Section:  .. / 0401-advisories  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 63
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: networker60.txt
Description:
A plausible symlink attack exists in networker version 6.0 in the shutdown script.
Author:l0om
File Size:1169
Last Modified:Jan 19 23:55:00 2004
MD5 Checksum:b0aa295afc5af5e52ad594417b9bdc82

 ///  File Name: qmailcrash.html
Description:
Georgi Guninski security advisory #65, 2004 - Qmail version 1.03 is susceptible to a couple attacks. A crash in qmail-smtpd occurs with a long SMTP session. The crash is not global, it affects only the current SMTP session. It is also possible to trigger a segmentation violation (SEGV) from the network.
Author:Georgi Guninski
Homepage:http://www.guninski.com/qmailcrash.html
File Size:12667
Last Modified:Jan 19 08:48:00 2004
MD5 Checksum:a3dd135400b8e81de6cc816382100e93

 ///  File Name: pablo-ftp.txt
Description:
Pablo FTP server version 1.77 allows for information disclosure by detecting whether or not a file exists outside of the FTP root directory, allow a remote attack to peruse the system at will.
Author:scrap
Homepage:http://www.securiteinfo.co
File Size:2544
Last Modified:Jan 19 06:19:00 2004
MD5 Checksum:f29de99e9408ded01ce5fc1b6d811ec3

 ///  File Name: mambo.txt
Description:
The Mambo Open Source web content management system allows for remote command execution as the webserver user id due to a lack of input validation.
Author:FraMe
Homepage:http://www.kernelpanik.org
File Size:1341
Last Modified:Jan 19 01:21:00 2004
MD5 Checksum:29380f7ad13cd94fe1f84ab35ed2bd6e

 ///  File Name: SRT2004-01-17-0628.txt
Description:
Secure Network Operations Advisory SRT2004-01-17-0628 - Outpost Firewall versions 1.0 and 2.0 run with SYSTEM access, allowing a local user to escalate privileges.
Author:KF
Homepage:http://www.secnetops.com
File Size:6292
Last Modified:Jan 17 23:04:00 2004
MD5 Checksum:11506f22a93ba377d2c990ff8f4ff666

 ///  File Name: CAN-2004-0004.txt
Description:
OpenCA Security Advisory - All versions of OpenCA including 0.9.1.6 are susceptible to a signature validation flaw that will allow a signature from a certificate if the certificate's chain is trusted by the chain directory of OpenCA.
Author:Michael Bell, Alexandru Matei
Homepage:http://www.openca.org/news/CAN-2004-0004.txt
File Size:2722
Related CVE(s):CAN-2004-0004
Last Modified:Jan 17 01:04:00 2004
MD5 Checksum:b208fceedb4f2dd87f9354f0379b018c

 ///  File Name: metadot.txt
Description:
MetaDot Portal versions 5.6.5.4b5 and below are susceptible to SQL injection vulnerabilities, Cross Site Scripting, and information disclosure attacks.
Author:JeiAr
Homepage:http://www.gulftech.org
File Size:5834
Last Modified:Jan 16 10:00:00 2004
MD5 Checksum:0d4a9035bca58094ede85f10afb14eb1

 ///  File Name: isec-0013v2-mremap.txt
Description:
The mremap system call in the Linux kernel memory management code has a critical security vulnerability due to incorrect bounds checking. Proper exploitation of this vulnerability may lead to local privilege escalation including execution of arbitrary code with kernel level access. Updated version of the original release of this document.
Author:Paul Starzetz, Wojciech Purczynski
Homepage:http://isec.pl/vulnerabilities/isec-0013-mremap.txt
File Size:17065
Related CVE(s):CAN-2003-0985
Last Modified:Jan 15 23:18:00 2004
MD5 Checksum:fed40c0c67cafbea0cd615fdf1a54a29

