Symantec Antivirus Library Remote Heap Overflows

2005-12-20 Thread list
Date December 20, 2005 Vulnerability The Symantec Antivirus Library provides file format support for virus analysis. During decompression of RAR files Symantec is vulnerable to multiple heap overflows allowing attackers complete control of the system(s) being protected. These vulnerabilities

iDefense Security Advisory 12.20.05: Qualcomm WorldMail IMAP Server String Literal Processing Overflow Vulnerability

2005-12-20 Thread [EMAIL PROTECTED]
Qualcomm WorldMail IMAP Server String Literal Processing Overflow Vulnerability iDefense Security Advisory 12.20.05 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=359 December 20, 2005 I. BACKGROUND Qualcomm WorldMail is an email and messaging server designed for use in

iDefense Security Advisory 12.20.05: McAfee Security Center MCINSCTL.DLL ActiveX Control File Overwrite

2005-12-20 Thread [EMAIL PROTECTED]
McAfee Security Center MCINSCTL.DLL ActiveX Control File Overwrite iDefense Security Advisory 12.20.05 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=358 December 20, 2005 I. BACKGROUND McAfee VirusScan is an anti-virus software. More information is available from the

[security bulletin] SSRT5983 rev.1 - HP-UX Running Software Distributor (SD) Remote Unauthorized Access

2005-12-20 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00583199 Version: 1 HPSBUX02089 SSRT5983 rev.1 - HP-UX Running Software Distributor (SD) Remote Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as

Re: Unauthenticated EIGRP DoS

2005-12-20 Thread Paul Oxman (poxman)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Response == This is Cisco PSIRTs' response to the statements made from Arhont Ltd. Information Security in their messages: * Unauthenticated EIGRP DoS. * Authenticated EIGRP DoS / Information leak. posted on the

PHPGedView = 3.3.7 remote code execution

2005-12-20 Thread retrogod
--- PHPGedView = 3.3.7 Arbitrary local/remote code execution php injection --- software: site: http://www.phpgedview.net/ description: PhpGedView is a revolutionary genealogy program which allows you to view and edit your genealogy on your website. - vulnerabilties:

[Overflow.pl] Blender BlenLoader Integer Overflow

2005-12-20 Thread Damian Put
Overflow.pl Security Advisory #4 Blender BlenLoader Integer Overflow Vendor: Blender (http://www.blender.org) Affected version: 2.x up to and including 2.40pre Vendor status: Notified. No patch available. Author: Damian Put [EMAIL PROTECTED] URL: http://www.overflow.pl/adv/blenderinteger.txt

Secunia Research: Pegasus Mail Buffer Overflow and Off-by-One Vulnerabilities

2005-12-20 Thread Secunia Research
== Secunia Research 20/12/2005 - Pegasus Mail Buffer Overflow and Off-by-One Vulnerabilities - == Table of Contents Affected

IRM 014: Sygate Protection Agent 5.0 vulnerability - A low privileged user can disable the security agent

2005-12-20 Thread Advisories
-- IRM Security Advisory No. 014 Sygate Protection Agent 5.0 vulnerability - A low privileged user can disable the security agent Vulnerablity Type / Importance: Security Protection Bypass / High Problem discovered: November

IRM 013: Ultraapps Issue Manager is vulnerable to Privilege Escalation

2005-12-20 Thread Advisories
-- IRM Security Advisory No. 013 Ultraapps Issue Manager is vulnerable to Privilege Escalation Vulnerablity Type / Importance: Privilege Escalation / High Problem discovered: November 25th 2005 Vendor contacted: November 25th

IRM 012: Portfolio Netpublish Server 7 is vulnerable to a Directory Traversal Attack

2005-12-20 Thread Advisories
-- IRM Security Advisory No. 012 Portfolio Netpublish Server 7 is vulnerable to a Directory Traversal Attack Vulnerablity Type / Importance: Information Leakage / High Problem discovered: October 11th 2005 Vendor contacted:

MDKSA-2005:234 - Updated sudo packages fix vulnerability

2005-12-20 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2005:234 http://www.mandriva.com/security/