Network Security News – Friday, April 22, 2005 Events
Postgrey Logging Function Format String DoS
Postgrey contains a flaw that may allow a remote denial of service. The issue is due to a format string error in syslog/printf functions. By sending a mail with a specially crafted sender address, an attacker can crash the service, resulting in loss of availability for the platform.. Read more at osvdb.org/15517
PHPX Cookie PXL Value Modification Account Hijacking
PHPX contains a flaw that may allow a malicious user to hijack other accounts. The issue is triggered when an attacker modifies the cookie's PXL value and submits it to the site. This can be used to hijack arbitrary accounts including the administrative account.. Read more at osvdb.org/15661
OS/400 Incoming Remote Command Remote DoS
IBM OS/400 contains a flaw that may allow a remote denial of service. The issue is triggered when specially crafted data is sent to the Incoming Remote Command service, and will result in loss of availability for the above service.. Read more at osvdb.org/15651
Microsoft Windows Explorer Web View Arbitrary Script Insertion
Microsoft Windows Explorer contains a flaw that may allow a malicious user to insert arbitrary scripts. The issue is due to an input validation error in the Web View library (webvw.dll). By tricking a user to select a malicious word document with a specially crafted author name in Windows Explorer, an attacker can execute arbitrary HTML and scripts with the logon user's privileges.. Read more at osvdb.org/15707
Microsoft IIS Malformed GET Request TCP Header Internal IP Disclosure
Microsoft Internet Information Services (IIS) contains a flaw that may lead to an unauthorized information disclosure. Өe issue is triggered when sending a specially crafted HTTP GET request, which will disclose the internal IP address in the TCP header resulting in a loss of confidentiality.. Read more at osvdb.org/15330
Mac OS X AppleWebKit Local Domain JavaScript Execution
Mac OS X contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to XMLHttpRequest granting read access to any file on the system with a known path that the user has access to. This may allow an attacker to place an HTML file on the user's system, which can then be accessed to execute arbitrary code.. Read more at osvdb.org/15637
htdig htsearch Non-existent Configuration Path Disclosure
Htdig contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a non-existent configuration file is specified, which will disclose the path location of the configuration files resulting in a loss of confidentiality.. Read more at osvdb.org/292
xv PDS Decoder Format String
XV contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered by a format string error in the PDS Decoder. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.. Read more at osvdb.org/15680
Yager Data Block Remote Overflow
THQ's Yager contains a flaw that may allow a malicious user to remote execute malicious code with the privileges of the user running the application. The issue is due to the application failing to properly validate the length of user-supplied, network derived data blocks with a maximum size of 65536 bits prior to copying them into a static buffer with a maximum size of 256 bytes. It is possible that the flaw may allow privilege escalation or unauthorized access resulting in a loss of confidentiality and/or integrity.. Read more at osvdb.org/15508
Yager Nickname Field Remote Overflow
A remote overflow exists in THQ's Yager. Yager fails to check the length of the nickname field (ID 0x1e) resulting in a buffer overflow. Using specially crafted input, an attacker can cause remote code execution resulting in a loss of confidentiality and/or integrity.. Read more at osvdb.org/15507
MPlayer RTSP Server Line Response Remote Buffer Overflow Vulnerability
MPlayer is a multimedia video and audio application. It is freely available for Unix and Unix variants as well as Microsoft Windows. MPlayer supports multiple streaming p…
. Read more at securityfocus.com/bid/13270?ref=rss
MPlayer MMST Stream ID Remote Buffer Overflow Vulnerability
MPlayer is a multimedia video and audio application. It is freely available for Unix and Unix variants as well as Microsoft Windows. MPlayer supports multiple streaming p…
. Read more at securityfocus.com/bid/13271?ref=rss
Raz-Lee Security+++ Suite Input Validation Vulnerability
Raz-Lee Security+++ Suite is hardening software for IBM iSeries AS400 platforms.Raz-Lee Security+++ Suite is prone to an input validation vulnerability. Reports indicat…
. Read more at securityfocus.com/bid/13310?ref=rss
Palace Guard Software Secure/NET+ Input Validation Vulnerability
Palace Guard Software Secure/NET+ is hardening software for IBM iSeries AS400 platforms.Palace Guard Software Secure/NET+ is prone to an input validation vulnerability….
. Read more at securityfocus.com/bid/13311?ref=rss
PowerTech PowerLock Input Validation Vulnerability
PowerTech PowerLock is hardening software for IBM iSeries AS400 platforms.PowerTech PowerLock is prone to an input validation vulnerability. Reports indicate that the s…
. Read more at securityfocus.com/bid/13312?ref=rss
IBM iSeries AS400 FTP Service Directory Traversal Vulnerability
IBM iSeries AS400 FTP Service is susceptible to a directory traversal vulnerability.This vulnerability presents itself when a '/../../../' argument is passed to 'Get' F…
. Read more at securityfocus.com/bid/13298?ref=rss
Vulnerability kali's tagboard
Sender: piker piker [piker_666 at hotmail dot com]
. Read more at securityfocus.com/archive/1/396609?ref=rss
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords
Sender: Stephen Frost [sfrost at snowman dot net]
. Read more at securityfocus.com/archive/1/396619?ref=rss
xine security announcement: multiple heap overflows in MMS and Real RTSP streaming clients
Sender: Michael Roitzsch [mroi at users dot sourceforge dot net]
. Read more at securityfocus.com/archive/1/396615?ref=rss
Re: [HACKERS] Postgres: pg_hba.conf, md5, pg_shadow, encrypted passwords
Sender: Lance James [lancej at securescience dot net]
. Read more at securityfocus.com/archive/1/396610?ref=rss
Leave a Reply