Section:  .. / 0405-advisories  /

Page 3 of 5
<< 1 2 3 4 5 >> Files 50 - 75 of 105
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: solaris-smc-advisory.txt
Description:
Directory traversal attacks on the Sun Solaris SMC Web Server under releases 8 and 9 allow a remote attacker to determine whether or not a file exists on the underlying filesystem due to differences in error messages.
Author:Jon Hart
Homepage:http://www.spoofed.org/
File Size:3298
Last Modified:May 14 18:04:17 2004
MD5 Checksum:7b79ff96ee995dcdd9fb617dd3c4e1f5

 ///  File Name: enpa-sa-00014.html
Description:
Ethereal Security Advisory Enpa-sa-00014 - It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire, by convincing someone to read a malformed packet trace file, or by creating a malformed color filter file. Versions affected: 0.9.8 up to and including 0.10.3.
Homepage:http://www.ethereal.com
File Size:4784
Last Modified:May 14 17:46:12 2004
MD5 Checksum:8ab2a305da29ab6d24099badba3cc475

 ///  File Name: icecast.txt
Description:
A vulnerability exists in Icecast 2.x that can cause a denial of service condition.
Author:ned
File Size:1782
Last Modified:May 14 01:23:06 2004
MD5 Checksum:315dd4a7b1126cb8be23ffe6c83a6d9e

 ///  File Name: outpost.txt
Description:
Outpost Pro Firewall has a flaw that allows malicious people to cause a Denial of Service. The issue has been reported in Agnitum Outpost Pro Firewall version 2.1. Prior versions may also be affected.
Author:Armin Pelkmann
File Size:1693
Last Modified:May 14 01:21:44 2004
MD5 Checksum:7dd17a71642694ba7857cd6cabec5c07

 ///  File Name: sweexwap.txt
Description:
Sweex Wireless Broadband Routers have tftp enabled by default with no way to restrict the service, allowing malicious attackers to download configuration files.
Author:Mark Janssen
File Size:1837
Last Modified:May 14 01:19:00 2004
MD5 Checksum:9102e515c85e722dbadd00db7d74635f

 ///  File Name: chmexec.txt
Description:
A weakness in the way Microsoft IE fails to handle double backslashes in Showhelp() allows for yet another way to locally execute files.
Author:Roozbeh Afrasiabi
File Size:3910
Last Modified:May 14 00:34:29 2004
MD5 Checksum:037ca7cbdada3756ae1948779424bcc0

 ///  File Name: sa11604.txt
Description:
Mark Cox has reported a vulnerability in ZoneMinder, potentially allowing malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the handling of query strings. This can be exploited to cause a buffer overflow via a specially crafted query. Successful exploitation may potentially allow execution of arbitrary code. All versions prior to 1.19.2 are affected.
Homepage:http://www.zoneminder.com/fileadmin/downloads/README-1.19.3.html
File Size:1786
Related CVE(s):CAN-2004-0227
Last Modified:May 13 23:31:30 2004
MD5 Checksum:5eb0cfeebc83f62ed40375deed5457f5

 ///  File Name: 05.12.04.txt
Description:
iDEFENSE Security Advisory 05.12.04: Exploitation of an input validation vulnerability within Opera Software ASA.'s Opera Web Browser could allow remote attackers to create or truncate arbitrary files. The problem specifically exists within the telnet URI handler. Opera does not check for '-' at the beginning of hostname passed through the handler, which lets options pass to the telnet program, allowing file creation or overwriting.
Author:Karol Wiesek, Greg MacManus
Homepage:http://www.idefense.com/
File Size:4238
Last Modified:May 13 21:58:51 2004
MD5 Checksum:23806cfad7c62fa62b97951faae8296c

 ///  File Name: sa11532.txt
Description:
Secunia Advisory SA11532 - Secunia has discovered a vulnerability in the Opera browser, which can be exploited by malicious people to fake (spoof) information displayed in the address bar. The vulnerability has been confirmed in version 7.23 for Windows and Linux. Prior versions may also be affected.
Author:Jakob Balle
Homepage:http://secunia.com/secunia_research/2004-2/advisory/
File Size:2008
Last Modified:May 13 21:52:29 2004
MD5 Checksum:e1d02241499399bc0dffa07448f5451a

