Bugtraq: by date

266 messages starting Dec 31 97 and ending Apr 29 00
Date index | Thread index | Author index


Wednesday, 31 December

Timbuktu Pro 2.0b650 MBernheim

Thursday, 30 March

Re: Alert: Cart32 secret password backdoor (CISADV000427) Knud Erik Højgaard

Friday, 31 March

fcheck v.2.7.45 and insecure use of Perl's system() Matt Carothers

Saturday, 01 April

Addendum to MS00-019 Microsoft Security Response Center
TESO advisory - BinTec router Stephan Holtwisch

Sunday, 02 April

Re: Local Denial-of-Service attack against Linux Jeff Dafoe

Monday, 03 April

Win32 RealPlayer 6/7 Buffer Overflow Adam Muntner
Re: Local Denial-of-Service attack against Linux Gigi Sullivan
Microsoft Security Bulletin (MS00-022) Microsoft Product Security
New Allaire Security Zone Bulletin Posted Aleph One
Re: Fwd: ircii-4.4 buffer overflow Crispin Cowan

Tuesday, 04 April

WebObjects DoS Bruce Potter
Re: IMAIL (Ipswitch) DoS with Eudora (Qualcomm) Anthony Santen

Wednesday, 05 April

Security Bulletins Digest patrick () PINE NL
SilverBack Security Advisory: Nbase-Xyplex DoS Mark McLaughlin
minor issue with IBM HTTPD and /usr/bin/ikeyman Rude Yak
PcAnywhere weak password encryption Pascal Longpre

Thursday, 06 April

The Sentinel Project Marshall
Re: IMAIL (Ipswitch) DoS with Eudora (Qualcomm) Jeff Beckley
Re: IMAIL (Ipswitch) DoS with Eudora (Qualcomm) Anthony Santen

Friday, 07 April

More info on MS00-019 rain forest puppy
BeOS Networking DOS Tim Newsham

Sunday, 09 April

A funny way to DOS pcANYWHERE8.0 and 9.0 Frankie Zie
Announcement: TrustedBSD Extensions Project Robert Watson

Monday, 10 April

Building a Bastion Host Using HP-UX 11 Kevin Steves
linux trustees 1.5 long path name vulnerability Andrey E. Lerman
BeOS syscall bug Konstantin Boldyshev
CRYPTOAdmin 4.1 server with PalmPilot PT-1 token 1.04 PIN Extract ion Kingpin
Re: A funny way to DOS pcANYWHERE8.0 and 9.0 Christopher Schulte
Re: A funny way to DOS pcANYWHERE8.0 and 9.0 Chris McDaniel
FreeBSD Security Advisory: FreeBSD-SA-00:11.ircii FreeBSD Security Officer
FreeBSD Security Advisory: FreeBSD-SA-00:12.healthd FreeBSD Security Officer
Re: A funny way to DOS pcANYWHERE8.0 and 9.0 Ken Eaton
Re: FreeBSD Security Advisory: FreeBSD-SA-00:11.ircii matthew green
Re: FreeBSD Security Advisory: FreeBSD-SA-00:11.ircii Kris Kennaway

Tuesday, 11 April

Re: TB2 Pro sending NT passwords cleartext tbenzion () NETOPIA COM
Back Door in Commercial Shopping Cart Joe
Re: TESO advisory - BinTec router aleph1 () securityfocus com
Re: TB2 Pro sending NT passwords cleartext Dan Kaminsky

Wednesday, 12 April

Timbuktu DoS repaired by Netopia Laurent LEVIER
Microsoft Security Bulletin (MS00-023) Microsoft Product Security
TalentSoft Web+ Input Validation Bug Vulnerability John P. McNeely
Infonautic's getdoc.cgi may allow unauthorized access to documents Elias Levy
Weak Token in Mail.Com Application Allows Compromise of Arbitrary User's Data Elias Levy
Performance Copilot for IRIX 6.5 Marcelo Magnasco
BizDB Search Script Enables Shell Command Execution at the Server Black Watch Labs
Microsoft Security Bulletin (MS00-024) Microsoft Product Security

