PR08-20: Bypassing ASP .NET ValidateRequest for Script Injection Attacks

2008-08-22 Thread ProCheckUp Research
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The Microsoft .NET framework comes with a request validation feature, configurable by the ValidateRequest setting. ValidateRequest has been a feature of ASP.NET since version 1.1. This feature consists of a series of filters, designed to prevent

Call For Papers - Hackers 2 Hackers Conference 5th Edition - Brazil

2008-08-22 Thread cfp
CALL FOR PAPERS - Hackers 2 Hackers Conference 5th edition The call for papers for H2HC 5th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from 8 to 9 November 2008. [ - Introduction - ] For the fifth consecutive years and past success we have been

Contest: Best Advances for OpenVAS Network Vulnerability Tests

2008-08-22 Thread Michael Wiegand
Hello, The OpenVAS Team (Open Vulnerability Assessment System, [1]) has started a contest and calls for submission of patches, scripts, converters or anything else that significantly improves the OpenVAS framework and extends Open Source Network Vulnerability Testing. You are free to choose the

[ MDVSA-2008:179 ] metisse

2008-08-22 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:179 http://www.mandriva.com/security/

RE: TimeTrex Time and Attendance Cookie Theft

2008-08-22 Thread Alex Eden
So, what are the feasible attack vectors?... With the login fields that you show there none... It is, however, a good indication that the rest of the code may be vulnerable, but to stage an XSS attack you need to have user access to a deployed system. -Original Message- From: [EMAIL

[ MDVSA-2008:180 ] libxml2

2008-08-22 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:180 http://www.mandriva.com/security/

Vim: Arbitrary Code Execution in Commands: K, Control-], g]

2008-08-22 Thread Jan Minář
Vim: Arbitrary Code Execution in Commands: K, Control-], g] 1. SUMMARY Product : Vim -- Vi IMproved Versions : 3.0--current, possibly older Impact : Arbitrary code execution Wherefrom: Local Original : http://www.rdancer.org/vulnerablevim-K.html Insufficient sanitization can lead to Vim

Secunia Research: Trend Micro Products Web Management Authentication Bypass

2008-08-22 Thread Secunia Research
== Secunia Research 22/08/2008 - Trend Micro Products Web Management Authentication Bypass - == Table of Contents Affected

Fedora confirms: Our servers were breached

2008-08-22 Thread Juha-Matti Laurio
New information about the important infrastructure issue affecting to Fedora Project has been released today. Mr. Paul W. Frields, Fedora Project Leader has posted an announcement about the facts, including: One of the compromised Fedora servers was a system used for signing Fedora packages.

Apple OSX Leopard (10.5+), inadequate ACL insight can create vuln

2008-08-22 Thread bgtrq . tryfixingit
OSX 10.5 Leopard has activated ACL use and gives ACLs preference over standard POSIX permission bits. Apple's Get Info GUI sets and displays an odd and confusing mix of POSIX and ACL settings, leaving plenty of room for confused security. Unfortunately, there are not yet adequate tools to

Re: Null Byte Local file Inclusion in FAR - PHP Project version:1.0

2008-08-22 Thread William McAfee
I'm sorry, but your screenshot actually leads me to not have much more confidence. I noticed your titlebar is modified, so that tells me the script is most likely modified in some way. Provide us with a pure script, please. Also, on an unrelated note, why are you running professional? Why did

[oCERT-2008-008] multiple heap overflows in xine-lib

2008-08-22 Thread Will Drewry
#2008-008 multiple heap overflows in xine-lib Description: The xine free multimedia player suffers from a number of vulnerabilities ranging in severity. The worst of these vulnerabilities results in arbitrary code execution and the least, in unexpected process termination. Five heap buffer

Re: RE: TimeTrex Time and Attendance Cookie Theft

2008-08-22 Thread hi
Even if it did work, the user would have to submit the form with the username or password fields containing the exploit code rather then enter their own information. Pretty unlikely to pull off. Regardless I talked to the developers and any potential issue will be fixed in v2.2.13 which is

[SECURITY] [DSA 1631-1] New libxml2 packages fix denial of service

2008-08-22 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1631-1 [EMAIL PROTECTED] http://www.debian.org/security/ Steve Kemp August 22, 2008

Re: Fedora confirms: Our servers were breached

2008-08-22 Thread Dragos Ruiu
On 22-Aug-08, at 7:41 AM, Juha-Matti Laurio wrote: New information about the important infrastructure issue affecting to Fedora Project has been released today. Mr. Paul W. Frields, Fedora Project Leader has posted an announcement about the facts, including: One of the compromised Fedora