Section:  .. / 0404-advisories  /

Page 1 of 4
<< 1 2 3 4 >> Files 1 - 25 of 90
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: cisco-sa-20040420-tcp-ios.txt
Description:
Cisco Security Advisory: Multiple IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
Related File:246929.html
File Size:60677
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 09:16:00 2004
MD5 Checksum:663728941831d9d63a38198a2d659230

 ///  File Name: 246929.html
Description:
NISCC Vulnerability Advisory 236929 - Vulnerability Issues in TCP. The vulnerability described in this advisory affects implementations of the Transmission Control Protocol (TCP) that comply with the Internet Engineering Task Force'sā(IETF's) Requests For Comments (RFCs) for TCP, including RFC 793, the original specification, and RFC 1323, TCP Extensions for High Performance. If exploited, the vulnerability could allow an attacker to create a Denial of Service condition against existing TCP connections, resulting in premature session termination. The Border Gateway Protocol (BGP) is judged to be potentially most affected by this vulnerability.
Homepage:http://www.uniras.gov.uk/vuls/2004/236929/index.htm
Related Exploit:reset.zip"
File Size:41862
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 04:04:00 2004
MD5 Checksum:cff2aaba6bb7c03aa105c4ed0ce9e768

 ///  File Name: cisco-sa-20040420-tcp-nonios.txt
Description:
Cisco Security Advisory: Multiple non-IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml
Related File:246929.html
File Size:21737
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 09:14:00 2004
MD5 Checksum:ab5fb916f6cb82da579a4d6ff70daf27

 ///  File Name: SuSE-SA:2004:008.txt
Description:
SuSE Security Advisory SuSE-SA:2004:008 - Two vulnerabilities have been discovered in CVS that can be exploited by malicious servers to compromise clients and by malicious users to retrieve arbitrary files from servers. Versions below 1.11.15 are affected.
Author:Sebastian Krahmer
Homepage:http://www.suse.com/
File Size:16281
Last Modified:Apr 15 16:34:00 2004
MD5 Checksum:3fda183c35ae1584b65b22e3b4df2147

 ///  File Name: mcafeefreescan.txt
Description:
Mcafee FreeScan is susceptible to buffer overflow and private information disclosure attacks.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:14636
Last Modified:Apr 7 00:54:00 2004
MD5 Checksum:978e8e0aceef94667e938eef6003bb51

 ///  File Name: symantecVD.txt
Description:
Symantec Virus Detection is susceptible to a buffer overflow.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:14538
Last Modified:Apr 7 01:01:00 2004
MD5 Checksum:60f169b636b17fbf04ba75855fa5b3f3

 ///  File Name: blaxxun3D.txt
Description:
blaxxun3d Platform 7 is susceptible to a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:13939
Last Modified:Apr 6 10:32:00 2004
MD5 Checksum:b89b552158300259e0059595dd443b21

 ///  File Name: TA04-111A.txt
Description:
Technical Cyber Security Alert TA04-111A - Most implementations of the Border Gateway Protocol (BGP) rely on the Transmission Control Protocol (TCP) to maintain persistent unauthenticated network sessions. There is a vulnerability in TCP which allows remote attackers to terminate network sessions. Sustained exploitation of this vulnerability could lead to a denial of service condition; in the case of BGP systems, portions of the Internet community may be affected. Routing operations would recover quickly after such attacks ended.
Homepage:http://www.cert.org
File Size:11431
Related CVE(s):CAN-2004-0230
Last Modified:Apr 20 15:32:00 2004
MD5 Checksum:e962a745188ee0ebe20c6eccbac1bdc1

 ///  File Name: cisco-sa-20040408-vpnsm.txt
Description:
Cisco Security Advisory 20040408 - A malformed Internet Key Exchange (IKE) packet may cause the Cisco Catalyst 6500 Series Switch or the Cisco 7600 Series Internet Router hardware, with the VPNSM installed, to crash and reload.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040408-vpnsm.shtml
File Size:10921
Last Modified:Apr 8 16:08:00 2004
MD5 Checksum:a138dc472b2634d83c967d5f833aefc9

 ///  File Name: dsa-483.txt
Description:
Debian Security Advisory DSA 483-1 - The scripts mysqld_multi and mysqlbug in MySQL allow local users to overwrite arbitrary files via symlink attacks.
Author:Martin Schulze
Homepage:http://www.debian.org/security/
File Size:10806
Related CVE(s):CAN-2004-0381, CAN-2004-0388
Last Modified:Apr 15 17:01:00 2004
MD5 Checksum:0f717ded78c223aca3285044ec416b55

 ///  File Name: 20040401-01-P
Description:
SGI Security Advisory 20040401-01-P - It has been reported that there are several security issues affecting ftpd on IRIX. There is an ftpd DoS that is possible during PORT mode (SGI BUG 899364) not to mention that ftpd's ftp_syslog() doesn't work with anonymous FTP (SGI BUG 909172).
Homepage:http://support.sgi.com/
File Size:10066
Last Modified:Apr 2 11:29:00 2004
MD5 Checksum:7be6ff1c8fb3c76beb33200abd57a0fb

 ///  File Name: panda50.txt
Description:
Panda ActiveScan version 5.0 has a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:9700
Last Modified:Apr 6 17:03:00 2004
MD5 Checksum:08b6f72012db467514114e251e01d623

 ///  File Name: HP_Web_Jetadmin_advisory.txt
Description:
Phenoelit Advisory #0815 - Multiple vulnerabilities exist in the HP Web JetAdmin product. Version 6.5 is fully affect. Versions 7.0 and 6.2 and below are partially affected. A vulnerability summary list: Source disclosure of HTS and INC files, real path disclosure of critical files, critical files accessible through web server, user and administrator password disclosure and decryption, user and administrator password replay, and many, many others.
Author:FX
Homepage:http://www.phenoelit.de
Related Exploit:JetRoot_pl.txt"
File Size:9333
Last Modified:Apr 28 05:56:54 2004
MD5 Checksum:e3e5f8476c574e691368a1f5161fc720

 ///  File Name: TA04-099A.txt
Description:
CERT Advisory TA04-099A - A cross-domain scripting vulnerability in Microsoft Internet Explorer (IE) could allow an attacker to execute arbitrary code with the privileges of the user running IE. The attacker could also read and manipulate data on web sites in other domains or zones.
Author:Art Manion
Homepage:http://www.cert.org
File Size:9204
Related CVE(s):CAN-2004-0380
Last Modified:Apr 9 07:33:00 2004
MD5 Checksum:c72c756ebf4c90463fbf6e5d29e38bb3

 ///  File Name: cisco-sa-20040407-username.txt
Description:
Cisco Security Advisory 2004040 - A default username/password pair is present in all releases of the Wireless LAN Solution Engine (WLSE) and Hosting Solution Engine (HSE) software. A user who logs in using this username has complete control of the device. This username cannot be disabled. There is no workaround.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040407-username.shtml
File Size:9133
Last Modified:Apr 9 00:01:48 2004
MD5 Checksum:c7046e6dc8988f3f60d0365243991618

 ///  File Name: secadv01.txt
Description:
InAccess Networks Security Advisory - A heap overflow vulnerability exists in Oracle 9iAS / 10g Application Server Web Cache that allows for arbitrary code execution.
Author:Ioannis Migadakis
Homepage:http://www.inaccessnetworks.com/ian/services/secadv01.txt
File Size:7038
Related CVE(s):CAN-2004-0385
Last Modified:Apr 9 03:11:00 2004
MD5 Checksum:053c3dd8b6b2dcb2d9b253a9d108a426

 ///  File Name: waraxe-2004-SA018.txt
Description:
PHP-Nuke versions 6.x through 7.2 have a flaw that allows for administrator level authentication bypass.
Author:Janek Vind
File Size:6980
Last Modified:Apr 13 01:10:00 2004
MD5 Checksum:c8bd8bb15ea321ee604706efb6b6a8e9

 ///  File Name: waraxe-2004-SA017.txt
Description:
PHP-Nuke versions 6.x through 7.2 have a flaw that allows for user level authentication bypass.
Author:Janek Vind
File Size:6716
Last Modified:Apr 13 01:00:00 2004
MD5 Checksum:91ab67f7fd06c5c673fbd927a8784c64

 ///  File Name: sharutil.txt
Description:
A stack-based buffer overflow vulnerability exists in the popular shar utility packaged in the GNU sharutils distribution, due to a lack of bounds checking when handling the -o command-line option. By default, this file is not setuid nor setgid, but if used in conjunction with other tools, it is possible that this can be manipulated for nefarious purposes.
Author:Shaun Colley aka shaun2k2
File Size:6660
Last Modified:Apr 6 10:35:00 2004
MD5 Checksum:069474a24cf0175f496d012e8d25cf22

 ///  File Name: openbb106.txt
Description:
Open Bulletin Board versions 1.0.6 and below suffer from cross site scripting, SQL injection, and arbitrary command execution flaws.
Author:JeiAr
Homepage:http://www.gulftech.org
File Size:6473
Last Modified:Apr 25 17:43:00 2004
MD5 Checksum:d312d326fb6de5ac0f588ae4da200302

 ///  File Name: XSA-2004-1and2.html
Description:
When opening a malicious MRL in any xine-lib or xine-ui based media player, an attacker can write arbitrary content to an arbitrary file, only restricted by the permissions of the user running the application.
Homepage:http://www.xinehq.de/
File Size:6429
Last Modified:Apr 21 15:01:00 2004
MD5 Checksum:35b1987cd627eb2eda88919e59e11d08

 ///  File Name: texutil.txt
Description:
A symbolic link condition exists in all versions of texutil. An attacker can overwrite arbitrary files.
Author:Shaun Colley
Homepage:http://www.nettwerked.co.uk
File Size:5897
Last Modified:Apr 4 04:04:00 2004
MD5 Checksum:4de539943022dff55b7e4c04497a58e6

 ///  File Name: MDKSA-2004:031.txt
Description:
Mandrakelinux Security Update Advisory - Problems lie in the utempter program versions 10.0, 9.2, 9.1, Corporate Server 2.1, and Multi Network Firewall 8.2 that allow for arbitrary file overwrites and denial of service attacks.
Author:Steve Grubb
Homepage:http://www.mandrakesecure.net/
File Size:5847
Related CVE(s):CAN-2004-0233
Last Modified:Apr 19 16:44:00 2004
MD5 Checksum:5cccf5c233164f75ee1005a187215e83

 ///  File Name: 04.14.04.txt
Description:
iDEFENSE Security Advisory 04.14.04: The Linux kernel performs no length checking on symbolic links stored on an ISO9660 file system, allowing a malformed CD to perform an arbitrary length overflow in kernel memory. Symbolic links on ISO9660 file systems are supported by the 'Rock Ridge' extension to the standard format. The vulnerability can be triggered by performing a directory listing on a maliciously constructed ISO file system, or attempting to access a file via a malformed symlink on such a file system. Many distributions allow local users to mount CDs, which makes them potentially vulnerable to local elevation attacks. The issue affects the 2.4.x, 2.5.x and 2.6.x kernel. Other kernel implementations may also be vulnerable.
Author:Greg MacManus
Homepage:http://www.idefense.com/application/poi/display?id=101
File Size:5759
Related CVE(s):CAN-2004-0109
Last Modified:Apr 14 23:01:00 2004
MD5 Checksum:dc7eb7e05c50a61c6678c82437100df5

 ///  File Name: MPSB0405.txt
Description:
Macromedia Security Bulletin MPSB04-05 - Dreamweaver's remote database connectivity for testing dynamic database-driven websites installs scripts that may reveal DSNs to outside attackers. A sophisticated attacker may also be able to use these scripts to send SQL commands to the server and gain control of the database server.
Homepage:http://www.macromedia.com/support/
File Size:5635
Last Modified:Apr 3 16:44:00 2004
MD5 Checksum:650f72b5c7c439faf50d93c6c21d2947