how to trick most of cms avatar upload filter [exemple for : RunCms (PoC)]

2006-11-02 Thread securfrog
/*==*/ //how to trick cms avatar upload //exemple for : RunCms (PoC) //Bug : avatar/php-shell upload //Product: RunCms //URL: http://www.runcms.org/ //RISK: hight /*==*/ you can upload a crafted picture on most of

Firefox 1.5.0.7 Exploit

2006-11-02 Thread koenig
!-- Do 2 Nov 16:35:53 CET 2006 Vulnerable: Firefox 1.5.0.7 and probably versions below Impact: DoS (perhaps Code Execution) As Firefox 2.0 was released a few days ago... A new Exploit for the old version! The great Firefox! ;D On Kubuntu Linux the exploits does not just kill firefox but

iodine client 0.3.2 buffer overflow

2006-11-02 Thread poplix
hi, iodine client 0.3.2, available at http://code.kryo.se/iodine/ , suffers from a stack-based buffer overflow vulnerability which could result in the execution of arbitrary code. A specially crafted dns response sent through an UDP packet can be used to exploit this issue. cheers -p

Multiple vulnerabilities in SAP Web Application Server 6.40 and 7.00

2006-11-02 Thread Nicob
Advisory Name : Multiple vulnerabilities in SAP Web Application Server Release Date : 2 November 2006 Application : SAP Web AS 6.40 patch 136 and 7.00 patch 66 Platform : All platforms (except the third vulnerability) Impacts : Remote file disclosure, remote DoS, local privilege escalation

Advisory 12/2006: phpMyAdmin - error.php XSS Vulnerability

2006-11-02 Thread Stefan Esser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hardened-PHP Project www.hardened-php.net -= Security Advisory =- Advisory: phpMyAdmin - error.php XSS Vulnerability Release Date: 2006/11/02 Last Modified: 2006/11/02

[SECURITY] [DSA 1203-1] New libpam-ldap packages fix access control bypass

2006-11-02 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1203-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 2nd, 2006

[security bulletin] HPSBMA02159 SSRT061238 rev.1 - HP System Management Homepage (SMH), Remote Bypassing of Security Features or Cross Site Scripting or Denial of Service (DoS)

2006-11-02 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00786522 Version: 1 HPSBMA02159 SSRT061238 rev.1 - HP System Management Homepage (SMH), Remote Bypassing of Security Features or Cross Site Scripting or Denial of Service (DoS) NOTICE: The

[USN-375-1] PHP vulnerability

2006-11-02 Thread Martin Pitt
=== Ubuntu Security Notice USN-375-1 November 02, 2006 php5 vulnerability CVE-2006-5465 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06

Educational write-up by Amit Klein: A Refreshing Look at Redirection

2006-11-02 Thread Amit Klein
A Refreshing Look at Redirection Amit Klein, November 2006 Introduction In this short educational piece, I want to draw the reader's attention to a fourth way of performing redirection, and its importance. This isn't a new material, but apparently

Re: how to trick most of cms avatar upload filter [exemple for : RunCms (PoC)]

2006-11-02 Thread Taneli Leppä
Hi, [EMAIL PROTECTED] kirjoitti: then you need to take a good file editor , like: notepad++ (you can take whatever picture , and edit it without destroying it .) we need to put some php code AFTER the picture code . when it's done , try the picture if it still work , if yes , we are ok :).

Re: how to trick most of cms avatar upload filter [exemple for : RunCms (PoC)]

2006-11-02 Thread Taneli Leppä
Taneli Leppä kirjoitti: then you need to take a good file editor , like: notepad++ (you can take whatever picture , and edit it without destroying it .) we need to put some php code AFTER the picture code . when it's done , try the picture if it still work , if yes , we are ok :). This

Re: Firefox 1.5.0.7 Exploit

2006-11-02 Thread Robert McGrew
On 2 Nov 2006 16:43:35 -, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: !-- Do 2 Nov 16:35:53 CET 2006 Vulnerable: Firefox 1.5.0.7 and probably versions below Impact: DoS (perhaps Code Execution) As Firefox 2.0 was released a few days ago... A new Exploit for the old version! The great

RE: how to trick most of cms avatar upload filter [exemple for : RunCms (PoC)]

2006-11-02 Thread Richard Stanway
-Original Message- From: Taneli Leppä [mailto:[EMAIL PROTECTED] Sent: Thursday, November 02, 2006 3:06 PM To: [EMAIL PROTECTED] Cc: bugtraq@securityfocus.com Subject: Re: how to trick most of cms avatar upload filter [exemple for : RunCms (PoC)] Taneli Leppä kirjoitti: then

Re: Firefox 1.5.0.7 Exploit

2006-11-02 Thread Bram Dumolin
re, On 2 Nov 2006 16:43:35 -, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Do 2 Nov 16:35:53 CET 2006 Vulnerable: Firefox 1.5.0.7 and probably versions below Impact: DoS (perhaps Code Execution) As Firefox 2.0 was released a few days ago... A new Exploit for the old version! The great

RE: Internet Explorer 7 - Still Spyware Writers' Heaven

2006-11-02 Thread Roger A. Grimes
While this is a concern, it isn't a big one. The PATH environment variable doesn't include the user's desktop by default. There is a close tie-in between Explorer.exe and Iexplore.exe involving the desktop, and there are tricks you can play to get desktop items to execute instead of IE stuff,

Advisory 13/2006: PHP HTML Entity Encoder Heap Overflow Vulnerability

2006-11-02 Thread Stefan Esser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hardened-PHP Project www.hardened-php.net -= Security Advisory =- Advisory: PHP HTML Entity Encoder Heap Overflow Vulnerability Release Date: 2006/11/03 Last Modified: