Users login

Create an account »


Users login

Home » Security Advisories

Security Advisories

Here you'll find the latest security advisories from various Vendors.
Page: 12... 896 897 898 899 900 901 902 903 out of 903

Catopen() security risk for third party code | SA-00:53 | September 27, 2000
The catopen() function did not correctly bounds-check an internal buffer which could be indirectly overflowed by the setting of an environment variable. A privileged application which uses catopen()

PalmOS password retrieval vulnerability | A092600-1 | September 26, 2000
It is possible to obtain an encoded form of the password, determine the actual password due to a weak, reversable encoding scheme, and access a users private data. In order for this attack to be succe

NTLM Replaying via Windows 2000 Telnet Client | A091400-1 | September 14, 2000
The telnet client in Windows 2000 may be launched via e-mail or web browsing, causing undesirable outbound authentication over the Internet to an untrusted third party. This can lead to compromised p

Mailman port allows local root compromise | SA-00:51 | September 13, 2000
The mailman port is not installed by default, nor is it "part of FreeBSD" as such: it is part of the FreeBSD ports collection, which contains over 3800 third-party applications in a ready-to-install

Listmanager local root compromise | SA-00:50 | September 13, 2000
The listmanager port, versions prior to 2.105.1, contained several locally exploitable buffer overflow vulnerabilities which could be used to gain root privileges.

Eject exploitable buffers | SA-00:49 | September 13, 2000
The eject program is installed setuid root, and contains several exploitable buffers which can be overflowed by local users, yielding root privileges.

Xchat port inappropriately handles URLs | SA-00:48 | September 13, 2000
This was handled incorrectly in versions prior to 1.4.3, and prior to 1.5.7 in the 1.5 development series, and allowed a malicious IRC user to embed command strings in a URL which could cause an arbi

Pine4 denial of service | SA-00:47 | September 13, 2000
The pine4 port, versions 4.21 and before, contained a bug which would cause the program to crash when processing a folder which contains an email message with a malformed X-Keywords header. The messag

Screen local root compromise | SA-00:46 | September 13, 2000
The screen port, versions 3.9.5 and before, contains a vulnerability which allows local users to gain root privileges.This is accomplished by inserting string-formatting operators into configuration

SiteMinder Access Control Bypass | A091100-1 | September 11, 2000
Due to an error in SiteMinder's URL parsing, it is possible for an attacker to bypass the authentication phase and view protected web pages directly.

Multiple Vulnerabilities in iCal 2.1 | a100900 | September 10, 2000
iPlanet's iCal, a multiplatform calendaring server, introduces a number of vulnerabilities to the system in which it is installed on. These vulnerabilities, ranging from poor file permissions to ins

DocumentDirect buffer overflow flaw | A090800-1 | September 08, 2000
There are several different buffer overflow conditions in the DocumentDirect for the Internet web application that could result in the execution of arbitrary code, or at the very least, a denial of

Windows priviledge escalation vulnerability | A090700-1 | September 07, 2000
The Still Image Service contains programming errors that uncover a class of attacks on services. This vulnerability allows unauthorized local privilege elevation.

SuSE Apache directory listings vuln | A090700-3 | September 07, 2000
The Apache web server as installed by SuSE 6.4 has WebDAV "turned on". By making a request to the web server similar to the following it is possible to gain what amounts to a directory listing.

Esound port allows file permissions to be modified | SA-00:45 | August 31, 2000
A race condition exists in the creation of this socket which allows a local attacker to cause an arbitrary file or directory owned by the user running esound to become world-writable. This can give th

Xlockmore reading of password file vuln | SA-00:44 | August 28, 2000
The xlockmore port, versions 4.17 and below, installs the setuid root binary xlock, which contains a vulnerability due to incorrect use of the syslog() function.

Brouted port gid kmem compromise | SA-00:43 | August 28, 2000
The brouted port is incorrectly installed setgid kmem, and contains several exploitable buffer overflows in command-line arguments. An attacker exploiting these to gain kmem privilege can easily upgr

Linux binary compatability mode system compromise | SA-00:42 | August 28, 2000
The linux binary-compatability module implements a "shadow" filesystem hierarchy rooted in /compat/linux, which is overlayed against the regular filesystem hierarchy so that Linux binaries "see" files

Malformed ELF images cause system hang | SA-00:41 | August 28, 2000
The ELF image activator did not perform sufficient sanity checks on the ELF image header, and when confronted with an invalid or truncated header it suffered a sign overflow bug which caused the CPU

Mopd port remote root compromise | SA-00:40 | August 28, 2000
The mopd port contains several remotely exploitable vulnerabilities. An attacker exploiting these can execute arbitrary code on the local machine as root.

Netscape client-side exploit | SA-00:39 | August 28, 2000
A client-side exploit may be possible through a buffer overflow in JPEG-handling code. Although an exploit is not known, attackers may be able to execute arbitrary code on the local machine as the us

Zope port remote modification of DTML | SA-00:38 | August 14, 2000
The issue involves an inadequately protected method in one of the base classes in the DocumentTemplate package that could allow the contents of DTMLDocuments or DTMLMethods to be changed remotely or

Cvsweb increased access to CVS committers | SA-00:37 | August 14, 2000
The cvsweb port, versions prior to 1.86, contains a vulnerability which allows users with commit access to a CVS repository monitored by cvsweb to execute arbitrary code as the user running the cvswe

Ntop port allows remote and minor local compromise | SA-00:36 | August 14, 2000
The ntop software is written in a very insecure style, with many potentially exploitable buffer overflows (including several demonstrated ones) which could in certain conditions allow the local or r

Proftpd port contains remote root compromise | SA-00:35 | August 14, 2000
The proftpd port, versions prior to 1.2.0rc2, contains a vulnerability which allows FTP users, both anonymous FTP users and those with a valid account, to execute arbitrary code as root on the local

Page: 12... 896 897 898 899 900 901 902 903 out of 903

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »