Microsoft Windows XP/2003 Macrovision SecDrv.sys privilege escalation (0day)

2007-10-18 Thread Reversemode
Hi, Symantec researcher Elia Florip has warned, at the company's weblog [1],of a 0day attack in Windows XP and 2003 that allows unprivileged users to gain SYSTEM privileges via a buggy driver installed by default. In his/her post, Elia brings us an important clue:At the moment, it's still not

Nortel UNIStim IP Softphone Buffer-Overflow

2007-10-18 Thread daniel . stirnimann
# # # COMPASS SECURITY ADVISORY http://www.csnc.ch/ # # # # Product: IP Softphone # Vendor: Nortel # Subject: UNIStim IP Softphone Buffer-Overflow # Risk:High #

Nortel IP Phone Surveillance Mode

2007-10-18 Thread daniel . stirnimann
# # # COMPASS SECURITY ADVISORY http://www.csnc.ch/ # # # # Product: IP Phone # Vendor: Nortel # Subject: IP Phone Surveillance Mode # Risk:High # Effect:

Nortel IP Phone Flooding Denial of Service

2007-10-18 Thread daniel . stirniman
# # # COMPASS SECURITY ADVISORY http://www.csnc.ch/ # # # # Product: IP Phone # Vendor: Nortel # Subject: IP Phone Flooding Denial of Service # Risk:High # Effect:

Nortel IP Phone forced re-authentication

2007-10-18 Thread daniel . stirnimann
# # # COMPASS SECURITY ADVISORY http://www.csnc.ch/ # # # # Product: IP Phone # Vendor: Nortel # Subject: IP Phone forced re-authentication # Risk:High # Effect:

Latest web hacking incidents

2007-10-18 Thread Ofer Shezaf
Following are the latest addition to the Web Hacking Incidents Database (WHID), a Web Application Security Consortium project. For further information about the incidents including reference to further information about each incident, refer to WHID's site at

Nortel Telephony Server Denial of Service

2007-10-18 Thread daniel . stirnimann
# # # COMPASS SECURITY ADVISORY http://www.csnc.ch/ # # # # Product: Telephony Server # Vendor: Nortel # Subject: Telephony Server Denial of Service # Risk:High #

[SECURITY] [DSA 1388-1] New dhcp packages fix arbitrary code execution

2007-10-18 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA 1388-1 [EMAIL PROTECTED] http://www.debian.org/security/ Steve Kemp October 18th, 2007

[security bulletin] HPSBUX02273 SSRT071476 rev.2 - HP-UX Running Apache, Remote Unauthorized Denial of Service (DoS)

2007-10-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01182588 Version: 2 HPSBUX02273 SSRT071476 rev.2 - HP-UX Running Apache, Remote Unauthorized Denial of Service (DoS) NOTICE: The information in this Security Bulletin

[security bulletin] HPSBMA02274 SSRT071445 rev.2 - HP System Management Homepage (SMH) for HP-UX, Remote Cross Site Scripting (XSS)

2007-10-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01183265 Version: 2 HPSBMA02274 SSRT071445 rev.2 - HP System Management Homepage (SMH) for HP-UX, Remote Cross Site Scripting (XSS) NOTICE: The information in this

[CORRECTED] Microsoft Windows XP SP2/2003 - Macrovision SecDrv.sys privilege escalation (0day)

2007-10-18 Thread Reversemode
Hi, Symantec researcher Elia Florio has warned, at the company's weblog,of a 0day attack in Windows XP and 2003 that allows unprivileged users to gain SYSTEM privileges via a buggy driver installed by default. In his/her post, Elia brings us an important clue:At the moment, it’s still not

CFP C H A S E - 2 0 0 7 Lahore Pakistan

2007-10-18 Thread chase
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 C H A S E - 2 0 0 7 Lahore December 07-08 2007 http://www.chase.org.pk/ CHASE-2007 is a unique information and network security event of its kind being

Re: SSH attacks - anyone else seen these?

