Computer Security
[EN] securityvulns.ru no-pyccku


Sendmail mail server race conditions
updated since 22.03.2006
Published:24.03.2006
Source:
SecurityVulns ID:5929
Type:remote
Threat Level:
9/10
Description:Race conditions on signals processing with setjmp/longjmp allow remote code execution.
Affected:SENDMAIL : Sendmail 8.12
 SENDMAIL : Sendmail 8.13
 FREEBSD : FreeBSD 4.10
 FREEBSD : FreeBSD 5.3
 FREEBSD : FreeBSD 5.4
 FREEBSD : FreeBSD 4.11
 FREEBSD : FreeBSD 6.0
 FREEBSD : FreeBSD 6.1
 FREEBSD : FreeBSD 5.5
Original documentdocumentJack, [Full-disclosure] sendmail stuff2 (24.03.2006)
 documentCERT, US-CERT Technical Cyber Security Alert TA06-081A -- Sendmail Race Condition Vulnerability (23.03.2006)
 documentSENDMAIL, Sendmail 8.13.6 release notes (22.03.2006)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-06:13.sendmail (22.03.2006)
Files:sendmail tester draft

Password Safe 3.0beta weak cryptography in PRNG
Published:24.03.2006
Source:
SecurityVulns ID:5940
Type:local
Threat Level:
5/10
Description:rand() is used on systems different from Windows XP.
Original documentdocumentinfo_(at)_elcomsoft.com, PasswordSafe 3.0 weak random number generator allows key recovery attack (24.03.2006)

ISS BlackICE / ISS RealSecure intrusion prevention systems privilege escalation
Published:24.03.2006
Source:
SecurityVulns ID:5941
Type:local
Threat Level:
5/10
Description:Help subsystem is launched under Local System account.
Affected:ISS : BlackIce 3.6
 ISS : RealSecure Desktop 3.6
 ISS : RealSecure Desktop 7.0
Original documentdocumentIDEFENSE, iDefense Security Advisory 03.23.05: ISS Multiple Products Local Privilege Escalation Vulnerability (24.03.2006)

NetHack, Slash'EM, Falcon's Eye games privilege escalation
Published:24.03.2006
Source:
SecurityVulns ID:5942
Type:local
Threat Level:
5/10
Description:User from games group can modify game data to cause code execution if game is executed by another user.
Affected:NETHACK : nethack 3.4
 FALCONSEYE : falconseye 1.9
 SLASHEM : slashem 0.0
Original documentdocumentGENTOO, [ GLSA 200603-23 ] NetHack, Slash'EM, Falcon's Eye: Local privilege escalation (24.03.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:24.03.2006
Source:
SecurityVulns ID:5943
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:COMOBLOG : CoMoblog 1.1
 ARABPORTAL : ArabPortal 2.0
 PUBCOOKIE : Pubcookie 3.3
 EASYMOBLOG : EasyMoblog 0.5
 ATONE : @1 File Store 2006.03.07
Original documentdocumentAliaksandr Hartsuyeu, [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities (24.03.2006)
 documentSECUNIA, [SA19370] EasyMoblog "img.php" Cross-Site Scripting Vulnerability (24.03.2006)
 documentSECUNIA, [SA19348] Pubcookie Cross-Site Scripting Vulnerabilities (24.03.2006)
 documentSECUNIA, [SA19379] CoMoblog "img.php" Cross-Site Scripting Vulnerability (24.03.2006)

HP-UX swagentd DoS
updated since 24.03.2006
Published:25.03.2006
Source:
SecurityVulns ID:5944
Type:remote
Threat Level:
5/10
Affected:HP : HP-UX 11.00
 HP : HP-UX 11.11
 HP : HP-UX 11.04
Original documentdocumentHP, [security bulletin] HPSBUX02105 SSRT061134 rev.1 - HP-UX Running swagentd Remote Denial of Service (DoS) (25.03.2006)
 documentSECUNIA, [SA19373] HP-UX swagentd Denial of Service Vulnerability (24.03.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod