Section:  .. / 0403-advisories  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 90
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: secadv_20040317.txt
Description:
OpenSSL Security Advisory - A Null-pointer assignment during an SSL handshake can result in a denial of service. Versions 0.9.6c to 0.9.6k and 0.9.7a to 0.9.7c are affected by this issue. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected by another vulnerability in the handling of Kerberos ciphersuites that can cause OpenSSL to crash. Patches are attached to the advisory.
Homepage:http://www.openssl.org/news/secadv_20040317.txt
File Size:3155
Related CVE(s):CAN-2004-0079, CAN-2004-0112
Last Modified:Mar 17 15:36:13 2004
MD5 Checksum:8296433d89da39966b6d020c7aa78ebb

 ///  File Name: Adv-20040315.txt
Description:
S-Quadra Advisory #2004-03-15 - ModSecurity 1.7.4 for the Apache 2.x webserver series is vulnerable to a remote off-by-one overflow that allows for arbitrary code execution. Version 1.7.5 has been released to address this issue.
Author:Evgeny Legerov
Homepage:http://www.s-quadra.com/advisories/Adv-20040315.txt
File Size:1300
Last Modified:Mar 17 08:12:21 2004
MD5 Checksum:91757e2586898cb59083cfe8cdb023d3

 ///  File Name: crafty-adv.txt
Description:
A vulnerability exists in the Crafty game versions 19.3 and below that allows a local user to escalate privileges via a buffer overflow.
Author:Steve Kemp
Homepage:http://www.rosiello.org/
File Size:1626
Last Modified:Mar 17 08:01:38 2004
MD5 Checksum:04de1ee02537eee1d62754fc7e2301f2

 ///  File Name: soapy.txt
Description:
Multiple vendors suffer from a denial of service vulnerability in their SOAP servers. Products affected: Macromedia ColdFusion/MX 6.0 and 6.1, ColdFusion/MX 6.0 and 6.1 J2EE, all editions of Macromedia JRun 4.0, and Sun Java System Application Server 7 Update 2 Upgrade and prior releases.
Author:Amit Klein
Homepage:http://www.SanctumInc.com
File Size:1693
Last Modified:Mar 17 07:41:11 2004
MD5 Checksum:c51d9646055d66485691116fe1f72ee0

 ///  File Name: mpsb04-03.html
Description:
Macromedia Security Bulletin MPSB04-03 - Macintosh versions of the Macromedia installers and e-licensing client install a service whose file permissions allow other users to write to the file. This may allow one local user to obtain the permissions of another local user, resulting in privilege escalation.
Author:Chris Irvine
Homepage:
File Size:21034
Last Modified:Mar 16 08:21:02 2004
MD5 Checksum:a449adbbc3dc8c5e93120adf76faa059

 ///  File Name: novellweb.htm
Description:
Novell has identified an issue with the default configuration of GroupWise 6 and 6.5 WebAccess that could allow unauthorized access to the WebAccess server. This issue affects only systems running GroupWise 6 or 6.5 WebAccess on NetWare using the Apache 1.3x web server and where Apache is loaded using the GWAPACHE.CONF file.
Homepage:http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091330.htm
File Size:17080
Last Modified:Mar 16 08:18:09 2004
MD5 Checksum:99d7e8c58a751f22499bf208ee154361

 ///  File Name: 2004alert66.pdf
Description:
Oracle Security Alert 66 - Security vulnerabilities have been discovered in Oracle Application Server Web Cache 10g (9.0.4.0.0) and Oracle9i Application Server Web Cache.
Homepage:http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf
File Size:61165
Last Modified:Mar 16 08:15:37 2004
MD5 Checksum:d607cee1f646c49b77cbe78fad9f4f5e

 ///  File Name: wsftp802.txt
Description:
WS_FTP Pro versions 8.02 and below suffer from a buffer overrun when ASCII mode directory data is passed to the client from the server. If the data exceeds 260 bytes without a terminating CR/LF, the application will crash. Arbitrary code execution is possible.
Author:John Layman
File Size:1087
Last Modified:Mar 16 04:43:25 2004
MD5 Checksum:87428c4b5102ab4a9264c9a1b34b1789

 ///  File Name: hp_http.sxw.pdf
Description:
Immunity Security Advisory - The Compaq Web Management system (HP HTTP) has a bug in its validation system that allows an anonymous user to upload trusted certificates.
Author:Dave Aitel
Homepage:http://www.immunitysec.com
File Size:36578
Last Modified:Mar 16 04:40:59 2004
MD5 Checksum:c1e5ac017c6b14f2d230d2a70d36394e

 ///  File Name: awservices.sxw.pdf
Description:
Immunity Security Advisory - Remotely exploitable stack overflows exist in Computer Associates Unicenter TNG Utilities awservices.exe. Successful exploitation elevates an attacker to SYSTEM privileges. All known versions of Unicenter TNG 2.4 are affected.
Author:Dave Aitel
Homepage:http://www.immunitysec.com
File Size:30633
Last Modified:Mar 16 04:38:32 2004
MD5 Checksum:913cc2ebdb627e568775d46acb3d1b92

 ///  File Name: phpBB206a.txt
Description:
phpBB versions 2.0.6 and below suffer from a SQL injection vulnerability in the search.php file. Workaround included.
Author:pokleyzz
Homepage:http://www.scan-associates.net
Related Exploit:gemuruh-v2.php.txt
File Size:2341
Last Modified:Mar 15 20:40:12 2004
MD5 Checksum:7eba141ea384a599e9677a3788face6c

