===
Ubuntu Security Notice USN-828-1 September 08, 2009
pam vulnerability
https://launchpad.net/bugs/410171
===
A security issue affects the following Ubuntu releases:
Ubuntu
All,
Immunet Protect is now in the 4th round of public beta. This is free beta AV
software which has been pre-tested extensively by a portion of the Bugtraq
community and is now available for general download to the rest of the
community.
The general idea is that it allows you to build
Hi,
Please find the following Advisory
http://www.dokfleed.net/duh/modules.php?name=Newsfile=articlesid=37
Regards
DokFLeed
Advisory No.: ISNSC-0910
=
ChartDirector Critical File Access
Information
==
Author: DokFLeed
Program
Creating multiple RDP connection at the same time causes Windows to
Blue Screen. Here is the Proof of Concept code.
for /L %i in (1,1,20) do mstsc /v:127.0.0.%i
It does work on Windows 7 and some Vista installations.
-Tim Medin
We are glad to announce the first international security conference in
Italy, SeacureIT Preview 2009.
The conference will take place between 21st and 23rd October at Fiera
Milano City, Milan's conference and trade show center, co-located with
SMAU, Italy's largest ICT tradeshow.
The conference
Hello MaXe!
However, I just tested the vulnerability in chrome and the incidents were
different.
As I said on my system it's solely Chrome DoS vulnerability. On my system
with Firefox 3.0.13 (and previous versions, when I tested them before) there
is not such issue, when Firefox was DoSed via
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Krakow Labs Development
4f: The File Format Fuzzing Framework
4f is a file format fuzzing framework. 4f uses modules which are
specifications of the targeted binary or text file format that tell it
how to fuzz the target application.
If 4f detects a crash, it will log crucial information
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Does anyone have a reference pointing to the original announcement on here for
these vulnerabilities? I would like to research them regarding the potential
continued vulnerability of XP, since MS did not provide a patch for XP products.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200909-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA-1882-1secur...@debian.org
http://www.debian.org/security/ Nico Golde
September 9th, 2009
/*
*
* SMB SRV2.SYS Denial of Service PoC
* Release Date: Sep 8, 2009
* Severity: Medium/High
* Systems Affected: Windows Vista SP1+SP2, Windows 2008 SP2, Windows 7 Beta +
RC
* Discovered by: Laurent Gaffié
*
* Description:
* SRV2.SYS fails to handle malformed SMB
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://www.coresecurity.com/corelabs/
Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server
1. *Advisory Information*
Title: Dnsmasq Heap Overflow and Null-pointer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:226
http://www.mandriva.com/security/
I could not reproduce this on Vista Home Premium or Windows 7 Ultimate
(different computers, both 64-bit) even with creating 200 connections.
Could you provide more information on your setup?
Tim Medin wrote:
Creating multiple RDP connection at the same time causes Windows to
Blue Screen.
b...@home.com wrote:
Does anyone have a reference pointing to the original announcement on
here for these vulnerabilities? I would like to research them
regarding the potential continued vulnerability of XP, since MS did
not provide a patch for XP products.
CERT-FI was the coordinator for
Cannot reproduce.
Windows XP SP2
Unable to reproduce on Vista Ultimate x64-all patch levels.
John Menerick
www.securesql.info
On Sep 8, 2009, at 11:35 AM, Tim Medin wrote:
Creating multiple RDP connection at the same time causes Windows to
Blue Screen. Here is the Proof of Concept code.
for /L %i in (1,1,20) do mstsc
Cannot reproduce, either, XP SP3.
Maybe you were really low on RAM?
-Original Message-
From: nob...@nowhere.com [mailto:nob...@nowhere.com]
Sent: Wednesday, September 09, 2009 3:29 PM
To: bugtraq@securityfocus.com
Subject: Re: Re: Multiple RDP Connections BSOD DOS
Cannot reproduce.
26 matches
Mail list logo