[SECURITY] [DSA-063-1] two xinetd problems

2001-06-18 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-063-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 17, 2001 -

Cisco TFTPD 1.1 Vulerablity

2001-06-18 Thread Siberian
[Sentry Research Labs - ID0201061701] (c) 2001 by www.sentry-labs.com Note: This advisory is for information and educational purpouse only! We are not responsible for any abuse or damage resulting from these information. Author: Siberian Topic: Security Bug in CISCO TFTPD server 1.1

Multiple Vulnerabilities In AMLServer

2001-06-18 Thread SNS Research
Strumpf Noir Society Advisories ! Public release ! --# -= Multiple Vulnerabilities In AMLServer =- Release date: Monday, June 18, 2001 Introduction: Air Messenger LAN Server is a paging gateway server for MS Windows that allows you to send and recieve messages to a paging network over a

udirectory from Microburst Technologies remote command execution

2001-06-18 Thread Deja User
udirectory from Microburst Technologies, Inc. http://www.uburst.com/uDirectory/ allows remote command execution Vulnerable versions: 2.0, possibly earlier versions uDirectory is an online directory and listing management system that allows you to easily create, update, and maintain an on-line

DCShop vulnerability

2001-06-18 Thread Peter Helms
DCShop vulnerability We have seen several Web shops using your DCShop product as E-commerce system, where it is possble for unauthorized persons via a Web browser to retrieve customer creditcard numbers in cleartext. Athough the developers on their Web site recommends not to use the

RE: Windows 2k SP2 breaks security fix should reapply

2001-06-18 Thread Chase Stone
SP2 does not break MS01-026 because that hotfix is not included in SP2 (see http://www.microsoft.com/technet/security/w2ksp2.asp). If you look at the filename it is Q293826_W2K_SP3_x86_en.EXE which means it is going to be an SP3 (aka post SP2) fix. Any SP3 fix should be installed AFTER SP2 is

SCO Tarantella Remote file read via ttawebtop.cgi

2001-06-18 Thread KF
SCO has been notified of this issue. Original Message Subject: SCO Tarantella Remote file read via ttawebtop.cgi Date: Mon, 18 Jun 2001 13:06:41 -0400 From: KF [EMAIL PROTECTED] To: [EMAIL PROTECTED]

MDKSA-2001:046-2 - kdelibs update

2001-06-18 Thread Linux Mandrake Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: kdelibs Date:

Re: Cisco TFTPD 1.1 Vulerablity

2001-06-18 Thread Jim Duncan
Siberian writes: [Sentry Research Labs - ID0201061701] (c) 2001 by www.sentry-labs.com [...] Topic: Security Bug in CISCO TFTPD server 1.1 Vendor Status: Informed (06/17/01) Just for the record, I checked with my teammates and can't find any record that you contacted the Cisco

All versions of Microsoft Internet Information Services, Remote buffer overflow (SYSTEM Level Access)

2001-06-18 Thread Marc Maiffret
All versions of Microsoft Internet Information Services, Remote buffer overflow (SYSTEM Level Access) Release Date: June 18, 2001 Severity: High (Remote SYSTEM level code execution) Systems Affected: Microsoft Windows NT 4.0 Internet Information Services 4.0 Microsoft Windows 2000 Internet

Re: The Dangers of Allowing Users to Post Images

2001-06-18 Thread Henrik Nordstrom
Unfortunately, using client IP in access controls/sessions will render your service unusable for some people behind load balanced proxies. In such environment the source IP is not tied to the user, and will change every now and then between a set of different IP's (not to mention that there may

Re: The Dangers of Allowing Users to Post Images

2001-06-18 Thread Dmitry Yu. Bolkhovityanov
On 15 Jun 01 at 12:52, [EMAIL PROTECTED] wrote: When the request comes in, check if the incoming ticket matches the one stored in this user's session. If it does, this particular user was given the offer by our server, and not by anyone else. To spoof this system, someone would have to

Re: The Dangers of Allowing Users to Post Images

2001-06-18 Thread Brett Lymn
According to Tim Nowaczyk: My company implemented this but went one more step. They created a file that had (IP, ticket) pairs. The ticket was passed around in URLs, but wasn't valid unless it came from the specific IP. To pretend to be someone else, one would have to spoof their IP