hi,
setting 750 on /etc/cron.* would stop this exploit
/lars
if ( !( child = fork() )) {
chdir(/etc/cron.d);
prctl(PR_SET_DUMPABLE, 2);
sleep(200);
exit(1);
___
Full-Disclosure - We believe in it.
Charter:
Hi,
In my opinion, there are two possibilities... the
injected code is executed in the context of the banned
website, or the injected code is executed in the
context of the Access denied-page served by
MIMESweeper.
The latter would be the case if MIMESweeper redirects
to a page of its own, the
good job,sowhat
-邮件原件-
发件人: Sowhat [mailto:[EMAIL PROTECTED]
发送时间: 2006年7月12日 10:17
收件人: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk
主题: Microsoft Excel Array Index Error Remote Code Execution
Microsoft Excel Array Index Error Remote Code Execution
By Sowhat of
===
Ubuntu Security Notice USN-317-1 July 13, 2006
zope2.8 vulnerability
CVE-2006-3458
===
A security issue affects the following Ubuntu releases:
Ubuntu 5.10
This
===
Ubuntu Security Notice USN-318-1 July 13, 2006
libtunepimp vulnerability
http://bugs.musicbrainz.org/ticket/1764
===
A security issue affects the following Ubuntu
CoffeeWars HQ
Undisclosed Location
Not near Dick Cheney's
(we have no idea where he stays,
although
Salut,
On Tue, 2006-07-11 at 18:42 +0100, n3td3v wrote:
Microsoft could collapse under its own weight if a *major* unpatched
Microsoft Windows 98 vulnerability comes along.
This is illusionary. Windows NT 4.0 was much more important as a
product, and not much after support stopped, the whole
Salut,
On Thu, 2006-06-29 at 20:55 +, Bill Weiss wrote:
In case others didn't catch it, IQ is _defined_ as a normal distribution
with the mid-point at 100. Thus, half of the population has a
double-digit IQ. The criteria for a 100 IQ is recalculated every once in
a while to maintain the
On Sun, 13 Nov 2005 17:02:39 -0800 n3td3v
wrote:
Yet another fuckwit basing their opinion on someone they don't
know.
If it wasn't for me you wouldn't have an internet to sent your
packets
on right now. You take people at face value instead of getting to
know
them first.
0101 01101110
This doesn't mean that W98 is secure. On Secunia's site the latest
(corrected) vulnerability is dated 20060613, less than 1 month ago, and
tomorrow someone could find a new one that won't be corrected.
Sure, that could happen but seeing how there are only two known exploits
published in 2006 for
On 7/13/06, Castigliola, Angelo [EMAIL PROTECTED] wrote:
This doesn't mean that W98 is secure. On Secunia's site the latest(corrected) vulnerability is dated 20060613, less than 1 month ago, andtomorrow someone could find a new one that won't be corrected.
Sure, that could happen but seeing how
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:123
http://www.mandriva.com/security/
Debian Development Machine Hacked
http://lists.debian.org/debian-devel-announce/2006/07/msg3.html
or
http://www.zone-h.org/content/view/13853/31/
Confirmed hacked by:
Linux Kernel PRCTL Core Dump Handling Privilege Escalation Vulnerability
http://www.debian.org/News/2006/20060713
rPath Security Advisory: 2006-0122-2
Published: 2006-07-07
Updated:
2006-07-13 Upgraded to Critical status with additional information
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
Local Root Deterministic Privilege Escalation
Updated Versions:
kernel=/[EMAIL
Escalation Vulnerability
http://www.debian.org/News/2006/20060713
or
http://www.zone-h.org/content/view/13853/31/ ( updated )
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted
lity
http://www.debian.org/News/2006/20060713
or
http://www.zone-h.org/content/view/13853/31/ ( updated )
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://s
David Taylor wrote:
Curious why Secunia is rating this as 'less critical'. The way I see it,
this exploit could be integrated into the other exploits for mambo,
joomla,
phpbb, etc. Also, all of us that have websites hosted on linux machines
that have a vulnerable kernel could get root?
I'm
On Thu, 13 Jul 2006, David Taylor wrote:
Curious why Secunia is rating this as 'less critical'. The way I see it,
this exploit could be integrated into the other exploits for mambo, joomla,
phpbb, etc. Also, all of us that have websites hosted on linux machines
that have a vulnerable kernel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 7/13/06, lars brun nielsen [EMAIL PROTECTED] wrote:
hi,
setting 750 on /etc/cron.* would stop this exploit
Incorrect. Did you even try this on ONE vulnerable box? The
vulnerability exists BECAUSE the kernel doesn't enforce directory
Matt Murphy write:If you actually bothered to read ANY of the vendor advisories on thisissue, you'd know why. The vulnerability exists because the kernelDOES NOT VERIFY write permissions to core dump directories. If your
users actually have write permissions to /etc/cron.d, do the world afavor
On Thu, 13 Jul 2006, Matthew Murphy wrote:
setting 750 on /etc/cron.* would stop this exploit
Incorrect. Did you even try this on ONE vulnerable box? The
vulnerability exists BECAUSE the kernel doesn't enforce directory
permissions when writing a core dump.
You cannot chdir to (or access a
Michal Zalewski wrote:
On Thu, 13 Jul 2006, Matthew Murphy wrote:
setting 750 on /etc/cron.* would stop this exploit
Incorrect. Did you even try this on ONE vulnerable box? The
vulnerability exists BECAUSE the kernel doesn't enforce directory
permissions when writing a core dump.
You
Dear Matt,This is silly, you are a lying jigaboo. That is of course unless the machine you tested on was compiled with the CONFIG_ALLOW_MATT_MURPHY_TO_RUN_HIS_MOUTH_AND_CHDIR_INTO_NON_EXECUTABLE_DIRECTORIES option. This option hasn't been on by default in any distribution since Redhat
6.2 as far
Title: Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know
Hi guys,
Im looking for vulnerabilities or other weaknesses in our GreenBorder Pro (application virtualization and isolation) product. I invite you to download and hammer it. Please tell me of any
On 7/14/06, Bill Stout [EMAIL PROTECTED] spammed:
Hi guys,
I'm looking for vulnerabilities or other weaknesses in our GreenBorder Pro
(application virtualization and isolation) product. I invite you to
download and hammer it. Please tell me of any vulnerability you may find.
how about
it seems that this relies on /etc/cron.d being there? or is it specific
to a crond? I use fcron which doesn't use /etc/cron.d and I have been
unable to get the exploit to successfully work. 2.6.14 kernel
sh: /tmp/sh: No such file or directory
I'm running gentoo-sources without selinux or
26 matches
Mail list logo