SuSE Security Announcement: SuSE-SA:2002:043 (traceroute-nanog/nkitb)

2002-11-13 Thread Thomas Biege
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package:traceroute-nanog/nkitb Announcement-ID:SuSE-SA:2002:043 Date:

i386 Linux kernel DoS

2002-11-13 Thread Christophe Devine
/* USE AT YOUR OWN RISK ! */ int main( void ) { char dos[] = \x9C /* pushfd */ \x58 /* pop eax */ \x0D\x00\x01\x00\x00 /* or eax,100h */ \x50

FreeBSD Security Advisory FreeBSD-SA-02:40.kadmind

2002-11-13 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-02:40.kadmind Security Advisory The FreeBSD Project Topic: Buffer

[SECURITY] [DSA 195-1] New Apache-Perl packages fix several vulnerabilities

2002-11-13 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 195-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze November 13th, 2002

RE: A technique to mitigate cookie-stealing XSS attacks

2002-11-13 Thread Steven M. Christey
While this thread has been focused on scripting languages and cookie theft, that's not the only issue to be concerned about with XSS. Being able to place arbitrary HTML into an intermediate web page is dangerous for other reasons (this is sometimes called HTML injection, but I view it as another

Gnujsp and Domino R5.0.10

2002-11-13 Thread YM Barusseau
I've installed gnujsp on Domino R5.0.10 which runs on NT4 (with latests updates), but when I want to load a *.jsp page, the following error occurs : ERROR 404, JSP File Not Found or Internal Problem, see server log for details. So I read my server log that tells me addin: GNUJSP :

KeyFocus KF Web Server File Disclosure Vulnerability

2002-11-13 Thread [EMAIL PROTECTED]
KeyFocus Web server is a Win32 HTTP server with web administration, a variety of logging formats, such as NCSA and W3C, CGI, compression, memory caching of static documents, directory indexing, pre-defined MIME settings, internal authentication with support for multiple realms, and a variety of

Eudora 5.2 attachment spoof

2002-11-13 Thread Paul Szabo
Qualcomm Eudora 5.2 has been released recently. Quoting from http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt : Added checks to prevent spoofed Attachment Converted: exploits. ... We now guard against exploits that rely on local file refs (using either fixed paths or relative