Re: [oss-security] CVE Request: Planeshift buffer overflow

2012-05-18 Thread Kurt Seifried
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/17/2012 08:52 AM, Andres Gomez wrote: Name: Stack-based buffer overflow in Planeshift 0.5.9 and earlier Software: Planeshift 0.5.9 Software link: http://www.planeshift.it/ Vulnerability Type: Buffer overflow Vulnerability Details:

[security bulletin] HPSBOV02780 SSRT100766 rev.1 - HP OpenVMS ACMELOGIN, Local Unauthorized

2012-05-18 Thread security-alert
Access and Increased Privileges -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c0494 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID:

[SECURITY] [DSA 2475-1] openssl security update

2012-05-18 Thread Raphael Geissert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2475-1 secur...@debian.org http://www.debian.org/security/ Raphael Geissert May 17, 2012

Re: [oss-security] CVE Request: Planeshift buffer overflow

2012-05-18 Thread Kurt Seifried
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/17/2012 03:29 PM, Andres Gomez wrote: Planeshift is an online multiplayer role playing game which is open source (http://en.wikipedia.org/wiki/PlaneShift_(video_game)) and chatbubbles.xml is a sort of configuration file for chat windows

Re: [oss-security] CVE Request: Planeshift buffer overflow

2012-05-18 Thread Kurt Seifried
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/17/2012 09:53 PM, Andres Gomez wrote: Hi kurt, The fact that only local user can modify program files doesn't mean there is no security risk, there are a lot of examples but look at this:

H2HC Brazil 9th Edition - Call for Papers

2012-05-18 Thread Rodrigo Rubira Branco (BSDaemon)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CALL FOR PAPERS - Hackers 2 Hackers Conference 9th edition The call for papers for H2HC 9th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from 18 to 23 October 2012. [ - Introduction - ] For the ninth

SEC Consult SA-20120518 :: Memory overwrite vulnerability in libwpd (OpenOffice.org) - CVE-2012-2149

2012-05-18 Thread SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory 20120518-0 === title: libwpd WPXContentListener::_closeTableRow() memory overwrite product: OpenOffice.org vulnerable version: 3.3.0

New Open Source Web Application Vulnerability Scanner Available

2012-05-18 Thread webvulscan
Hi All, There is a new web application vulnerability scanner available. It is called WebVulScan and it is open source. Here is the link for it if you want to check it out: http://code.google.com/p/webvulscan/ Regards, Dermot Blair