 ///  File Name: OpenPKG-SA-2004.006.txt
Description:
OpenPKG Security Advisory - UUDeview versions 0.5.19 and below suffer from buffer overflows and insecure temporary file handling.
Author:The OpenPKG Project
Homepage:http://www.openpkg.org/security.html
File Size:3777
Last Modified:Mar 13 08:31:33 2004
MD5 Checksum:84e1c8fa1dfdb48cec0b64b5098d5c62

 ///  File Name: extcompose.txt
Description:
Extcompose, a function of the metamail package, fails to properly verify a file exists prior to writing to it, and will accept symbolic links, leaving it open to being an attack vector.
Author:Shaun Colley
Homepage:http://www.nettwerked.co.uk
File Size:4857
Last Modified:Mar 13 08:27:21 2004
MD5 Checksum:e04213c055e9d94968876691fc2b2ac0

 ///  File Name: Adv-20040312.txt
Description:
S-Quadra Advisory #2004-03-12 - The Dogpatch Software CFWebstore 5.0 shopping cart is vulnerable to both SQL injection and cross site scripting attacks in the index.cfm script.
Author:Nick Gudov
Homepage:http://www.s-quadra.com/advisories/Adv-20040312.txt
File Size:2392
Last Modified:Mar 13 08:22:31 2004
MD5 Checksum:92cadde32e23bca7556fa53d8e7bedbf

 ///  File Name: MyProxy20030629.txt
Description:
Due to a lack of proper input validation, cross site scripting flaws exist in MyProxy version 20030629.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1608
Last Modified:Mar 12 02:58:15 2004
MD5 Checksum:7aff814f81d05f258777d74a195b448a

 ///  File Name: hushmail_09-03-04.txt
Description:
Various cross site scripting vulnerabilties exist in the hushmail.com site.
Author:Calum Power
File Size:1987
Last Modified:Mar 12 02:57:03 2004
MD5 Checksum:c8874effe33c599a0604170fe41131ae

 ///  File Name: CPANEL-2004:01-01.txt
Description:
cPanel Security Advisory - CPANEL-2004:01-01 - When trying to change a user password in cPanel 8.x.x, it is possible to execute commands as root. cPanel suggests that administrators disable this feature until a fixed version is released.
Author:J. Nick Koston
Homepage:http://support.cpanel.net/
File Size:2530
Last Modified:Mar 12 02:54:41 2004
MD5 Checksum:81d1cba8405419c675e67a7882076a22

 ///  File Name: battlemages-adv.txt
Description:
Battle Mages versions 1.0 for Windows is vulnerable to a denial of service server freeze. It infinitely loops when trying to read an expected data block after being sent incomplete data.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:battlemagy.zip
File Size:2091
Last Modified:Mar 12 02:42:30 2004
MD5 Checksum:7aab55efe1583b0607afaf2479cb442d

 ///  File Name: RHSA-2004:093-01.txt
Description:
Red Hat Security Advisory RHSA-2004:093-01 - Alan Cox discovered a vulnerability in the systat package where the post and trigger scripts insecurely created temporary filenames, allowing for a symlink attack using /tmp.
Homepage:https://www.redhat.com/solutions/security/news/contact.html
File Size:3953
Related CVE(s):CAN-2004-0107
Last Modified:Mar 11 17:44:38 2004
MD5 Checksum:43d951b7e20b40788c778ebd4604593e

 ///  File Name: unrealEngine.txt
Description:
The Unreal game engine for Windows, MacOS, and Linux has a format string bug that allows an attacker to remotely crash or execute malicious code on the server. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:unrfs-poc.zip
File Size:3426
Last Modified:Mar 11 02:42:34 2004
MD5 Checksum:ba1bf0b1ec64c16152ef766ad9850acc

 ///  File Name: wMCam21348.txt
Description:
wMCam server version 2.1.348 is susceptible to a denial of service attack when in excess of 300 connections are made to it each supplying a small amount of non-standard data.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1415
Last Modified:Mar 11 02:37:36 2004
MD5 Checksum:537a49857360384941b39572aee42000

 ///  File Name: outlook032004.txt
Description:
Microsoft Outlook contains a vulnerability which allows execution of arbitrary code when a victim user views a web page or an e-mail message created by an attacker. According to Microsoft the affected supported versions are Microsoft Office XP SP2 and Microsoft Outlook 2002 SP 2. Some earlier versions are vulnerable too, but not supported by the vendor.
Author:Jouko Pynn�nen
Homepage:http://iki.fi/jouko/
File Size:2618
Last Modified:Mar 11 02:35:27 2004
MD5 Checksum:a786f33a68425d0d583bd412ca29aeb1

 ///  File Name: db2rmtcmd.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR09032004 - IBM's DB2 version 8.1 Enterprise Edition on Windows has a remote command server that runs as db2admin, but can have commands executed by a guest account, allowing for privilege escalation.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/db2rmtcmd.txt
File Size:2204
Last Modified:Mar 11 02:31:20 2004
MD5 Checksum:1962d75fb94caac85d2385e494eaa814

 ///  File Name: chatanywhere.txt
Description:
Chat Anywhere versions 2.72 and below allow a remote attacker to add %00 before their nickname which keeps an administrator from being able to ban or kick the user from a room.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1806
Last Modified:Mar 11 02:28:19 2004
MD5 Checksum:3c376d39bf7b1a136620b9935f5bf543

 ///  File Name: automake183.txt
Description:
GNU automake versions below 1.8.3 insecurely create temporary directories.
Author:Stefan Nordhausen
File Size:1068
Last Modified:Mar 11 02:25:34 2004
MD5 Checksum:f9c55471d01e6d32e77da15025fdea64