2007-10-18 Thread Tim
On Tuesday 16 October 2007, James Lay wrote: Nothing in my logs..just out of curiosity, are you running sshd with protocol version 1, 2, or both? I'm running SSH with protocol version 2 only. But as someone else mentioned, this is obviously not an attack against SSH anyways. It just arrived on

Re: Multiple CSRF in SimplePHPBlog

2007-10-18 Thread Hanno Böck
Am Mittwoch 17 Oktober 2007 schrieb [EMAIL PROTECTED]: SimplePHPBlog Cross Site Request Forgeries Tested on v0.4.9 What's the purpose on reporting issues on old versions? I don't know simplephpblog, but a quick look on their page tells me that they've released a bunch of security related

Re[2]: [Full-disclosure] The Death of Defence in Depth ? - An invitation to Hack.lu

2007-10-18 Thread Thierry Zoller
Dear Felix, While I love your comment and really welcome constructive criticism, I actually think you should keep the focus on the Fox News style question marks. Nowhere is being said that this is the end of Defence in Depth (as a paradigm), we ask the question. Then again you seem to be judging

rPSA-2007-0219-1 libpng

2007-10-18 Thread rPath Update Announcements
rPath Security Advisory: 2007-0219-1 Published: 2007-10-18 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Indirect User Deterministic Denial of Service Updated Versions: [EMAIL PROTECTED]:1/1.2.22-1-0.1 rPath Issue Tracking System:

[SECURITY] [DSA 1389-1] New zoph packages fix SQL injection

2007-10-18 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1389-1[EMAIL PROTECTED] http://www.debian.org/security/Thijs Kinkhorst October 18th, 2007

Windows binary of GSview 4.8 contain vulnerable zlib (CAN-2005-2096)

2007-10-18 Thread Stefan Kanthak
The Windows binary GSV48W32.EXE of gsview http://pages.cs.wisc.edu/~ghost/gsview/ ftp://mirror.cs.wisc.edu/pub/mirrors/ghost/ghostgum/gsv48w32.exe ships with a zlib32.dll (originally named zlib.dll) v1.2.2 http://www.zlib.net/ which is vulnerable to CAN-2005-2096. The zlib32.dll is dated

Softwin's anti-virus BitDefender contains vulnerable zlib (CA-2007-07)

2007-10-18 Thread Stefan Kanthak
At least the freeware version of Softwin's anti-virus solution BitDefender Free Edition http://www.bitdefender.com/site/view/Download-Free-Products.html http://download.bitdefender.com/windows/free/winfree/en/bitdefender_free_v10.exe ships with a completely outdated zlib 1.1.3 http://www.zlib.net/

Serious holes affecting SiteBar 3.3.8

2007-10-18 Thread Tim Brown
All, As a result of a short security audit of SiteBar, a number of security holes were found. The holes included code execution, a malicious redirect and multiple cases of Javascript injection. After liasing with the developers, the holes have been patched. Attached are the advisory and

[ GLSA 200710-18 ] util-linux: Local privilege escalation

2007-10-18 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200710-18 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Official Windows binaries of curl contain vulnerable zlib 1.2.2 (CAN-2005-2096)

2007-10-18 Thread Stefan Kanthak
The Windows binaries of curl, built by the author and maintainer of curl and available for download at http://curl.haxx.se/download.html are linked with zlib 1.2.2 http://www.zlib.net/, which is but vulnerable to CAN-2005-2096: | x:\curl -V | curl 7.17.0 (i586-pc-mingw32msvc) libcurl/7.17.0

[ GLSA 200710-19 ] The Sleuth Kit: Integer underflow

2007-10-18 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200710-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

S21SEC-038-en: Alcatel Omnivista 4760 Cross-Site Scripting

2007-10-18 Thread S21sec Labs
## - S21Sec Advisory - ## Title: Alcatel Omnivista 4760 Cross-Site Scripting ID: S21SEC-038-en Severity: Medium - History:

[ MDKSA-2007:200 ] - Updated tk packages fix vulnerabilities

2007-10-18 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:200 http://www.mandriva.com/security/