Thursday, 13 April

Re: Back Door in Commercial Shopping Cart Luciano Ramos
Re: Back Door in Commercial Shopping Cart Pete Holsberg
Re: A funny way to DOS pcANYWHERE8.0 and 9.0 Alesh Mustar
webplus security hole TalentSoft.Support
Re: A funny way to DOS pcANYWHERE8.0 and 9.0 Christopher Schulte
Re: Back Door in Commercial Shopping Cart Anik

Friday, 14 April

RFP2K02: "Netscape engineers are weenies!" rain forest puppy
more problems with that POS dansie cart software! tombow
Re: more problems with that POS dansie cart software! Randy Janinda
[TL-Security-Announce] PAM and usermode TLSA2000009-1 Katie Moussouris
Re: Back Door in Commercial Shopping Cart Luciano Ramos
Re: Back Door in Commercial Shopping Cart Kragen Sitaker
Re: Back Door in Commercial Shopping Cart [Stormer Hosting] Dan Kaminsky
DVWSSR.dll Buffer Overflow Vulnerability in Microsoft IIS 4.0 Web Servers Gerardo Richarte
Microsoft Security Bulletin (MS00-025) Microsoft Product Security
Re: Back Door in Commercial Shopping Cart tyson
qnx crypt comprimised Sean
nmh-1.0.4 released Dan Harkless
Microsoft Security Bulletin (MS00-025) Microsoft Product Security

Saturday, 15 April

(no subject) eAX [Teelicht]

Sunday, 16 April

imapd4r1 v12.264 Michal Zalewski
xfs Michal Zalewski
StarOffice 5.1 Michal Zalewski
XFree86 server overflow Michal Zalewski
XFree86 server overflow - exploit issues Michal Zalewski
Re: more problems with that POS dansie cart software! Pete Holsberg
Reappearance of an old IE security bug Ben Mesander

Monday, 17 April

Re: KEN! security hole (was: -no subject-) Thorsten Claus
Re: XFree86 server overflow Olaf Kirch
Re: XFree86 server overflow Valentin Pavlov
Re: imapd4r1 v12.264 Tibor Pittich
Re: Reappearance of an old IE security bug Vladimir Dubrovin
Announcing: Solaris Fingerprint Database (sfpDB) on SunSolve Casper Dik
Re: imapd4r1 v12.264 Sven Carstens
New DOS on Interscan NT/3.32 Alain Thivillon
bugs in Panda Security 3.0 |Zan
Microsoft Security Bulletin (MS00-025) Microsoft Product Security
Re: XFree86 server overflow Pawe³ Sakowski
Re: Back Door in Commercial Shopping Cart [RESOLVED] Dan Kaminsky
RAZOR Analysis of dvwssr.dll Simple Nomad
response to the bugtraq report of buffer overruns in imapd LIST command Mark Crispin
xfs security issues (fwd) Chris Evans
Re: response to the bugtraq report of buffer overruns in imapd LIST command Theo de Raadt
Re: response to the bugtraq report of buffer overruns in imapd LIST command Mark Crispin
Cooments on the dvwssr.dll vulnerability threads Iván Arce
Re: response to the bugtraq report of buffer overruns in imapd LIST command Kris Kennaway
Re: response to the bugtraq report of buffer overruns in imapd LISTcommand Peter da Silva
Re: response to the bugtraq report of buffer overruns in imapd LIST command R. C. Dowdeswell
Re: response to the bugtraq report of buffer overruns in imapd LIST command Mark Crispin
Re: response to the bugtraq report of buffer overruns in imapd LIST command der Mouse
Re: response to the bugtraq report of buffer overruns in imapd LIST command Warner Losh

