 - Remote exploitation of a stack overflow vulnerability in MPlayer could allow remote users to gain access to the computer. The vulnerability specifically exists due to a lack of bounds checking in /libmpdemux/asf_mmst_straming.c. If a specially crafted file specifies a large value for the length field, the overflow is triggered in get_data().
Homepage:http://www.idefense.com/
File Size:3351
Last Modified:Dec 30 10:01:37 2004
MD5 Checksum:7d592e631fccdfd26500f0fd932e90f8

 ///  File Name: 12.16.04-4.txt
Description:
iDEFENSE Security Advisory 12.16.2004-4 - Remote exploitation of a heap overflow vulnerability in Unix MPlayer could allow attackers to gain access to the computer. The vulnerability specifically exists due to a lack of bounds checking within the demux_open_bmp() routine defined in /libmpdemux/demux_bmp.c. If a specially crafted file specifies a large value for the biClrUsed field, an overflow is triggered in stream_read().
Homepage:http://www.idefense.com/
File Size:3799
Last Modified:Dec 30 10:04:16 2004
MD5 Checksum:7c969c0d4f32b1e66552c76570fa7bf7

 ///  File Name: 12.16.04-5.txt
Description:
iDEFENSE Security Advisory 12.16.2004-5 - Remote exploitation of a stack-based buffer overflow vulnerability in Veritas Backup Exec allows attackers to execute arbitrary code. The vulnerability specifically exists within the function responsible for receiving and parsing registration requests. The registration request packet contains the hostname and connecting TCP port of the client which is stored in an array on the stack. An attacker can send a registration request with an overly long hostname value to overflow the array and take control of the saved return address to execute arbitrary code.
Author:Patrik Karlsson
Homepage:http://www.idefense.com/
File Size:3337
Related CVE(s):CAN-2004-1172
Last Modified:Dec 30 10:05:22 2004
MD5 Checksum:0bdbea7721db97f2068ded18fe5b51af

 ///  File Name: 12.16.04.txt
Description:
iDEFENSE Security Advisory 12.16.2004 - Remote exploitation of an integer overflow vulnerability in all versions of Samba's smbd prior to and including 3.0.8 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.
Author:Greg MacManus
Homepage:http://www.idefense.com/
File Size:4476
Related CVE(s):CAN-2004-1154
Last Modified:Dec 30 09:55:52 2004
MD5 Checksum:2c5eb7877612ca336ef84e4cf73eab47

 ///  File Name: 12.20.04-1.txt
Description:
iDEFENSE Security Advisory 12.20.2004-1 - Local exploitation of an untrusted path vulnerability in the invscout command included by default in multiple versions of IBM Corp.'s AIX could allow attackers to execute arbitrary code as the root user. Verified in version 5.2.
Homepage:http://www.idefense.com/
File Size:3759
Related CVE(s):CAN-2004-1054
Last Modified:Dec 31 10:32:49 2004
MD5 Checksum:30b7ea08a921a2a39681b89166ce578a

 ///  File Name: 12.20.04.txt
Description:
iDEFENSE Security Advisory 12.20.2004 - Local exploitation of an untrusted path vulnerability in the chcod command included by default in multiple versions of IBM Corp. AIX could allow for arbitrary code execution as the root user. Verified in version 5.2.
Homepage:http://www.idefense.com/
File Size:3830
Related CVE(s):CAN-2004-1028
Last Modified:Dec 31 10:31:06 2004
MD5 Checksum:fd13ffaaffddef8241c722f8dee67e2e

 ///  File Name: 12.21.04-1.txt
Description:
iDEFENSE Security Advisory 12.21.2004-1 - Remote exploitation of a buffer overflow in version 0.99.2 of xine could allow execution of arbitrary code. The vulnerability specifically exists in the RMF_TAG, DATA_TAG, PROP_TAG, MDPR_TAG and CONT_TAG handling code of the pnm_get_chunk() function. These tags are all handled by the same code. The code does not perform correct checking on the chunk size before reading data in. If the size given is less than the PREAMBLE_SIZE, a negative length read is made into a fixed length buffer. Because the read length parameter is an unsigned value, the negative length is interpreted as a very large length, allowing a buffer overflow to occur.
Homepage:http://www.idefense.com/
File Size:3672
Related CVE(s):CAN-2004-1188
Last Modified:Dec 31 20:11:06 2004
MD5 Checksum:20e2b1b5805349c861f2cd9d8056eca5

 ///  File Name: 12.21.04-2.txt
Description:
iDEFENSE Security Advisory 12.21.2004-2 - Remote exploitation of a buffer overflow in version 0.99.2 of xine could allow execution of arbitrary code. The vulnerability specifically exists in the PNA_TAG handling code of the pnm_get_chunk() function. The function does not check the if the length of an input to be stored in a fixed size buffer is larger than the buffer size.
Homepage:http://www.idefense.com
File Size:3340
Related CVE(s):CAN-2004-1187
Last Modified:Dec 31 20:12:42 2004
MD5 Checksum:ec842ba395331e1d46648b3c5cc979a1

 ///  File Name: 12.21.04-3.txt
Description:
iDEFENSE Security Advisory 12.21.2004-3 - Remote exploitation of a buffer overflow vulnerability in the file transfer protocol (FTP) daemon included in multiple versions of Hewlett- Packard Development Co.'s (HP) HP-UX allows attackers to gain remote root access in certain configurations.
Homepage:http://www.idefense.com
File Size:3312
Last Modified:Dec 31 20:13:54 2004
MD5 Checksum:e833fca2b3048c3ea615dc3ed1d4a4f4

 ///  File Name: 12.21.04-4.txt
Description:
iDEFENSE Security Advisory 12.21.2004-4 - Remote exploitation of a heap-based buffer overflow vulnerability within the LibTIFF package could allow attackers to execute arbitrary code.
Author:infamous41md
Homepage:http://www.idefense.com/
File Size:4502
Last Modified:Dec 31 20:15:37 2004
MD5 Checksum:70e0c01b60749e56611dc4246474b24a

 ///  File Name: 12.21.04-5.txt
Description:
iDEFENSE Security Advisory 12.21.2004-5 - Remote exploitation of an integer overflow in libtiff may allow for the execution of arbitrary code. The overflow occurs in the parsing of TIFF files set with the STRIPOFFSETS flag in libtiff/tif_dirread.c.
Author:infamous41md
Homepage:http://www.idefense.com/
File Size:3348
Last Modified:Dec 31 20:16:44 2004
MD5 Checksum:356281e4e24566b78fde74e0612ea773

 ///  File Name: 12.21.04.txt
Description:
iDEFENSE Security Advisory 12.21.2004 - Remote exploitation of a buffer overflow vulnerability in the xpdf PDF viewer, as included in multiple Linux distributions, could allow attackers to execute arbitrary code as the user viewing a PDF file. The offending code can be found in the Gfx::doImage() function in the source file xpdf/Gfx.cc.
Homepage:http://www.idefense.com/
File Size:4201
Related CVE(s):CAN-2004-1125
Last Modified:Dec 31 19:53:34 2004
MD5 Checksum:302966569c0f3dca7436bebdb18bf63a

 ///  File Name: 2fax-djb.txt
Description:
A boundary error condition in ArBas 2fax allow for arbitrary code execution. Version 3.04 was found susceptible.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/2fax.txt
File Size:1613
Last Modified:Dec 30 10:26:58 2004
MD5 Checksum:1b879f49f13ed4a55da16edb0f3d5479

 ///  File Name: 57659.html
Description:
Sun Security Advisory - A security vulnerability in the in.rwhod daemon may allow a remote privileged user to execute arbitrary code with root privileges when the in.rwhod daemon is enabled on the system.
Homepage:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57659-1
File Size:7401
Last Modified:Dec 12 19:59:29 2004
MD5 Checksum:4d97c64d933275a0d682aa3a88e3b731

 ///  File Name: 57675.html
Description:
Sun Security Advisory - There is a potential buffer overflow in ping which could result in a local unprivileged user gaining elevated privileges.
Homepage:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57675-1
File Size:8066
Last Modified:Dec 12 00:49:52 2004
MD5 Checksum:32263036558f0cc0737498f95ca3d352

 ///  File Name: 57707.txt
Description:
A vulnerability in the Java Runtime Environment (JRE) involving object deserialization could be exploited remotely to cause the Java Virtual Machine to become unresponsive, which is a type of Denial-of-Service (DoS). This issue can affect the JRE if an application that runs on it accepts serialized data from an untrusted source. Includes Sun advisory announcing release of JDK 1.4.2_06 and a note from Marc Shoenefeld who discovered the flaw.
Author:Marc Schoenefeld
File Size:2996
Last Modified:Dec 31 20:32:04 2004
MD5 Checksum:90a7b52d93f76377be6e4f3bf4a7f36d

 ///  File Name: 6502.txt
Description:
A problem exists in some browsers where, via Content-Type spoofing, forcing a user to open a page and bypass the security zone is possible, allowing for execution of javascript in a local context. Software affected: Firefox 1.0, Mozilla 1.7.x, Opera 7.51 through 7.54.
Author:Giovanni Delvecchio
File Size:4369
Last Modified:Dec 30 07:53:34 2004
MD5 Checksum:bd409665573dbceb0a0492d681acd1ca