 ///  File Name: phpdig16x.txt
Description:
PhpDig version 1.6.x allows for remote command execution in its config.php script. Anybody can inject a url in the relative_script_path variable and obtain command execution with web server privileges.
Author:FraMe
Homepage:http://www.kernelpanik.org
File Size:1641
Last Modified:Jan 15 03:14:00 2004
MD5 Checksum:4d52897a1dc5a66a5a20520eebb3e251

 ///  File Name: advisory-20040114-1.txt
Description:
KDE Security Advisory: All versions of kdepim, as distributed with KDE versions 3.1.0 through 3.1.4 inclusive, have a buffer overflow in the file information reader of VCF files.
Homepage:http://www.kde.org/
File Size:1929
Related CVE(s):CAN-2003-0988
Last Modified:Jan 14 23:55:00 2004
MD5 Checksum:f8f052ad423add962cde590bb3d901d7

 ///  File Name: nCipher08.txt
Description:
nCipher Security Advisory No. 8 - Versions 1.3.12, 1.5.18, and 1.6.18 of the payShield SPP library may return Status_OK regardless of what the real reply status should be.
Homepage:http://www.ncipher.com/
File Size:6788
Last Modified:Jan 14 20:50:00 2004
MD5 Checksum:5680a67e7808fab40faa6e9f8ea97cc2

 ///  File Name: CA-2004-01.H323.txt
Description:
CERT Advisory CA-2004-01 - A number of vulnerabilities have been discovered in various implementations of the multimedia telephony protocol H.323. Voice over Internet Protocol (VoIP) and video conferencing equipment and software can use these protocols to communicate over a variety of computer networks. Exploitation of these vulnerabilities may result in the execution of arbitrary code or cause a denial of service, which in some cases may require a system reboot.
Homepage:http://www.cert.org
File Size:17796
Last Modified:Jan 14 19:44:00 2004
MD5 Checksum:ebce7a206a2d35a143da212196fd6ed9

 ///  File Name: fishcart.txt
Description:
FishCart versions 3.0 and below suffer from an integer overflow when using PHP2 and receiving an order of a billion or more. Patch available here.
Author:Luke Campbell
File Size:3620
Last Modified:Jan 14 18:06:00 2004
MD5 Checksum:bbb24d8a1273781656d5580e6aa5770f

 ///  File Name: racoon.txt
Description:
racoon, KAME's IKE daemon, contains multiple flaws which allow for the unauthorized deletion of IPsec and ISAKMP SAs.
Author:Thomas Walpuski
File Size:4788
Last Modified:Jan 14 07:39:00 2004
MD5 Checksum:047dd6226cc82c29ac439d984e9d4be2

 ///  File Name: cisco-sa-20040113-h323.txt
Description:
Cisco Security Advisory 20040113 - Multiple Cisco products contain vulnerabilities in the processing of H.323 messages, which are typically used in Voice over Internet Protocol (VoIP) or multimedia applications. All Cisco products running IOS software, Cisco CallManager versions 3.0 through 3.3, Cisco Conference Connection (CCC), Cisco Internet Service Node (ISN), Cisco BTS 10200 Softswitch, Cisco 7905 IP Phone H.323 Software Version 1.00, and Cisco ATA 18x series products running H.323/SIP loads with versions earlier than 2.16.1 are all susceptible to attack.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
File Size:74738
Last Modified:Jan 13 19:27:00 2004
MD5 Checksum:3f930aab76ae440b9ce862cab24c1e11

 ///  File Name: _SRT2004-01-09-1022.txt
Description:
Secure Network Operations Advisory SRT2004-01-09-1022 - Symantec LiveUpdate versions 1.70.x through 1.90.x has a vulnerability that allows local users to become SYSTEM. Products affected include Norton SystemWorks 2001-2004, Norton AntiVirus (and Pro) 2001-2004, Norton Internet Security (and Pro) 2001-2004, and Symantec AntiVirus for Handhelds v3.0.
Author:KF
Homepage:http://www.secnetops.com
File Size:4283
Related CVE(s):CAN-2003-0994
Last Modified:Jan 12 16:22:00 2004
MD5 Checksum:9ffd5013b0a7cf92d93848ecca03bae2

 ///  File Name: windows.ftp.server.txt
Description:
The Windows FTP Server is a small free third party ftp server which contains a format string vulnerability in v1.6.1 and below.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net
File Size:4169
Last Modified:Jan 9 09:36:35 2004
MD5 Checksum:279f460bb70cb08f92a777935f164bc4

 ///  File Name: KpyM_advisory.txt
Description:
KpyM telnet server versions 1.05 and below for Microsoft Windows NT/2000/XP fail to properly clean up when disconnecting users, allowing for a remote attacker to commit a denial of service attack.
Author:NoRpiUs
Homepage:http://norpius.altervista.org
File Size:1995
Last Modified:Jan 8 19:45:48 2004
MD5 Checksum:db7d4233952586e4397371701d0b607f

 ///  File Name: DSA-418-1
Description:
Debian Security Advisory DSA 418-1 - A bug was discovered in vbox3, a voice response system for isdn4linux, whereby root privileges were not properly relinquished before executing a user-supplied tcl script.
Author:exploiting this vulnerability, a local user could gain root privileges. Homepage: http://www.debian.org/security/.
File Size:4449
Related CVE(s):CAN-2004-0015
Last Modified:Jan 8 19:41:44 2004
MD5 Checksum:f222bb17f1bd775ec81829d8eb0912e1

 ///  File Name: cisco-sa-20040108-pa.txt
Description:
Cisco Security Advisory 20040108 - The Cisco Personal Assistant may permit unauthorized access to user configurations via the web interface. Once basic access is granted, normally disallowed user preferences and configurations can be manipulated.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040108-pa.shtml
File Size:7902
Last Modified:Jan 8 19:38:51 2004
MD5 Checksum:8d70fd37409828ec876b8b14c0a4b30b

 ///  File Name: yahooIM.txt
Description:
Yahoo Instant Messenger versions 5.6.0.1351 and below are susceptible to a buffer overflow when an attacker sends a specially crafted long filename to a user and that user attempts to download the file.
Author:Tri Huynh from SentryUnion
File Size:3910
Last Modified:Jan 8 19:31:04 2004
MD5 Checksum:4d70a9c8b0985d1d304a04938f269f4e

 ///  File Name: inn240.txt
Description:
A buffer overflow has been discovered in a portion of the control message handling code introduced in INN 2.4.0. It is likely that this overflow could be remotely exploited to gain access to the user innd runs as. INN versions 2.3.x and below are not affected.
Author:Russ Allbery, Katsuhiro Kondou
File Size:2579
Last Modified:Jan 8 19:26:58 2004
MD5 Checksum:7bac448a8e55a3bbb570c6ddd4b0d831

 ///  File Name: sa10561.txt
Description:
Secunia Security Advisory SA10561 - FSP Suite 2.x has two vulnerabilities. One allows malicious attackers to gain system access and view files outside of the web root. Another is an unspecified boundary error that can be exploited to cause a buffer overflow with the possibility of arbitrary code execution.
Homepage:http://www.secunia.com/advisories/10561/
File Size:1904
Last Modified:Jan 8 06:22:29 2004
MD5 Checksum:fab71eb8e2bce70767ef721a1a960f67

 ///  File Name: sa10544.txt
Description:
Secunia Security Advisory SA10544 - A vulnerability has been identified in mpg321, allowing malicious people to execute arbitrary code. The problem is that certain strings in mp3 files are not properly verified before being used in a printf() function call. This could potentially be exploited to execute arbitrary code through malicious mp3 files and HTTP streams.
Homepage:http://www.secunia.com/advisories/10544/
File Size:1540
Last Modified:Jan 8 06:19:00 2004
MD5 Checksum:a27f5ace2541f0fd5c28b4418fe688a1

 ///  File Name: postcal.txt
Description:
PostCalendar version 4.0.0 is susceptible to SQL injection attacks via its search functionality.
Author:Klavs Klavsen
File Size:1757
Last Modified:Jan 8 06:10:35 2004
MD5 Checksum:14f08c26adbdb194818d7625eca4adc9