Tuesday, 18 April

Re: Cooments on the dvwssr.dll vulnerability threads David LeBlanc
Re: response to the bugtraq report of buffer overruns in imapd LIST command Darren Moffat - Solaris Sustaining Engineering
RUS-CERT Advisory 200004-01: GNU Emacs 20 RUS-CERT, University of Stuttgart
Novell Netware 5.1 (server 5.00h, Dec 11, 1999)... Michal Zalewski
IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy) Georgi Guninski
Re: Announcing: Solaris Fingerprint Database (sfpDB) on SunSolve Morten Welinder
Last call for extended abstracts - Raid 2000 - Deadline is April 30th Herve Debar
pwdump2 for Active Directory Todd Sabin
More vulnerabilities in FP Narrow
Re: response to the bugtraq report of buffer overruns in imapd LIST command Henrik Nordstrom

Wednesday, 19 April

Re: Announcing: Solaris Fingerprint Database (sfpDB) on SunSolve Alec Muffett
Re: More vulnerabilities in FP The Cyberiad
Network Security and Privacy JavaMan
Re: More vulnerabilities in FP The Cyberiad
AVM's Statement eAX [Teelicht]
Adtran DoS Mike Ireton
Re: New DOS on Interscan NT/3.32 Dan Schrader
Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability psirt () CISCO COM
Re: RUS-CERT Advisory 200004-01: GNU Emacs 20 Dan Harkless
FreeBSD Security Advisory: FreeBSD-SA-00:13.generic-nqs FreeBSD Security Officer
Re: Reappearance of an old IE security bug Elias Levy
pop3d/imap DOS (while we're on the subject) Alex Mottram
Re: Network Security and Privacy B Potter
Re: RUS-CERT Advisory 200004-01: GNU Emacs 20 Valdis.Kletnieks () VT EDU
Re: RUS-CERT Advisory 200004-01: GNU Emacs 20 Glynn Clements
Re: No-Exec Stack Smashing 101 Crispin Cowan
GNU/Linux Richard Stallman
Re: Reappearance of an old IE security bug Darren Reed

Thursday, 20 April

Remote DoS attack in Real Networks Real Server Vulnerability Ussr Labs
Re: Novell Netware 5.1 (server 5.00h, Dec 11, 1999)... Roy Sigurd Karlsbakk
Re: Network Security and Privacy Cold Fire
Re: RUS-CERT Advisory 200004-01: GNU Emacs 20 Florian Weimer
Cisco Security Advisory: Cisco IOS Software TELNET Option Handling Vulnerability Cisco Systems Product Security Incident Response Team
DOS attack against HP JetDirect Printers (fwd) Alfred Huger
RFP2K03: Contemplations on dvwssr.dll and its affects on life rain forest puppy
pop3 spoon spoon
Re: More vulnerabilities in FP .sozni
Re: Network Security and Privacy dynamo
Re: DOS attack against HP JetDirect Printers (fwd) Ed Padin
Re: DOS attack against HP JetDirect Printers (fwd) Hobbes Gobs Llin
Microsoft Security Bulletin (MS00-026) Microsoft Product Security
another WU imapd buffer overflow Michal Szymanski
Re: IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy) TAKAGI, Hiromitsu
Re: DOS attack against HP JetDirect Printers (fwd) Gwendolynn ferch Elydyr
ZoneAlarm Wally Whacker
Microsoft Security Bulletin (MS00-027) Microsoft Product Security
Remote vulnerability in LCDproc 0.4 Andrew Hobgood
local user can delete arbitrary files on SuSE-Linux Peter Münster
Remote DoS attack in RealServer David Cotter

Friday, 21 April

Re: More vulnerabilities in FP Thomas Dullien
unsafe fgets() in qpopper 3APA3A
htimage info -- may apply to unix as well Todd Sabin
CMD.EXE overflow (CISADV000420) Cerberus Security Team
Securax Security Advisory: Windows98 contains a serious buffer overflow with long filenameextensions. Zoa_Chien
netkill - generic remote DoS attack stanislav shalunov
SECURITY: [RHSA-2000:012] New openldap packages available Cristian Gafton
Re: DOS attack against HP JetDirect Printers (fwd) Terran Melconian
Re: DOS attack against HP JetDirect Printers (fwd) Ben Woodard
[RHSA-2000:016-02] imwheel buffer overflow bugzilla () REDHAT COM
Re: pop3 Christopher P. Lindsey
Re: DOS attack against HP JetDirect Printers (fwd) John Bock
Libsafe Protecting Critical Elements of Stacks JEFF PFOHL
Microsoft Security Bulletin (MS00-028) Microsoft Product Security
Re: another WU imapd buffer overflow Michal Szymanski

Saturday, 22 April

Re: More vulnerabilities in FP Ron van Daal
Re: pop3 Jason Godsey
Re: Securax Security Advisory: Windows98 contains a serious buffer overflow with long filenameextensions. Bob Fiero
Re: Securax Security Advisory: Windows98 contains a serious buffer overflow with long filenameextensions. Mike Murray
Re: netkill - generic remote DoS attack - Cisco LocalDirectors Ollie Whitehouse
Re: More vulnerabilities in FP Roman
Re: local user can delete arbitrary files on SuSE-Linux Pavel Kankovsky
Re: ZoneAlarm Gary Buckmaster

Sunday, 23 April

CVS DoS Michal Szymanski
gpm-root initgroups() Koblinger Egmont
Postgresql cleartext password storage Robert van der Meulen

Monday, 24 April

Buffer Overflow in version .14 Jesse Schachter
man-exploit for MANPAGER environment and a comment about the IMAP vuln psychoid () GMX NET
mtr-0.41 root exploit Przemyslaw Frasunek
freebsd libncurses overflow Przemyslaw Frasunek
Re: IE 5 security vulnerablity - circumventing Cross-framesecurity policy using Java/JavaScript (and disabling ActiveScripting is not that easy) Georgi Guninski
unsafe fgets() in sendmail's mail.local 3APA3A
Hotmail security hole - injecting JavaScript in IE using "@import url(http://host/hostile.css)" Georgi Guninski
Solaris x86 Xsun overflow. Theodor Ragnar Gislason
Solaris 7 x86 lp exploit Theodor Ragnar Gislason
Re: netkill - generic remote DoS attack stanislav shalunov
Solaris 7 x86 lpset exploit. Theodor Ragnar Gislason
Re: ZoneAlarm Stephen M. Milton
Re: More vulnerabilities in FP Daniel Doèekal
Re: freebsd libncurses overflow Kris Kennaway
Re: freebsd libncurses overflow Bill Fumerola
Re: freebsd libncurses overflow Kris Kennaway
Re: freebsd libncurses overflow Matt Conover
Re: ZoneAlarm Alfred Huger
SECURITY: [RHSA-2000:014-10] Updated piranha packages available Cristian Gafton
Re: CVS DoS Kris Kennaway
Re: mtr-0.41 root exploit Kris Kennaway
Re: Postgresql cleartext password storage Alexandru Popa
Re: DOS attack against HP JetDirect Printers Ben Greenbaum
Re: Solaris 7 x86 lp exploit Laurent LEVIER
Re: Solaris 7 x86 lpset exploit. Laurent LEVIER
Re: CVS DoS Kris Kennaway
FreeBSD Security Advisory: FreeBSD-SA-00:14.imap-uw FreeBSD Security Officer
FreeBSD Security Advisory: FreeBSD-SA-00:15.imap-uw FreeBSD Security Officer
Two Problems in IMP 2 Jose Nazario
piranha default password/exploit Max Vision
finding Meeting Maker passwords using tcpdump mhpower () MIT EDU
Re: Hotmail security hole - injecting JavaScript in IE using "@im port url(http://host/hostile.css)" Microsoft Security Response Center
Re: Libsafe Protecting Critical Elements of Stacks Crispin Cowan

