Section:  .. / 0404-advisories  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 90
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: TA04-111B.txt
Description:
Technical Cyber Security Alert TA04-111B - There is a vulnerability in Cisco's Internetwork Operating System (IOS) SNMP service. When vulnerable Cisco routers or switches process specific SNMP requests, the system may reboot. If repeatedly exploited, this vulnerability could result in a sustained denial of service (DoS).
Homepage:http://www.cert.org/
File Size:5582
Last Modified:Apr 20 22:03:00 2004
MD5 Checksum:df16f791ed8703fbc22092e035e8b3a5

 ///  File Name: monit.txt
Description:
Monit versions 4.2 and below have two basic authentication flaws that allow for a remote denial of service and a buffer overflow that can lead to arbitrary code execution. An off-by-one vulnerability also exists with POST requests.
Author:Matt Murphy
File Size:5285
Last Modified:Apr 5 18:56:00 2004
MD5 Checksum:ff6a74dede9c4d29ff8c603e90d63dbe

 ///  File Name: phpBB208a.txt
Description:
phpBB versions 2.0.8a and below suffer from an IP spoofing vulnerability that allows a malicious user to post messages and have them be tied to forged IP addresses.
Author:Wang / SRR Project Group
File Size:5155
Last Modified:Apr 19 01:22:00 2004
MD5 Checksum:5abb1b7af8af6d6fc4fb272d4ef2f3af

 ///  File Name: waraxe-2004-SA019.txt
Description:
A critical SQL injection bug exists in Phorum version 3.4.7 that allows a remote attacker to view sensitive data. The problem code lies in userlogin.php.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
Related Exploit:Phorum347SQL.pl"
File Size:5045
Last Modified:Apr 18 11:27:00 2004
MD5 Checksum:4ae882ee3f72e33204497934edc88d09

 ///  File Name: waraxe-2004-SA016.txt
Description:
Cross site scripting bugs exist in PHP-Nuke versions 6.x through 7.2.
Author:Janek Vind
File Size:4957
Last Modified:Apr 15 10:05:59 2004
MD5 Checksum:7abc089958e4651935025d4b9f18185b

 ///  File Name: dsa-484.txt
Description:
Debian Security Advisory DSA 484-1 - Steve Kemp discovered a vulnerability in xonix, a game, where an external program was invoked while retaining setgid privileges. A local attacker could exploit this vulnerability to gain gid games.
Author:Matt Zimmerman
Homepage:http://www.debian.org/security/
File Size:4632
Related CVE(s):CAN-2004-0157
Last Modified:Apr 15 13:44:00 2004
MD5 Checksum:9693a21027f500ff242c8194b200b1d1

 ///  File Name: Director31ad.html
Description:
IBM Director 3.1 Agent for Windows is vulnerable to a remote denial of service attack when being scanned.
Author:Juanma Merino
Homepage:http://t3k.ibernet.com
File Size:4585
Last Modified:Apr 5 19:04:00 2004
MD5 Checksum:ff7d1e01c78a1e1c364b6203cf8b48fd

 ///  File Name: dsa-485.txt
Description:
Debian Security Advisory DSA 485-1 - Max Vozeler discovered two format string vulnerabilities in ssmtp, a simple mail transport agent. Untrusted values in the functions die() and log_event() were passed to printf-like functions as format strings. These vulnerabilities could potentially be exploited by a remote mail relay to gain the privileges of the ssmtp process (including potentially root).
Author:Matt Zimmerman
Homepage:http://www.debian.org/security/
File Size:4567
Related CVE(s):CAN-2004-0156
Last Modified:Apr 15 13:48:00 2004
MD5 Checksum:090d773304038d2b9d541039560b759d

 ///  File Name: GLSA20040401.txt
Description:
Gentoo Linux Security Advisory GLSA 200404-01 - A flaw has been found in the temporary file handling algorithms for the sandboxing code used within Portage. Lockfiles created during normal Portage operation of portage could be manipulated by local users resulting in the truncation of hard linked files; causing a Denial of Service attack on the system.
Homepage:http://security.gentoo.org
File Size:4435
Last Modified:Apr 6 10:10:00 2004
MD5 Checksum:dcf9a3745fd061a8f3950d93334d5314

 ///  File Name: bitdefender.txt
Description:
BitDefender's online scanning service has Active-X related flaws that allow an attacker to run arbitrary code server side.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:4400
Last Modified:Apr 19 04:44:00 2004
MD5 Checksum:93cb75f93c620475277ed02cfa6865c7

 ///  File Name: cfdos.txt
Description:
ColdFusion MX versions 6.0 and below suffer from a denial of service vulnerability when memory usage gets saturated due to an oversized string being returned as part of an error message.
Author:K. K. Mookhey
Homepage:http://www.nii.co.in/vuln/cfdos.html
File Size:4285
Last Modified:Apr 17 13:06:00 2004
MD5 Checksum:2277133d43ddfc7f423ecfe473aceec0

 ///  File Name: winampheap.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR05042004 - Due to a lack of boundary checking within the code responsible for loading Fasttracker 2 (.xm) mod media files by the Winamp media plug-in in_mod.dll, it is possible to make Winamp overwrite arbitrary heap memory and reliably cause an access violation within the ntdll.RtlAllocateHeap() function. When properly exploited this allows an attacker to write any value to a memory location of their choosing. In doing so, the attacker can gain control of Winamp's flow of execution to run arbitrary code. This code will run in the security context of the logged on user.
Author:Peter Winter-Smith
Homepage:http://www.ngssoftware.com/advisories/winampheap.txt
File Size:4137
Last Modified:Apr 5 15:12:00 2004
MD5 Checksum:5a6e44b142eb18625eed1a3655c56317

 ///  File Name: msg00000.html
Description:
XChat versions 2.0.8 through 1.8.0 are vulnerable to a boundary error condition in their SOCKS-5 proxy code. Successful exploitation can lead to a complete system compromise.
Author:tsifra
Homepage:http://www.xchat.org
File Size:4109
Last Modified:Apr 19 15:36:00 2004
MD5 Checksum:c6b5b71eaf441797332feed020106a7e

 ///  File Name: FoundstoneCitrix.txt
Description:
Foundstone Labs Advisory - Citrix MetaFrame Password Manager 2.0 has a flaw where it will locally store credentials unencrypted if the agent is not pointed to a central credential store.
Author:Vijay Akasapu, David Wong
Homepage:http://www.foundstone.com/advisories
File Size:4052
Last Modified:Apr 6 10:23:00 2004
MD5 Checksum:4620b05626368a29faee4280339fc739

 ///  File Name: lcdproc.adv2
Description:
Priv8 Security Research Advisory #2004-002 - Versions 0.4.1 and below of LCDproc are vulnerable to multiple bugs that allow for arbitrary code execution.
Author:Adriano Lima
Homepage:http://www.priv8security.com/releases/lcdproc/lcdproc.adv2
Related Exploit:priv8lcd44.pl"
File Size:3868
Last Modified:Apr 9 05:15:00 2004
MD5 Checksum:9192dd2f7bd4bcb2c2ac8a83a3dfe9e4

 ///  File Name: eEye.symantec.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a severe denial of service vulnerability in the Symantec Client Firewall products for Windows. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet. Physical access is required in order to bring an affected system out of this "frozen" state. This specific flaw exists within the component that performs low level processing of TCP packets.
Author:Karl Lynn
Homepage:http://www.eeye.com/
File Size:3854
Related CVE(s):CAN-2004-0375
Last Modified:Apr 24 08:34:00 2004
MD5 Checksum:1a8e0db404df2e472bc8537292e8ae07

 ///  File Name: KAME-IKE.txt
Description:
The KAME IKE Daemon Racoon does not verify RSA Signatures during Phase 1, allowing man-in-the-middle attacks and unauthorized connections.
Author:Ralf Spenneberg, Michal Ludvig, Hans Hacker
File Size:3830
Related CVE(s):CAN-2004-0155
Last Modified:Apr 7 18:55:00 2004
MD5 Checksum:bc0c9fadcc89f0d72fbaaedb87ac8bd2

 ///  File Name: idefense-040504.txt
Description:
Remote exploitation of a buffer overflow in the win32_stat function of ActiveState's ActivePerl may allow arbitrary commands to be executed. No check is made on the length of the string before the copy is made allowing long strings to overwrite control information and execution of arbitrary code possible.
Author:Greg MacManus
Homepage:http://www.idefense.com
File Size:3437
Related CVE(s):CAN-2004-0377
Last Modified:Apr 5 15:20:00 2004
MD5 Checksum:590ae553672985943ecb48217599daaa

 ///  File Name: dsa-488.txt
Description:
Debian Security Advisory DSA 488-1 - Christian Jaeger reported a bug in logcheck which could potentially be exploited by a local user to overwrite files with root privileges. logcheck utilized a temporary directory under /var/tmp without taking security precautions. While this directory is created when logcheck is installed, and while it exists there is no vulnerability, if at any time this directory is removed, the potential for exploitation exists.
Author:Martin Schulze
Homepage:http://www.debian.org/security/
File Size:3424
Last Modified:Apr 19 15:42:00 2004
MD5 Checksum:646926891b18f3519c31d488be2a8fd1

 ///  File Name: a042204-1.txt
Description:
Atstake Security Advisory A042204-1 - The SiteMinder Affiliate Agent plugin version 4.x is susceptible to a remotely exploitable heap overflow when the SMPROFILE cookie is passed a large value. This affect the Solaris, Windows, and HP-UX platforms.
Author:Jeremy Jethro
Homepage:http://www.atstake.com/research/advisories/2004/a042204-1.txt
File Size:3338
Related CVE(s):CAN-2004-0425
Last Modified:Apr 24 05:44:00 2004
MD5 Checksum:3e5b35e4323fe96cea4d9218a69b73c3

 ///  File Name: eEye.yahoo.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a security hole in Yahoo! Mail which allows a remote attacker to take over an account remotely by sending a specially crafted email.
Author:Drew Copley
Homepage:http://www.eeye.com/
File Size:3195
Last Modified:Apr 22 11:36:00 2004
MD5 Checksum:1f6c099136596df156de1d37e887fc3b

 ///  File Name: 04.15.04.txt
Description:
iDEFENSE Security Advisory 04.15.04: Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Universal Server could allow an attacker to restart and potentially disable the server.
Homepage:http://www.idefense.com/application/poi/display?type=vulnerabilities
File Size:3189
Related CVE(s):CAN-2004-0389
Last Modified:Apr 17 13:09:00 2004
MD5 Checksum:a6c52904a921ea898733b7cbc6af9a5a

 ///  File Name: lcdproc.adv1
Description:
Priv8 Security Research Advisory #2004-001 - All versions of LCDproc are vulnerable to a remotely exploitable buffer overflow that allows attackers to execute arbitrary code. The problem appears in function parse_all_client_messages() of parse.c file where a loop does not check if MAXARGUMENTS were reached, causing the program to crash when lots of arguments are passed to the function.
Author:Adriano Lima
Homepage:http://www.priv8security.com/releases/lcdproc/lcdproc.adv1
Related Exploit:priv8lcd44.pl"
File Size:3180
Last Modified:Apr 9 05:12:00 2004
MD5 Checksum:bf21cc34d95a3fe33ba2bdea6bf9f989

 ///  File Name: isec-0015-msfilter.txt
Description:
Linux kernel versions 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 have an integer overflow in setsockopt MCAST_MSFILTER. Proper exploitation of this vulnerability can lead to privilege escalation.
Author:Paul Starzetz, Wojciech Purczynski
Homepage:http://isec.pl/
File Size:3106
Last Modified:Apr 20 12:13:00 2004
MD5 Checksum:fe315a954750890589fd4ce37cdce068

 ///  File Name: unrealEngine2.txt
Description:
The Unreal engine developed by EpicGames has a flaw with UMOD where it handles information from files without properly filtering for dangerous characters. Using a standard directory traversal attack, an attacker is able to go outside of the game's directory to overwrite any file in the partition on which the game is installed.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:umodpoc.zip"
File Size:3059
Last Modified:Apr 22 18:02:00 2004
MD5 Checksum:c092f526fd969a6b6506cbf489792308