[USN-647-1] Thunderbird vulnerabilities

2008-09-26 Thread Jamie Strandboge
=== Ubuntu Security Notice USN-647-1 September 26, 2008 mozilla-thunderbird, thunderbird vulnerabilities CVE-2008-3835, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064,

Estonian Cyber Security Strategy document -- now available online

2008-09-26 Thread Gadi Evron
Hello. The Estonian cyber security strategy document is now available online. I must say once again the concept of a national cyber security stance is quite interesting. Those who wish to download the document:: http://www.mod.gov.ee/?op=bodyid=518 My contact there specified she'd be happy

CA Service Desk Multiple Cross-Site Scripting Vulnerabilities

2008-09-26 Thread Williams, James K
Title: CA Service Desk Multiple Cross-Site Scripting Vulnerabilities CA Advisory Date: 2008-09-24 Reported By: Open Security Foundation Impact: A remote attacker can conduct cross-site scripting attacks. Summary: CA Service Desk contains multiple vulnerabilities that can allow a remote

Linksys/Cisco WRT350N 1.0.3.7 Insecure Samba Static Configuration

2008-09-26 Thread Teh Kotak
As of today 25 September 2008, I am using the latest 1.0.3.7 firmware for my region (Singapore), US also use this version. 1/ Outdated Samba 3.0.2, vulnerable to numerous security holes. 2/ Default admin:admin user 3/ Default open guest user, noway to disable it 4/ It is impossible to disable

DATAC RealWin 2.0 SCADA Software - Remote PreaAuth Exploit

2008-09-26 Thread Reversemode
Hi - http://www.dataconline.com/software/realwin.php RealWin is a SCADA server product which includes a FlexView HMI and runs on current Microsoft Windows platforms (2000 and XP). It can operate on a single PC or multiple PCs connected through a TCP/IP network.

RPG.Board = 0.0.8Beta2 Remote SQL Injection

2008-09-26 Thread Guns
[~] RPG.Board = 0.0.8Beta2 Remote SQL Injection [~] Author: 0x90 [~] HomePage: www.0x90.com.ar [~] Contact: Guns[at]0x90[dot]com[dot]ar [~] Script: RPG.Board [~] site: http://rpgmaster.de/viewtopic.php?f=25t=69 [~] Vulnerability Class: SQL Injection [~] Exploit:

The Gemini Portal = 4.7 / Insecure Cookie Handling Vulnerability

2008-09-26 Thread Pepelux
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- The Gemini Portal = 4.7 / Insecure Cookie Handling Vulnerability -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Program: The Gemini Portal Version: = 4.7 File affected: admin/* Download:

multiple vendor ftpd - Cross-site request forgery

2008-09-26 Thread cxib
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ multiple vendor ftpd - Cross-site request forgery ] Author: Maksymilian Arciemowicz securityreason.com Date: - - Written: 03.09.2008 - - Public: 26.09.2008 SecurityReason Research SecurityAlert Id: 56 CVE: not assigned

Crux Gallery = 1.32 / Insecure Cookie Handling Vulnerability

2008-09-26 Thread Pepelux
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Crux Gallery = 1.32 / Insecure Cookie Handling Vulnerability -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Program: Crux Gallery Version: = 1,32 File affected: admin/* Download: http://www.arzdev.com/downloads/8/Crux

Re: [Full-disclosure] [IVIZ-08-010] McAfee SafeBoot Device Encryption Plain Text Password Disclosure (v4, Build 4750 and below)

2008-09-26 Thread Kenneth Ng
Does anyone know how to check the build version number on the agent? Or is there a comparison with that build number and a x.y.z version id? On Thu, Sep 18, 2008 at 5:44 AM, iViZ Security Advisories [EMAIL PROTECTED] wrote: ---

Crashing ZoneAlarm 8.0.020.000 by Checkpoint (Component : TrueVector)

2008-09-26 Thread quakerdoomer
Crashing ZoneAlarm 8.0.020.000 by Checkpoint (Component : TrueVector) == - Keep ZoneALarm 8 running with vsmon.exe running (which runs by default) - On System A : Run the rogue proxy (attached) za_crasher_proxy.exe and set a port number (eg:

Re: Exploit creation - The random approach or Playing with random to build exploits

2008-09-26 Thread Stefano Zanero
Nelson Brito wrote: 1. Slammer was the very first Flash Worm, Well, no, actually, Slammer was not a flash worm. A flash worm is a worm which follows a precomputed spreading path, by using prior knowledge of all the systems that are vulnerable to the particular exploit in use. And Slammer

[ MDVSA-2008:206 ] mozilla-thunderbird

2008-09-26 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:206 http://www.mandriva.com/security/