Security Update: [CSSA-2003-013.0] Linux: integer overflow vulnerability in XDR/RPC routines

2003-03-20 Thread security
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] __ SCO Security Advisory Subject:Linux: integer overflow vulnerability in XDR/RPC routines Advisory number:

[ESA-20030320-010] Several vulnerabilities in the OpenSSL toolkit.

2003-03-20 Thread EnGarde Secure Linux
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ++ | EnGarde Secure Linux Security Advisory March 20, 2003 | | http://www.engardelinux.org/ ESA-20030320-010

[RHSA-2003:088-01] New kernel 2.2 packages fix vulnerabilities

2003-03-20 Thread bugzilla
- Red Hat Security Advisory Synopsis: New kernel 2.2 packages fix vulnerabilities Advisory ID: RHSA-2003:088-01 Issue date:2003-03-20 Updated on:2003-03-20 Product: Red

Microsoft Security Bulletin MS03-009: Flaw In ISA Server DNS IntrusionDetection Filter Can Cause Denial Of Service (331065) (fwd)

2003-03-20 Thread Dave Ahmad
David Mirza Ahmad Symantec sabbe dhamma anatta 0x26005712 8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12 -- Forwarded message -- -BEGIN PGP SIGNED MESSAGE- - --- Title: Flaw In ISA

[Sorcerer-spells] GLIBC-SORCERER2003-03-20

2003-03-20 Thread Michael Walton
Sorcerer Update Advisory Tap Into the Source Source Name:glibc-2.3.2 Advisory ID:SORCERER2003-03-20-2 Date:

Fwd: CERT Advisory CA-2003-10 Integer overflow in Sun RPC XDR library routines

2003-03-20 Thread Muhammad Faisal Rauf Danka
*** There is an attachment in this mail. *** _ --- [ATTITUDEX.COM] http://www.attitudex.com/ --- _ Select your own custom email

[Sorcerer-spells] LINUX-SORCERER2003-03-20

2003-03-20 Thread Michael Walton
Sorcerer Update Advisory Tap Into the Source Source Name:linux-2.4.20 Advisory ID:SORCERER2003-03-19 Date:

[IPS] osCommerce multiple XSS vulnerabilities

2003-03-20 Thread Daniel Alcántara de la Hoz
iProyectos Security Advisory: XSS Bugs in osCommerce 1. Problem description. 2. Risk 3. Solution 4. Manual fix 5. About iProyectos 1. Problem description: osCommerce is a widely installed open source shopping e-commerce

[OpenPKG-SA-2003.025] OpenPKG Security Advisory (mutt)

2003-03-20 Thread OpenPKG
: Affected Packages:Corrected Packages: OpenPKG CURRENT = mutt-1.4i-20030103 = mutt-1.4.1i-20030320 OpenPKG 1.2 = mutt-1.4i-1.2.0= mutt-1.4i-1.2.1 OpenPKG 1.1 = mutt-1.4i-1.1.0= mutt-1.4i-1.1.1 Dependent Packages: none Description: According

Re: PROBLEMS WITH WINDOWS SHORTCUTS

2003-03-20 Thread Dan Daggett
Verified on Windows XP Pro SP1. Crashes Explorer everytime. /Alex Kiwerski On a side note, if you browse to the folder through an application and the application is set to view all file types it will crash the application instead of explorer. I have tested this with Windows XP Pro SP1 in

Safeboot PC Security User Emuneration Vulnerability

2003-03-20 Thread Advisories
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- IRM Security Advisory No. 003 Safeboot PC Security User Emuneration Vulnerability Vulnerablity Type / Importance: User Enumeration / Medium Problem discovered: Fri, 31 Jan 2003

[Sorcerer-spells] KRB5-SORCERER2003-03-20

2003-03-20 Thread Michael Walton
Sorcerer Update Advisory Tap Into the Source Source Name:krb5-1.2.7 Advisory ID:SORCERER2003-03-20-1 Date:

IBM Tivoli Firewall Security Toolbox buffer overflow vulnerability

2003-03-20 Thread Niels Heinen
*** Subject : IBM Tivoli Firewall Security Toolbox (TFST) remote buffer overflow vulnerability Version : Tivoli Firewall Toolbox version 1.2 Platform: All supported platforms

CORE-20030304-02: Vulnerability in Mutt Mail User Agent

2003-03-20 Thread CORE Security Technologies Advisories
Core Security Technologies Advisory http://www.coresecurity.com Vulnerability in Mutt Mail User Agent Date Published: 2003-03-20 Last Update: 2003-03-19 Advisory ID: CORE-20030304-02 Bugtraq ID: 7120 CVE CAN: None currently

[OpenPKG-SA-2003.026] OpenPKG Security Advisory (openssl)

2003-03-20 Thread OpenPKG
Packages: Corrected Packages: OpenPKG CURRENT = openssl-0.9.7a-20030317 = openssl-0.9.7a-20030320 OpenPKG 1.2 = openssl-0.9.7-1.2.2 = openssl-0.9.7-1.2.3 OpenPKG 1.1 = openssl-0.9.6g-1.1.2= openssl-0.9.6g-1.1.3 Affected Releases: Dependent Packages

Opara 6.06 Released, Security-Hole Left

2003-03-20 Thread nesumin
Opera Software released Opera 6.06. However, the security hole that we had released on Feb 9th, 2003 (Opera Username Buffer Overflow Vulnerability [http://www.securityfocus.com/archive/1/311194]) has not been fixed yet. Opera 6.06 still has this security hole, to which we should pay heed. Here

[SCSA-011] Path Disclosure Vulnerability in XOOPS

2003-03-20 Thread Grégory
Security Corporation Security Advisory [SCSA-011] PROGRAM: XOOPS HOMEPAGE: http://www.xoops.org/ VULNERABLE VERSIONS: v2.0 (and prior ?)