Section:  .. / 0409-advisories  /

Page 1 of 6
<< 1 2 3 4 5 6 >> Files 1 - 25 of 142
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 09.13.04a.txt
Description:
iDEFENSE Security Advisory 09.13.04a - Remote exploitation of an input validation error in Samba allows an attacker to crash the Samba nmbd server. The vendor has confirmed that Samba 3.0.x prior to and including v3.0.6 are vulnerable.
Homepage:http://www.idefense.com/
File Size:5147
Related CVE(s):CAN-2004-0808
Last Modified:Sep 15 02:13:48 2004
MD5 Checksum:eebbdaee10cd755f2ee88abb7e9bfe15

 ///  File Name: 09.14.04.txt
Description:
iDEFENSE Security Advisory 09.14.04 - Local exploitation of a design error vulnerability in Networks Associates Technology Inc.'s McAfee VirusScan could allow attackers to obtain increased privileges. McAfee VirusScan version 4.5.1 running on Windows 2000 Professional and Windows XP Professional operating systems is vulnerable. It is suspected that McAfee VirusScan 4.5 is also vulnerable.
Author:Ian Vitek
Homepage:http://www.idefense.com/
File Size:3057
Related CVE(s):CAN-2004-0831
Last Modified:Sep 15 06:53:24 2004
MD5 Checksum:981a4f50216e617a2afad8c1ba0ff4dc

 ///  File Name: 09.15.04.txt
Description:
iDEFENSE Security Advisory 09.15.04 - Remote exploitation of an input validation error in version 1.2 of GNU radiusd could allow a denial of service. The vulnerability specifically exists within the asn_decode_string() function defined in snmplib/asn1.c. When a very large unsigned number is supplied, it is possible that an integer overflow will occur in the bounds-checking code. The daemon will then attempt to reference unallocated memory, resulting in an access violation that causes the process to terminate.
Homepage:http://www.idefense.com/
File Size:3174
Related CVE(s):CAN-2004-0849
Last Modified:Sep 17 08:36:08 2004
MD5 Checksum:c955131260496f45cbcfeda92c30acfc

 ///  File Name: 09.16.04.txt
Description:
iDEFENSE Security Advisory 09.16.04 - Remote exploitation of a denial of service vulnerability in Ipswitch Inc.'s WhatsUp Gold versions 8.03 and below allows attackers to cause the application to crash.
Homepage:http://www.idefense.com/
File Size:2901
Related CVE(s):CAN-2004-0799
Last Modified:Sep 21 02:24:23 2004
MD5 Checksum:c8974ee6cf54a2c6438b2eb6a83d6c22

 ///  File Name: 09.22.04.txt
Description:
iDEFENSE Security Advisory 09.22.04 - Remote exploitation of a design vulnerability in version 1.00 of Sophos Plc.'s Small Business Suite allows malicious code to evade detection.
Author:Kurt Seifried
Homepage:http://www.idefense.com/
File Size:5294
Related CVE(s):CAN-2004-0552
Last Modified:Sep 29 06:29:21 2004
MD5 Checksum:70fbe0a3ec66de9cd22a3189dfbab4f3

 ///  File Name: 57614.html
Description:
Sun Security Advisory - A remote privileged user may be able to create a denial of the Domain Name System (DNS) service by killing the in.named(1M) daemon. As a result, applications, systems and devices relying on DNS may fail.
Homepage:http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-57614-1
File Size:6307
Last Modified:Sep 10 05:47:30 2004
MD5 Checksum:86e41e3fcb6be55e6e087e7a80f937fa

 ///  File Name: 57643.html
Description:
Sun Security Advisory - A buffer overflow vulnerability exists in the Netscape Network Security Services (NSS) library suite that is a security component used by most of the Sun Java Enterprise System (JES) components such as Web Server, App Server and Portal Server. This vulnerability may allow a remote unprivileged user to execute arbitrary code on vulnerable systems during SSLv2 connection negotiation.
Homepage:http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-57643-1
File Size:8268
Last Modified:Sep 21 21:17:34 2004
MD5 Checksum:2befa4954de10c498bad386f00bac1eb