 ///  File Name: eEye.symantecNBNS2.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a critical remote vulnerability within the Symantec firewall product line. There is a remote heap corruption vulnerability in SYMDNS.SYS, a driver that validates NetBIOS Name Service responses, which can lead to execution of arbitrary code for various Symantec products. Successful exploitation of this flaw yields remote kernel access to the system. Systems Affected: Symantec Norton Internet Security 2002/2003/2004, Symantec Norton Internet Security Professional 2002/2003/2004, Symantec Norton Personal Firewall 2002/2003/2004, Symantec Client Firewall 5.01/5.1.1, Symantec Client Security 1.0/1.1/2.0(SCF 7.1), and Symantec Norton AntiSpam 2004.
Author:Karl Lynn
Homepage:http://www.eeye.com
Related File:eEye.symantecNBNS1.txt
File Size:5322
Last Modified:May 13 21:35:26 2004
MD5 Checksum:5eb4ad8ec8faad0f8566c38c96c95408

 ///  File Name: eEye.symantecNBNS1.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in the Symantec firewall product line that would allow a remote, anonymous attacker to execute arbitrary code on a system running an affected version of the product. By sending a single specially-crafted NetBIOS Name Service (UDP port 137) packet to a vulnerable host, an attacker could cause an arbitrary memory location to be overwritten with data he or she controls, leading to the execution of attacker-supplied code with kernel privileges and the absolute compromise of the target. Systems Affected: Symantec Norton Internet Security 2002/2003/2004, Symantec Norton Internet Security Professional 2002/2003/2004, Symantec Norton Personal Firewall 2002/2003/2004, Symantec Client Firewall 5.01/5.1.1, Symantec Client Security 1.0/1.1/2.0(SCF 7.1), and Symantec Norton AntiSpam 2004.
Author:Derek Soeder
Homepage:http://www.eeye.com
Related File:eEye.symantecNBNS2.txt
File Size:8098
Last Modified:May 13 21:33:57 2004
MD5 Checksum:a69de10416e0a340595d1431671a5b59

 ///  File Name: eEye.symantecDNS2.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a second vulnerability in the Symantec firewall product line that can be remotely exploited to cause a severe denial-of-service condition on systems running a default installation of an affected version of the product. By sending a single malicious DNS (UDP port 53) response packet to a vulnerable host, an attacker can cause the Symantec DNS response validation code to enter an infinite loop within the kernel, amounting to a system freeze that requires the machine to be physically rebooted in order to restore operation. Systems Affected: Symantec Norton Internet Security 2002/2003/2004, Symantec Norton Internet Security Professional 2002/2003/2004, Symantec Norton Personal Firewall 2002/2003/2004, Symantec Client Firewall 5.01/5.1.1, Symantec Client Security 1.0/1.1/2.0(SCF 7.1), and Symantec Norton AntiSpam 2004.
Author:Barnaby Jack, Karl Lynn, Derek Soeder
Homepage:http://www.eeye.com
Related File:eEye.symantecDNS1.txt
File Size:4536
Last Modified:May 13 21:31:10 2004
MD5 Checksum:c6d369f84c7a3b1f5a708237adaeb655

 ///  File Name: eEye.symantecDNS1.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a critical remote vulnerability within the Symantec firewall product line. A buffer overflow exists within a core driver component that handles the processing of DNS (Domain Name Service) requests and responses. By sending a DNS Resource Record with an overly long canonical name, a traditional stack-based buffer overflow is triggered. Successful exploitation of this flaw yields remote KERNEL access to the system. With the ability to freely execute code at the Ring 0 privilege level, there are literally no boundaries for an attacker. It should also be noted, that due to a separate design flaw in the firewalls handling of incoming packets, this attack can be successfully performed with all ports filtered, and all intrusion rules set. Systems Affected: Symantec Norton Internet Security 2002/2003/2004, Symantec Norton Internet Security Professional 2002/2003/2004, Symantec Norton Personal Firewall 2002/2003/2004, Symantec Client Firewall 5.01/5.1.1, Symantec Client Security 1.0/1.1/2.0(SCF 7.1), and Symantec Norton AntiSpam 2004.
Author:Barnaby Jack, Karl Lynn
Homepage:http://www.eeye.com
Related File:eEye.symantecDNS2.txt
File Size:4470
Last Modified:May 13 21:28:49 2004
MD5 Checksum:8295edc7eefa9f06f7e60fb8bec3d918

 ///  File Name: EXPL-A-2003-027.txt
Description:
Exploitlabs.com Advisory 27 - Microsoft Windows Help and Support Center has a vulnerability due to an unspecified input validation error. This can be exploited via the HCP protocol on Microsoft Windows XP and Microsoft Windows 2003 through Internet Explorer or Outlook and allows for arbitrary code execution.
Author:Donnie Werner
Homepage:http://exploitlabs.com
File Size:3622
Last Modified:May 12 22:30:50 2004
MD5 Checksum:69d0842c5d6c23ea20c9d1091c103d08

 ///  File Name: outlook2k3.txt
Description:
Outlook 2003 has a flaw that will allow malicious spammers to verify whether or not a recipient has read an email.
Author:http-equiv
Homepage:http://www.malware.com/
File Size:1677
Last Modified:May 12 22:10:14 2004
MD5 Checksum:ec1578a8e7a78f2568956d0d1825a58f

 ///  File Name: 042004.txt
Description:
Privilege escalation is possible for users with access to the systrace device on Net-BSD and Free-BSD.
Author:Stefan Esser
Homepage:http://www.e-matters.de
File Size:5316
Last Modified:May 12 08:33:27 2004
MD5 Checksum:49fa1fca88a85d53ede2e382323be478

 ///  File Name: msxml3dll.txt
Description:
The msxml3.dll crashes when a page is refreshed that has an ampersand included inside of a link or value.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com/
File Size:565
Last Modified:May 12 08:27:15 2004
MD5 Checksum:cf8024a13ad78e9a62cd99bb80c7ab35

 ///  File Name: 2425ouch.txt
Description:
The usage of the SCTP implementation in all versions prior to 2.4.26 of the Linux kernel are susceptible to an integer overflow.
Author:shaun2k2
File Size:8272
Last Modified:May 12 08:04:05 2004
MD5 Checksum:c881d6cde8786e43e23bca98e79c8868

 ///  File Name: sa11590.txt
Description:
Unavailable.
File Size:2785
Last Modified:May 12 07:43:07 2004
MD5 Checksum:6efe94c50541f6f691e1db88c8908a4d

 ///  File Name: phpshop_29-04-04.txt
Description:
phpShop versions 0.7.1 and below have a flaw where it is possible for an attacker to execute arbitrary code as the server.
Author:Calum Power
File Size:2330
Last Modified:May 11 06:40:58 2004
MD5 Checksum:8133d93ec81c68a6dcb324f7ed7013a6

 ///  File Name: hatsquad.txt
Description:
Hat-Squad Advisory - A remote heap overflow has been discovered in MailEnable Professional Edition versions 1.5 to 1.7. Sending an HTTP request with more than 4045 bytes to MEHTTPS service will cause a heap buffer overflow while logging is enabled. It is possible for a remote attacker to execute code as SYSTEM.
Author:Behrang Fouladi
Homepage:http://www.hat-squad.com/en/000071.html
File Size:1450
Last Modified:May 11 06:22:54 2004
MD5 Checksum:e8cbedf18c0432171619a7f7f9c9f925

 ///  File Name: 1242.html
Description:
A potential local denial of service vulnerability has been discovered in the 2.6 Linux kernel.
Author:Stas Sergeev
File Size:5245
Last Modified:May 11 06:09:56 2004
MD5 Checksum:9ceb1ef13395b37199d6235418a5bc0d

 ///  File Name: sa11567.txt
Description:
SmOk3 has reported a vulnerability in e107 version 0.x, which can be exploited to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/11567/
File Size:1880
Last Modified:May 9 21:52:05 2004
MD5 Checksum:eeed8627e5844582baaf7f9690bb9d15

 ///  File Name: 57555.html
Description:
A vulnerability in the Java Runtime Environment may allow a remote unprivileged user to cause the Java Virtual Machine to become unresponsive resulting in a Denial of Service (DoS) condition for the runtime environment and servers that run on the runtime environment. Affected versions are Sun Java JRE 1.4.x and Sun Java SDK 1.4.x. Unaffected versions are 1.4.2_04 or later.
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57555
File Size:4725
Last Modified:May 9 21:50:22 2004
MD5 Checksum:42981e16840d5ca77ca9020d0c0ded7a

 ///  File Name: efFingerD.txt
Description:
A buffer overflow has been identified in efFingerD version 0.2.12.
Author:Dr Insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:2143
Last Modified:May 9 21:18:12 2004
MD5 Checksum:ae9c4ad933b2c7d88a1ce442f5d61cae