Hnkaray Duyuru Script Remote SQL #304;njection

2007-06-07 Thread Dj_ReMix_20
## $ Script Name : Hünkaray Duyuru Script $ Script Download :http://www.aspindir.com/Goster/4678 $ Author :RMx $ HomePage :www.BiyoSecurity.NET $ Vulnerable File : oku.asp $ Exploit : http://www.example.com/[PATH]/oku.asp?id=-1

Re: uTorrent overflow

2007-06-07 Thread Andreas Beck
Jon Ribbens [EMAIL PROTECTED] wrote: On Sat, Jun 02, 2007 at 08:15:09PM -, [EMAIL PROTECTED] wrote: if [ $X = y ];then telnet $victamIP $victamport Um, is it just me, or does this exploit do nothing at all? According to the comment that is output a few lines above, you are supposed to

CSIS Advisory: Microsoft GDI+ Integer division by zero flaw handling .ICO files

2007-06-07 Thread Dennis Rand
CSIS Security Group has discovered an Integer division by zero flaw in the GDI+ component in Windows XP. This condition are activated when a malformed ICO file are viewed through either Windows Explorer or other components like Windows Picture and Fax Viewer. The consequence of this flaw is a

Re: Sudo: local root compromise with krb5 enabled

2007-06-07 Thread Thor Lancelot Simon
On Wed, Jun 06, 2007 at 09:57:25PM -0400, Thor Lancelot Simon wrote: But woe betide any system administrator who accidentally puts a Kerberos-enabled sudo on a host that's configured as a Kerberos client only! Actually, if you link sudo to MIT krb5 (rather than Heimdal) it's worse than that,

W1L3D4 WEBmarket Remote SQL #304;njection

2007-06-07 Thread Dj_ReMix_20
## $ Script Name : W1L3D4 WEBmarket v0,1 $ Script Download :www.aspindir.com/goster/4867 $ Author :RMx $ HomePage :www.BiyoSecurity.NET $ Vulnerable File :urunbak.asp $ Exploit : http://www.example.com/[PATH]/urunbak.asp?id=-1

Re: uTorrent overflow

2007-06-07 Thread Pavel Konov
Maybe the server he was testing couldn't handle more than one connection from the same ip and crashed. There's more than one way to kill a telnet server. . .

Re: CSIS Advisory: Microsoft GDI+ Integer division by zero flaw handling .ICO files

2007-06-07 Thread H D Moore
Looks like this mangled ICO will also kill Gimp :-) [2.3.14] On Thursday 07 June 2007 04:21, Dennis Rand wrote: Further exploitation has not been verified.

MIT krb5: makes sudo authentication issue MUCH worse.

2007-06-07 Thread Thor Lancelot Simon
On Wed, Jun 06, 2007 at 11:19:01PM -0400, Thor Lancelot Simon wrote: On Wed, Jun 06, 2007 at 09:57:25PM -0400, Thor Lancelot Simon wrote: But woe betide any system administrator who accidentally puts a Kerberos-enabled sudo on a host that's configured as a Kerberos client only!

Atom PhotoBlog v1.0.9 XSS vulnerability

2007-06-07 Thread ls
Application: Atom Photoblog Web Site: http://atomphotoblog.ilenvo.de/ Versions: 1.0.9 and below Platform: linux, windows, freebsd, sun Bug: Cross site Scripting (XSS) Fix Available: Yes Advisory File: http://www.secvsn.com/content/Advisories/sr-060607-atomphotoblog.html

[CAID 35395, 35396]: CA Anti-Virus Engine CAB File Buffer Overflow Vulnerabilities

2007-06-07 Thread Williams, James K
Title: [CAID 35395, 35396]: CA Anti-Virus Engine CAB File Buffer Overflow Vulnerabilities CA Vuln ID (CAID): 35395, 35396 CA Advisory Date: 2007-06-05 Reported By: ZDI Impact: Remote attackers can cause a denial of service or potentially execute arbitrary code. Summary: CA Anti-Virus

WmsCMS = 2.0 Multiple XSS Vulnerabilities

2007-06-07 Thread glafkos
Application: WmsCMS Vendors Url: http://www.web-master.biz Bug Type: Multiple URL Handling Remote Cross-Site Scripting Vulnerabilities Exploitation: Remote Severity: Less Critical Solution Status: Unpatched Introduction: WmsCMS is a web-based CMS system Google Dork: Powered by

Sudo: local root compromise with krb5 enabled

2007-06-07 Thread Thor Lancelot Simon
The 'sudo' package can be built to use Kerberos 5 for authentication of users. When a user is properly authenticated to sudo, sudo grants that user (potentially limited) root privileges. Thus a mistake in the authentication code in sudo is potentially severe: it can lead to a local root

Re: [MajorSecurity Advisory #50]chameleon cms - Session fixation Issue

2007-06-07 Thread admin
Hello. The vendor released a new working patch which fixes this issue. It is available as chameleon cms build 2085/17. Regards, David Vieira-Kurz (Security Researcher, majorsecurity.de)

Re: Sudo: local root compromise with krb5 enabled

2007-06-07 Thread James Downs
On Jun 6, 2007, at 6:57 PM, Thor Lancelot Simon wrote: The 'sudo' package can be built to use Kerberos 5 for authentication of users. When a user is properly authenticated to sudo, sudo grants It should be noted that Kerberos is not an authorization system. All this case does is allow a

OWASP and WASC Cocktail party at Blackhat USA 2007

2007-06-07 Thread Anurag Agarwal
OWASP and WASC have joined hands to have a combined meetup at Blackhat USA 2007 in Las Vegas which was earlier planned as a WASC meetup. Breach Security has generously agreed to sponsor the event, so cocktails and appetizers will be served to all attendees. Since both the top webappsec

phpWebThings ==1.5.2 RFI

2007-06-07 Thread titanichacker titanichacker
*script:phpWebThings ==1.5.2 RFI * *dir url:http://sourceforge.net/project/showfiles.php?group_id=19103 * *author:titanichacker * *c0ntact:[EMAIL PROTECTED] * *H.P: hack-teach.com mohandko.com tryag.com * *bug in: * *(/core/editor.php) *include($editor_insert_top);

[SECURITY] [DSA 1299-1] New ipsec-tools packages fix denial of service

2007-06-07 Thread dann frazier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- Debian Security Advisory DSA 1299-1[EMAIL PROTECTED] http://www.debian.org/security/ dann frazier June 7th, 2007

Re: Sudo: local root compromise with krb5 enabled

2007-06-07 Thread Todd C. Miller
In message [EMAIL PROTECTED] so spake Mark Senior (senatorfrog): In other words, in the SuSE default config, sudo is just an overcomplicated su - to sudo something as root, you need not your own password, but root's - except you don't have to be in wheel to use it. If sudo is

Re: LuckyBot v3 Remote File Include

2007-06-07 Thread info
this won't work, unless register globals is on, and on almost every webhost with PHP5, does not have register_globals on. So what a stupid exploit.

[SECURITY] [DSA 1300-1] New iceape packages fix several vulnerabilities

2007-06-07 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1300-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff June 7th, 2007

Re: Sudo: local root compromise with krb5 enabled

2007-06-07 Thread Mark Senior
On 6/7/07, James Downs wrote: On Jun 6, 2007, at 6:57 PM, Thor Lancelot Simon wrote: The 'sudo' package can be built to use Kerberos 5 for authentication of users. When a user is properly authenticated to sudo, sudo grants It should be noted that Kerberos is not an authorization system.

Re: Monkey CMS v0.0.3 Remote File Include Vulnerabilitiy

2007-06-07 Thread www
It`s not work! Cuz register_globals = Off Maybe it`s work if it enabled on hoster. So.. Don`t worry :D