Re: Microsoft opening its source to selected parties

2001-03-13 Thread Matthew S. Hamrick
-BEGIN PGP SIGNED MESSAGE- Dan, While I agree with you, it will be interesting to see if this increases or decreases the number of security-related bug reports on windows tools / applications / operating systems, I'm not sure I really agree with the ... who was it... Meta Group?

FreeBSD Security Advisory FreeBSD-SA-01:29.rwhod

2001-03-13 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-01:29 Security Advisory FreeBSD, Inc. Topic: rwhod

FreeBSD Security Advisory FreeBSD-SA-01:28.timed

2001-03-13 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-01:28 Security Advisory FreeBSD, Inc. Topic: timed

FreeBSD Ports Security Advisory FreeBSD-SA-01:23.icecast

2001-03-13 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-01:23 Security Advisory FreeBSD, Inc. Topic: icecast

Re: Cisco PIX Security Notes

2001-03-13 Thread Lisa Napier
Hi Fabio, Thank you for your detailed analysis, although, we certainly would appreciate the opportunity to review this prior to public posting. We prefer to minimize misinformation, as it can cause people to make decisions based on inaccurate information, which is never a good thing. We're

DoS for KDE2 (patriotsoft packages) and Gnome 1.2 (Ximian RPM binaries) on Solaris 7/8

2001-03-13 Thread Robert Banniza
Using strobe 1.03, I was able to crash Gnome (Ximian) and KDE2 window managers on Solaris 7 (running patch level 8) and Solaris 8 (running patch level 5). Ximian has been notified of the issue. I have the core dump if someone would like to see it as it is too big to send to the list. Both of the

Re: CORRECTION to CODE: FormMail.pl can be used to send anonymousemail

2001-03-13 Thread Scott Buchanan
To reply to all of these messages... Patching FormMail to check the referrer is NOT ample security. It takes about 30 seconds to write a Perl script to POST to FormMail.pl with a faked HTTP_REFERRER field. Probably the only useful solution is to hack the script to use an array of valid email

FreeBSD Ports Security Advisory FreeBSD-SA-01:27.cfengine

2001-03-13 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-01:27 Security Advisory FreeBSD, Inc. Topic: cfengine

Re: Vulnerability in Novell Netware - Yeah, it's a user. So what?

2001-03-13 Thread Adrian Bolzan
Hi, I have attempted to log in as a print server and could not log in. I am running NW5.1 SP1a. I am niot using NDPS and tried all of the print servers with no password. is there a trick to logging in as a print server? thanks, adrian On 12 Mar 01, at 8:17, Kain wrote: On Thu, Mar 08,

FORW: Re: [ANNOUNCE] Apache 1.3.19 Released

2001-03-13 Thread Dan Harkless
Here's Martin's response to my question about what Apache versions have that hole: --- Forwarded Message Date: Tue, 13 Mar 2001 09:51:52 +0100 From: Martin Kraemer [EMAIL PROTECTED] Subject: Re: [ANNOUNCE] Apache 1.3.19 Released Message-ID: [EMAIL PROTECTED] On Mon, Mar 12, 2001 at

Re: Vulnerability in Novell Netware

2001-03-13 Thread Scott Smith
There is one thing that might be over looked here, or stated where I haven't read. I have tested the same login via a printer name and no pass. I've had high school students do this and find out they can write to the print queue directory. Needless to say they filled up the SYS volume with

Internet Explorer and Services for Unix 2.0 Telnet Client

2001-03-13 Thread Oliver Friedrichs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SecurityFocus.com http://www.securityfocus.com Vulnerability Report For Internet Explorer and Services for Unix 2.0 Telnet Client Date Published: 13 March 2001 Advisory

More Icecast remote vulnerabilities

2001-03-13 Thread John Viega
Following the announcement yesterday about buffer overflow vulnerabilities in Icecast, Andreas Hasenack [EMAIL PROTECTED] identified several more likely buffer overflow vulnerabilities. Matt Messier [EMAIL PROTECTED] took a look, and determined that at least some of them are definitely remotely

Security Update: several buffer overflows in imap, ipop2d and ipop3d CSSA-2001-011.0

2001-03-13 Thread Caldera Support Info
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ Caldera Systems, Inc. Security Advisory Subject:several buffer overflows in imap, ipop2d and ipop3d Advisory number: