exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 59 RSS Feed

Files Date: 2005-10-12 to 2005-10-13

KDE Security Advisory 2005-10-11.1
Posted Oct 12, 2005
Authored by KDE Desktop | Site kde.org

KDE Security Advisory: Chris Evans reported a heap based buffer overflow in the RTF importer of KWord. Opening specially crafted RTF files in KWord can cause execution of arbitrary code. Affected are all KOffice releases starting from KOffice 1.2.0 up to and including KOffice 1.4.1.

tags | advisory, overflow, arbitrary
advisories | CVE-2005-2971
SHA-256 | d4ff9986f62282d33972361b743f867876d6b8bc485e2d9d18a63c4368ccba80
secadv_20051011.txt
Posted Oct 12, 2005
Site openssl.org

OpenSSL Security Advisory - A vulnerability has been found in all previously released versions of OpenSSL (all versions up to 0.9.7h and 0.9.8a). Versions 0.9.7h and 0.9.8a have been released to address the issue. The vulnerability potentially affects applications that use the SSL/TLS server implementation provided by OpenSSL. Such applications are affected if they use the option SSL_OP_MSIE_SSLV2_RSA_PADDING. This option is implied by use of SSL_OP_ALL, which is intended to work around various bugs in third-party software that might prevent interoperability. The SSL_OP_MSIE_SSLV2_RSA_PADDING option disables a verification step in the SSL 2.0 server supposed to prevent active protocol-version rollback attacks. With this verification step disabled, an attacker acting as a man in the middle can force a client and a server to negotiate the SSL 2.0 protocol even if these parties both support SSL 3.0 or TLS 1.0. The SSL 2.0 protocol is known to have severe cryptographic weaknesses and is supported as a fallback only.

tags | advisory, protocol
advisories | CVE-2005-2969
SHA-256 | 404241b8881908198a4c829d5f0e188071576eb55202a16a4e91becf1f9fed6b
secunia-winrar.txt
Posted Oct 12, 2005
Site secunia.com

Secunia Research has discovered two vulnerabilities in WinRAR, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | f80aca9ebb6b20dbbba325eb32ba1624a50cc34599b4f12202258c524fb59f20
codeconCFP.txt
Posted Oct 12, 2005
Site codecon.org

CodeCon 2006 Call For Papers - CodeCon is the premier showcase of cutting edge software development. It is an excellent opportunity for programmers to demonstrate their work and keep abreast of what's going on in their community. All presentations must include working demonstrations, ideally accompanied by source code. Presentations must be done by one of the active developers of the code in question. We emphasize that demonstrations be of working code.

tags | paper, conference
SHA-256 | b53ae6dd5a2f38b6c5e31d653c7ad0004b0647f4ab596e68cdfd2c41930195b3
Secunia Security Advisory 17114
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
SHA-256 | e6c3f0dfe2a49692f1252efcbc72fa5216ca4a6d0e004521c12cd6a5bcc9a0ad
Secunia Security Advisory 17132
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, slackware
SHA-256 | d23d93cde0281813e29a2813b38a72944c9565cc552bc850177dace9a69fc199
Secunia Security Advisory 17135
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SGI has issued a patch for SGI Advanced Linux Environment. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, or by malicious people to cause a DoS (Denial of Service), overwrite arbitrary files on a user's system, gain knowledge of various information, or compromise a vulnerable system.

tags | advisory, denial of service, arbitrary, local, vulnerability
systems | linux
SHA-256 | 842ec872d658610a32308a56e5582f67c8074fb2b7b6573e0e210cd0faca000c
Secunia Security Advisory 17149
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, ubuntu
SHA-256 | 2011b5b6f771cb301abec53c3735905a5c91c87b93df6477516b0a53a4112eba
Secunia Security Advisory 17165
Posted Oct 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users, or by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows
SHA-256 | 95e39846cfe80f6ffb459ef9b833c2db0920eba0b56d1d16f58635b7b9bce77f
Mandriva Linux Security Advisory 2005.181
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Squid 2.5.9, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).

tags | advisory, denial of service
systems | linux, mandriva
SHA-256 | 06d0d47bfa360a14185cf60283a9713fa8bf5c27d443c35ba004e0fb4381c8eb
Mandriva Linux Security Advisory 2005.180
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - When playing an Audio CD, a xine-lib based media application contacts a CDDB server to retrieve metadata like the title and artist's name. During processing of this data, a response from the server, which is located in memory on the stack, is passed to the fprintf() function as a format string. An attacker can set up a malicious CDDB server and trick the client into using this server instead of the pre- configured one. Alternatively, any user and therefore the attacker can modify entries in the official CDDB server. Using this format string vulnerability, attacker-chosen data can be written to an attacker-chosen memory location. This allows the attacker to alter the control flow and to execute malicious code with the permissions of the user running the application.

tags | advisory
systems | linux, mandriva
SHA-256 | aa30859c0d6a7f47a28e0c687d6bf26f4f312e6ce94df28dde0c1458613a57d0
Mandriva Linux Security Advisory 2005.179
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - Yutaka Oiwa discovered vulnerability potentially affects applications that use the SSL/TLS server implementation provided by OpenSSL.

tags | advisory
systems | linux, mandriva
advisories | CVE-2005-2946, CVE-2005-2969
SHA-256 | f162a1718a04d64fcdcfa881284798e3240afdc4b36bb8ef9e86a3efbf61ed0e
Mandriva Linux Security Advisory 2005.178
Posted Oct 12, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Update Advisory - A cross-site scripting (XSS) vulnerability in add.php in Address Add Plugin 1.9 and 2.0 for Squirrelmail allows remote attackers to inject arbitrary web script or HTML via the IMG tag.

tags | advisory, remote, web, arbitrary, php, xss
systems | linux, mandriva
SHA-256 | bed652ce606c76c741ba4a9bb11163f7491d679ec4eea0946f730779d582b5df
Debian Linux Security Advisory 863-1
Posted Oct 12, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 863-1 - Ulf H

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-2967
SHA-256 | b1ad65f196c67248f05051039cbfc234fb62f3ac511ca058fc2ecb970d252965
MallocMaleficarum.txt
Posted Oct 12, 2005
Authored by Phantasmal Phantasmagoria

In late 2001, "Vudo Malloc Tricks" and "Once Upon A free()" defined the exploitation of overflowed dynamic memory chunks on Linux. In late 2004, a series of patches to GNU libc malloc implemented over a dozen mandatory integrity assertions, effectively rendering the existing techniques obsolete. The Malloc Maleficarum discusses the next generation of possible glibc malloc exploitation techniques.

tags | paper, overflow
systems | linux
SHA-256 | 6fd158952a4729defcf005345c61b2ff4749754a2ca9498169830f450fd5e14b
Debian Linux Security Advisory 862-1
Posted Oct 12, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 862-1 - Yutaka Oiwa discovered a bug in Ruby, the interpreter for the object-oriented scripting language, that can cause illegal program code to bypass the safe level and taint flag protections check and be executed.

tags | advisory, ruby
systems | linux, debian
advisories | CVE-2005-2337
SHA-256 | 7c7cf1c16c4b6ebeb2b02b742f56e1015994c3dfb16e5aec809e8a8ed7ef0001
Debian Linux Security Advisory 861-1
Posted Oct 12, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 861-1 - "infamous41md" discovered a buffer overflow in uw-imap, the University of Washington's IMAP Server that allows attackers to execute arbitrary code.

tags | advisory, overflow, arbitrary, imap
systems | linux, debian
advisories | CVE-2005-2933
SHA-256 | 9f1a78ed94755a0e6632c0829fd9d102c90d4f788cca45b96144c091d67f5bde
Gentoo Linux Security Advisory 200510-10
Posted Oct 12, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200510-10 - Improper bounds checking of user supplied data while parsing IMAP mailbox names can lead to overflowing the stack buffer. Versions less than 2004g are affected.

tags | advisory, overflow, imap
systems | linux, gentoo
advisories | CVE-2005-2933
SHA-256 | 9b1ba780913037de5c09124203b6e9dcc8b722db6ebdc1d6d58249f30adc849d
VAstacksmash.txt
Posted Oct 12, 2005
Authored by Micheal Turner, prdelka | Site prdelka.blackart.org.uk

The Linux kernel recently incorporated a protection which randomizes the stack making exploitation of stack based overflows more difficult. This paper presents an attack which works on exploiting static addresses in Linux. You should be familiar with standard stack smashing before attempting this paper.

tags | paper, overflow, kernel
systems | linux
SHA-256 | 1b5fae8f77b5a710bc423947e91f436ec3c4ef4738ad4ac0a447048bfd559048
EEYEB-20050510.txt
Posted Oct 12, 2005
Authored by eEye | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in the Windows Media Player 9 AVI movie DirectX component that allows memory at an arbitrary address to be modified when a specially crafted AVI file is played. Exploitation of this vulnerability can allow the execution of attacker-supplied code on a victim's system with the privileges of the user who attempted to open the movie file. This vulnerability has been identified in a component of DirectX.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2005-2128
SHA-256 | a87f037c194fc9f1bd764ccbf3d7b854412d07eb18190c6a967d1ebfe483a8ab
EEYEB-20050915.txt
Posted Oct 12, 2005
Authored by eEye | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in the way a Microsoft Design Tools COM object allocates and uses heap memory. An attacker could design a web page or HTML document that exploits the vulnerability in order to execute arbitrary code on the system of a user who views it.

tags | advisory, web, arbitrary
advisories | CVE-2005-2127
SHA-256 | b4712c870bdcac60468002316153f70a792b81b9fe6c673800af6b3c5d03b1bd
EEYEB-20050803.txt
Posted Oct 12, 2005
Authored by eEye | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in the Windows Plug and Play Service that would allow an unprivileged user to execute arbitrary code with SYSTEM privileges on a remote Windows 2000 or XP SP1 system. On Windows XP SP2, this vulnerability could be exploited by an unprivileged user to gain full privileges on a system to which he is logged in interactively.

tags | advisory, remote, arbitrary
systems | windows
SHA-256 | 846bcdcac256df0db0e4e7c5c0a2e07e6e237430fc7f1965fc0222d7ee188ed3
EEYEB-20050708.txt
Posted Oct 12, 2005
Authored by eEye | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in the Microsoft Distributed Transaction Coordinator (MSDTC) service that would allow an anonymous attacker to take complete control over an affected system. MSDTC listens on TCP port 3372 and a dynamic high TCP port, and is enabled by default on all Windows 2000 systems.

tags | advisory, tcp
systems | windows
advisories | CVE-2005-2128
SHA-256 | 337058a7bf5cc5f2e313c072c885bd813f962b1a071b4babbe28a29cef9196a1
Ubuntu Security Notice 201-1
Posted Oct 12, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-201-1 - Several Cross Site Scripting vulnerabilities were discovered in SqWebmail. A remote attacker could exploit this to execute arbitrary JavaScript or other active HTML embeddable content in the web browser of an SqWebmail user by sending specially crafted emails to him.

tags | advisory, remote, web, arbitrary, javascript, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2005-2724, CVE-2005-2769, CVE-2005-2820
SHA-256 | 77f385a07aab0f26683455daa55f4dceae7dee8e270e80256706eace3763bca8
Ubuntu Security Notice 200-1
Posted Oct 12, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-200-1 - Multiple vulnerabilities exist in the mozilla-thunderbird package. A buffer overflow was discovered in the XBM image handler. By tricking an user into opening a specially crafted XBM image, an attacker could exploit this to execute arbitrary code with the user's privileges. Mats Palmgren discovered a buffer overflow in the Unicode string parser. Unicode strings that contained zero-width non-joiner characters caused a browser crash, which could possibly even exploited to execute arbitrary code with the user's privileges. Georgi Guninski reported an integer overflow in the JavaScript engine. This could be exploited to run arbitrary code under some conditions. Peter Zelezny discovered that URLs which are passed to Thunderbird on the command line are not correctly protected against interpretation by the shell. If Thunderbird is configured as the default handler for mailto: URLs, this could be exploited to execute arbitrary code with user privileges by tricking the user into clicking on a specially crafted URL (for example, in an email or chat client).

tags | advisory, overflow, arbitrary, shell, javascript, vulnerability
systems | linux, ubuntu
advisories | CVE-2005-2701, CVE-2005-2702, CVE-2005-2703, CVE-2005-2704, CVE-2005-2705, CVE-2005-2706, CVE-2005-2707, CVE-2005-2968
SHA-256 | afa1ecc22b6f13f656a48b0ca5d2d03a81c06c0f0835b22b94a65484ef17d759
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close