 ///  File Name: a091304-1.txt
Description:
Atstake Security Advisory A091304-1 - JumpDrive Secure(tm) Version 1.0 and Lexar Safe Guard(tm) software fail to securely store the device's password. The password is located on the JumpDrive device. It can be read directly from the device without any authentication. It is stored in an XOR encrypted form and can be read directly from the device without any authentication.
Author:Katie Moussouris, Luis Miras
Homepage:http://www.atstake.com/research/advisories/2004/a091304-1.txt
File Size:3600
Last Modified:Sep 15 02:10:29 2004
MD5 Checksum:f47fec62d0df3b5e7c5576597ea6ffd1

 ///  File Name: a091304-2.txt
Description:
Atstake Security Advisory A091304-2 - A vulnerability in the HTTP management interface of the Pingtel Xpressa phone enables a remote authenticated attack to cause the underlying VxWorks operating system to stop.
Author:James Vaughan
Homepage:http://www.atstake.com/research/advisories/2004/a091304-2.txt
File Size:3428
Last Modified:Sep 15 02:16:43 2004
MD5 Checksum:2ea283111df43583fca089a9abd1b03a

 ///  File Name: activePost.txt
Description:
ActivePost Standard versions 3.1 and below suffer from a denial of service flaw, a directory traversal attack, and conference password and path disclosure vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:actpboom.zip"
File Size:4826
Last Modified:Sep 29 09:23:33 2004
MD5 Checksum:32e48c6d6045ac6267a3a3b58cc4fef0

 ///  File Name: adv05-y3dips-2004.txt
Description:
YABBSE 1.5.1 is susceptible to a full path disclosure flaw.
Author:y3dips
Homepage:http://echo.or.id/adv/adv05-y3dips-2004.txt
File Size:1905
Last Modified:Sep 9 09:17:28 2004
MD5 Checksum:5d6997b2aa8480c029449b18f139a995

 ///  File Name: airscanner.txt
Description:
Airscanner Mobile Security Advisory - Airscanner Corp. has been able to reverse engineer and post a fix for the CE.Dust virus.
Homepage:http://airscanner.com/
File Size:2473
Last Modified:Sep 21 09:41:28 2004
MD5 Checksum:bbfc491dd0e07f2c486464acd811b781

 ///  File Name: AppSecInc.Oracle.txt
Description:
AppSecInc Advisory - Multiple buffer overflow and denial of service (DoS) vulnerabilities exist in the Oracle Database Server which allow database users to take complete control over the database and optionally cause denial of service. Forty-four buffer overflows have been found. Exploitation of these vulnerabilities will allow an attacker to completely compromise the OS and the database if Oracle is running on Windows platform, because Oracle must run under the local System account or under an administrative account. If Oracle is running on *nix then only the database would be compromised because Oracle runs mostly under oracle user which has restricted permissions.
Author:Esteban Martinez Fayo, Cesar Cerrudo
Homepage:http://www.appsecinc.com/
File Size:6280
Last Modified:Sep 9 06:31:08 2004
MD5 Checksum:7c09d30119ac5d228eab0169c18d5b60

 ///  File Name: boFreeBSDroot.txt
Description:
A buffer overflow has been discovered in the trap.c syscall() function of the FreeBSD source tree. However, you need to be root to exploit this.
Author:rookie
File Size:2383
Last Modified:Sep 21 05:16:42 2004
MD5 Checksum:3b5b7af45f45cac6e50e620b4e08f447

 ///  File Name: BrocadeDoS.txt
Description:
Brocase switches can be frozen with a few specially crafted TCP packets. The IP stack becomes unresponsive and remote administration becomes impossible. This attack does not require any authentication and there is no trace in any log file. Versions affected: All Brocade fiber channel switches running pre-3.2 code including Silkworm 3800, Silkworm 3200 and Silkworm 2800.
Author:Frank Denis
File Size:2136
Last Modified:Sep 9 09:33:37 2004
MD5 Checksum:d2681304485cb00bffdfd443a6ddf27a

 ///  File Name: c030804-002.txt
Description:
Corsaire Security Advisory - There are a number of content security gateway and anti-virus products available that provide policy based security functionality. Part of this functionality allows the products to block embedded file attachments based on their specific content type, such as executables or those containing viruses. However, by using malformed MIME encapsulation techniques centered on the presence of multiple occurrences of fields, this functionality can be evaded.
Author:Martin O'Neal
Homepage:http://www.corsaire.com
File Size:5794
Related CVE(s):CAN-2003-1014
Last Modified:Sep 15 06:22:33 2004
MD5 Checksum:301e3c7a1127dbb9871b70352a342eef

 ///  File Name: c030804-005.txt
Description:
Corsaire Security Advisory - By using MIME encapsulation techniques centered on both standard and non-standard Content-Transfer-Encoding mechanisms, embedded file attachment blocking functionality can be evaded.
Author:Martin O'Neal
Homepage:http://www.corsaire.com
File Size:6014
Related CVE(s):CAN-2004-0051
Last Modified:Sep 15 06:24:25 2004
MD5 Checksum:477bfce7dfe039f95e1166ac691e2225

 ///  File Name: c030804-006.txt
Description:
Corsaire Security Advisory - By using malformed MIME encapsulation techniques centered on the presence of non-standard separators, embedded file attachment blocking functionality can be evaded.
Author:Martin O'Neal
Homepage:http://www.corsaire.com
File Size:5700
Related CVE(s):CAN-2004-0052
Last Modified:Sep 15 06:27:43 2004
MD5 Checksum:7963c2226364ac8384a72c09e74c27ba

 ///  File Name: c030804-009.txt
Description:
Corsaire Security Advisory - By using malformed MIME encapsulation techniques centered on the presence of fields containing an RFC822 comment, embedded file attachment blocking functionality can be evaded.
Author:Martin O'Neal
Homepage:http://www.corsaire.com
File Size:5841
Related CVE(s):CAN-2004-0162
Last Modified:Sep 15 06:29:19 2004
MD5 Checksum:1cda355e718e60630be49d4b01bd3d6d

 ///  File Name: caEnumeration.txt
Description:
The CA UniCenter Management Portal versions 2.0 and 3.1 allow for username validation via using the forgotten password feature.
Author:Thomas Adams
File Size:1736
Last Modified:Sep 22 00:56:19 2004
MD5 Checksum:64aafa3137e8233bcbc0dd1a5b94e372

 ///  File Name: calendar_advisory.txt
Description:
The bsdmainutils package versions below 6.0.15 allow for a local root compromise via the calendar program.
Author:Steven Van Acker
File Size:2495
Related CVE(s):CAN-2004-0793
Last Modified:Sep 2 09:14:09 2004
MD5 Checksum:c73cdff43ca25e609eeda08860bed4bc

 ///  File Name: CallOfDuty.txt
Description:
Call of Duty versions 1.4 and below use some anti-buffer-overflow checks that automatically shutdown the game if they find a too big input. The result is that a query or a reply containing over 1024 chars is able to exploit this protection causing the immediate stop of the game.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:codboom.zip"
File Size:2506
Last Modified:Sep 9 09:38:07 2004
MD5 Checksum:24a1402ea6346c79bc4b91ce068ef0c2

 ///  File Name: CAN-2004-0787.txt
Description:
A Cross Site Scripting (XSS) vulnerability was found in the OpenCA PKI software, allowing users of the system to inject malicious HTML code into the system. The malicious code may even affect offline components. Affected versions: All versions of OpenCA, including 0.9.1-8 and 0.9.2 RC6.
Author:Martin Bartosch, Michael Bell
Homepage:http://www.openca.org/
File Size:10854
Related CVE(s):CAN-2004-0787
Last Modified:Sep 10 05:37:44 2004
MD5 Checksum:ef1ba9b433a23befafb1cd81bfa34aea

 ///  File Name: canonSpam.txt
Description:
The Canon iR5000i digital printer will print anything sent to port 25 without any authentication.
Author:Andrew Daviel
File Size:760
Last Modified:Sep 30 09:34:03 2004
MD5 Checksum:b3bf792c4d0f6198e4d8e97cbbf68f52

 ///  File Name: CESA-2004-003.txt
Description:
libXpm versions below 6.8.1 suffer from multiple stack and integer overflows.
Author:Chris Evans
File Size:2737
Related CVE(s):CAN-2004-0782, CAN-2004-0783
Last Modified:Sep 17 07:58:49 2004
MD5 Checksum:aab6715e16b3b1a7e49bc762fd4978de