Tuesday, 25 April

Re: freebsd libncurses overflow Przemyslaw Frasunek
Re: Solaris 7 x86 lpset exploit. Theodor Ragnar Gislason
Re: Buffer Overflow in version .14 Alan DeKok
Re: unsafe fgets() in sendmail's mail.local Claus Assmann
ZoneAlarm Vulnerability Alfred Huger
ISS Security Advisory: Backdoor Password in Red Hat Linux Virtual Server Package Aleph One
Solaris Sparc 2.6 & 7 lp/lpset/lpstat root compromise exploit Laurent LEVIER
Re: [RHSA-2000:016-02] [...] exploit Janusz Niewiadomski
Denial of Service Against pcAnywhere. Vacuum
Re: mtr-0.41 root exploit Rogier Wolff
Re: piranha default password/exploit Cristian Gafton
Re: ISS Security Advisory: Backdoor Password in Red Hat Linux Virtual Server Package Cristian Gafton
Re: Libsafe Protecting Critical Elements of Stacks Brandon S. Allbery KF8NH
Re: piranha default password/exploit CDI
Re: mtr-0.41 root exploit Kris Kennaway
Re: Two Problems in IMP 2 Ivan E. Moore II

Wednesday, 26 April

Re: freebsd libncurses overflow Theo de Raadt
Re: More vulnerabilities in FP Ian McDonald
Re: Solaris Sparc 2.6 & 7 lp/lpset/lpstat root compromise exploit Casper Dik
Re: man-exploit for MANPAGER environment... Mariusz Woloszyn
Re: ZoneAlarm Max Vision
Re: Solaris Sparc 2.6 & 7 lp/lpset/lpstat root compromise exploit Dimitri Avgoustakis
Re: Libsafe Protecting Critical Elements of Stacks Andrey Kolishak
Re: Solaris Sparc 2.6 & 7 lp/lpset/lpstat root compromise exploit Theodor R. Gislason
Re: Solaris 7 x86 lpset exploit. Andrew Brown
ISS Security Advisory: Insecure file handling in IBM frcactrl program Aleph One
Modifying NT credential and RAZOR's analysis of dvwsrr.dll Iván Arce
SECURITY: UPDATED - RHSA-2000:014 New Piranha release available Cristian Gafton
Re: Solaris 7 x86 lpset exploit. Len Rose
Re: Solaris 7 x86 lpset exploit. Eugene Ilchenko
Cisco HTTP possible bug: Keith Woodworth
Re: piranha default password/exploit Matt Wilson
Alert: Cart32 secret password backdoor (CISADV000427) Cerberus Security Team

Thursday, 27 April

Re: Solaris Sparc 2.6 & 7 lp/lpset/lpstat root compromise exploit Luc D'Hauwe - Sun Belgium - Enterprise Services
Re: Solaris 7 x86 lpset exploit. Jor
fingerd Psarras Nikos
Solaris/SPARC 2.7 lpset exploit (well not likely !) noir
Re: fingerd Brock Sides
Cartfix Secret Backdoor Patch tool for cart32 Weld Pond
Re: pop3 Kris Kennaway
Re: fingerd Jeremy Rauch
Re: Cisco HTTP possible bug: Jim Duncan
Re: Alert: Cart32 secret password backdoor (CISADV000427) (fwd) Dildog

Friday, 28 April

Re: Solaris 7 x86 lpset exploit. Darren Moffat - Solaris Sustaining Engineering
Re: Libsafe Protecting Critical Elements of Stacks Andrey Kolishak
Re: Solaris 7 x86 lpset exploit. Casper Dik
Re: Alert: Cart32 secret password backdoor (CISADV000427) Bill Borton
Re: Solaris 7 x86 lpset exploit. Elias Levy
Re: Cisco HTTP possible bug: Elias Levy
Re: Securax Security Advisory: Windows98 contains a seriousbuffer overflow with long filenameextensions. Elias Levy
Re: Cisco HTTP possible bug: Jim Duncan
SuSE 6.3 Gnomelib buffer overflow bladi
Re: unsafe fgets() in qpopper Qpopper Support

Saturday, 29 April

Windows NT/95/98/Possible Others Denial of Service Attack. Microsoft ODBC Database connectivity flaw. Chris Knipe
SuSE Security Announcement - aaa_base Marc Heuse
aaa_base still vulnerable after upgrade Matthias Andree
Re: Solaris 7 x86 lpset exploit. der Mouse
Re: aaa_base still vulnerable after upgrade Marc Heuse
Source code to mstream, a DDoS tool Anonymous User
Re: aaa_base still vulnerable after upgrade Matthias Andree