Home
Systeembeheer
Consultancy
Connectivity
Training
Development

Klanten

Inloggen

Resources

Sans artikelen
Security artikelen

Software

Linux
Windows









[ terug ]
SecurityFocus Newsletter #312
----------------------------------------

This Issue is Sponsored By: CrossTec

NetOp Desktop Firewall & Policy Server lets you centrally manage which
applications can run on your enterprise PCs.  NetOp's tiny driver-centric design
prevents unauthorized programs and processes, including viruses, keyloggers,
spyware and more from executing -- without slowing down your systems. The future
of endpoint protection is available today. Try it FREE.

http://www.securityfocus.com/sponsor/CrossTec_sf-news_050824

------------------------------------------------------------------
I.    FRONT AND CENTER
       1. Legal disassembly
       2. It's only a matter of time...
II.   BUGTRAQ SUMMARY
       1. Hummingbird FTP Weak Password Encryption Weakness
       2. PHPXMLRPC and PEAR XML_RPC Remote Code Injection Vulnerability
       3. KDE Langen2KVTML Insecure Temporary File Creation Vulnerability
       4. Parlano MindAlign Multiple Unspecified Vulnerabilities
       5. Dokeos Multiple Directory Traversal Vulnerabilities
       6. Discuz! Arbitrary File Upload Vulnerability
       7. CPaint Unspecified Command Execution and Information Disclosure
Vulnerabilities
       8. Linksys WRT54GS Wireless Authentication Bypass Vulnerability
       9. Apple Mac OS X Multiple Vulnerabilities
       10. HP Ignite-UX Password File Disclosure Vulnerability
       11. Apple Mac OS X Weblog Server Cross-Site Scripting Vulnerabilities
       12. My Image Gallery Multiple Cross Site Scripting Vulnerabilities
       13. HP Ignite-UX TFTP File Upload Vulnerability
       14. BlueZ Arbitrary Command Execution Vulnerability
       15. Dada Mail Archives HTML Injection Vulnerability
       16. SafeHTML UTF-7 And CSS Comment Tag Cross Site Scripting
Vulnerabilities
       17. PersianBlog Userslist.ASP SQL Injection Vulnerability
       18. ECW Shop Index.PHP SQL Injection Vulnerability
       19. CPaint xmlhttp Request Input Validation Vulnerability
       20. ECW Shop Index.PHP Cross Site Scripting Vulnerability
       21. ECW Shop Index.PHP HTML Injection Vulnerability
       22. ECW Shop Order Input Validation Vulnerability
       23. WinFTP Server Log-SCR Buffer Overflow Vulnerability
       24. EMC Legato Networker Multiple Vulnerabilities
       25. phpPgAds Lib-View-Direct.INC.PHP SQL Injection Vulnerability
       26. phpPgAds Local File Include Vulnerability
       27. Cisco Clean Access API Access Validation Vulnerability
       28. Xerox MicroServer Web Server Multiple Authentication Bypass and Input
Validation Vulnerabilities
       29. Chris Moneymaker's World Poker Championship Buffer Overflow
Vulnerability
       30. phpAdsNew Lib-View-Direct.INC.PHP SQL Injection Vulnerability
       31. PHPFreeNews SearchResults.PHP Multiple SQL Injection Vulnerabilities
       32. PHPFreeNews Multiple Cross-Site Scripting Vulnerabilities
       33. phpAdsNew Local File Include Vulnerability
       34. PHPTB Topic Board Multiple Remote File Include Vulnerabilities
       35. Mediabox404 Login_Admin_Mediabox404.PHP SQL Injection Vulnerability
       36. Microsoft Visual Studio .NET msdds.dll Remote Code Execution
Vulnerability
       37. Juniper Netscreen VPN Username Enumeration Vulnerability
       38. Mutt Handler.c Buffer Overflow Vulnerability
       39. W-Agora Site Parameter Directory Traversal Vulnerability
       40. ATutor Login.PHP Cross-Site Scripting Vulnerability
       41. Emefa Guestbook Multiple HTML Injection Vulnerabilities
       42. Whisper32 Plaintext Password Disclosure Vulnerability
       43. PHPOutsourcing Zorum Prod.PHP Arbitrary Command Execution
Vulnerability
       44. BBCaffe HTML Injection Vulnerability
       45. Adobe Acrobat and Adobe Reader Remote Buffer Overflow Vulnerability
       46. Mantis Multiple Input Validation Vulnerabilities
       47. OpenVPN Failed Authentication Denial Of Service Vulnerability
       48. HAURI Anti-Virus Compressed Files Directory Traversal Vulnerability
       49. OpenVPN Packet Decryption Failure Denial Of Service Vulnerability
       50. OpenVPN MAC Address Spoofing Denial Of Service Vulnerability
       51. Linux Kernel IPSec Policies Authorization Bypass Vulnerability
       52. OpenVPN Same Client Certificate Denial Of Service Vulnerability
       53. Linux Kernel SNMP Handler Denial of Service Vulnerability
       54. Cisco Clean Access Agent Installation Bypass Vulnerability
       55. Elm Expires Header Remote Buffer Overflow Vulnerability
       56. Linux Kernel ISO File System Denial Of Service Vulnerability
       57. MyBulletinBoard Search.PHP SQL Injection Vulnerability
       58. Sysinternals Process Explorer CompanyName Value Buffer Overflow
Vulnerability
       59. Woltlab Burning Board ModCP.PHP SQL Injection Vulnerability
       60. Land Down Under Multiple SQL Injection Vulnerabilities
       61. Land Down Under Multiple Cross-Site Scripting Vulnerabilities
       62. PCRE Regular Expression Heap Overflow Vulnerability
III.  SECURITYFOCUS NEWS
       1. Storm brewing over SHA-1 as further breaks are found
       2. Plug-and-play bots worming and warring among Windows systems
       3. Worm spreading through Microsoft Plug-and-Play flaw
       4. NIST, DHS add national vulnerability database to mix
       5. Worm snaffles online gamers' passwords
       6. Hotel hacking could pump smut into every room
       7. US Air Force scrambles after privacy breach
       8. Exploit for unpatched IE vuln fuels hacker fears
IV.   SECURITY JOBS LIST SUMMARY
       1. [SJ-JOB] Technical Support Engineer, Redwood City
       2. [SJ-JOB] Regional Channel Manager, DC Metro Area
       3. [SJ-JOB] Regional Channel Manager, Chicago, Indianapolis or Ohio   
based
       4. [SJ-JOB] Regional Channel Manager, San Diego
       5. [SJ-JOB] Manager, Information Security, Plymouth Meeting
       6. [SJ-JOB] Security Engineer, Tampa
       7. [SJ-JOB] Security Product Manager, Cupertino
       8. [SJ-JOB] Director, Information Security, Tampa/St. Petersburg
       9. [SJ-JOB] Sr. Security Analyst, Fredericton
       10. [SJ-JOB] Developer, Fredericton
       11. [SJ-JOB] Auditor, New York
       12. [SJ-JOB] Management, Atlanta
       13. [SJ-JOB] Information Assurance Engineer, Seattle
       14. [SJ-JOB] VP, Information Security, New York
       15. [SJ-JOB] Manager, Information Security, Fairfax
       16. [SJ-JOB] Customer Support, Columbia
       17. [SJ-JOB] Security Engineer, San Jose
       18. [SJ-JOB] Security System Administrator, Fort Lauderdale
       19. [SJ-JOB] Security System Administrator, Fort Lauderdale
       20. [SJ-JOB] Sr. Security Engineer, Washington
       21. [SJ-JOB] Sr. Security Engineer, San Francisco
       22. [SJ-JOB] Application Security Engineer, District of Columbia
       23. [SJ-JOB] Security Product Manager, Alexandria
       24. [SJ-JOB] Security Researcher, Anywhere in the US
       25. [SJ-JOB] Application Security Engineer, Washington D.C.
       26. [SJ-JOB] Developer, El Segundo
       27. [SJ-JOB] Security System Administrator, Picatinny Arsenal
       28. [SJ-JOB] Security Consultant, Edinburgh
       29. [SJ-JOB] Security Consultant, Philadelphia
       30. [SJ-JOB] Security Consultant, London
       31. [SJ-JOB] Security Auditor, New York
       32. [SJ-JOB] Security Auditor, Mountain View
       33. [SJ-JOB] Sr. Security Engineer, Boston
       34. [SJ-JOB] Manager, Information Security, Hong Kong
       35. [SJ-JOB] Application Security Architect, Broomfield
       36. [SJ-JOB] Technical Support Engineer, Cupertino
       37. [SJ-JOB] Director, Information Security, Charlotte
       38. [SJ-JOB] Quality Assurance, Aliso Viejo
       39. [SJ-JOB] Security Engineer, Hunt Valley
       40. [SJ-JOB] Application Security Architect, North Bay
V.    INCIDENTS LIST SUMMARY
       1. cuebot-d infection method
       2. Oracle 8i compromise questions
VI.   VULN-DEV RESEARCH LIST SUMMARY
       1. ToorCon 7 Lineup Finalized & Pre-Registration Ending
       2. Exploiting heap overflows on XP SP2
VII.  MICROSOFT FOCUS LIST SUMMARY
       1. Latest patches: restart issues?
       2. New MS patches crashed my 2k3 SP1 PDC
       3. exploit to vulnerability
       4. Exploiting heap overflows on XP SP2
       5. SharePoint securization
VIII. SUN FOCUS LIST SUMMARY
IX.   LINUX FOCUS LIST SUMMARY
       1. POC /dev/input/event*  keylogger
       2. Cracking bigcrypt/crypt16 password hashes
       3. Xvfb Question
       4. linux password cracking tools
       5. Linux hardening
       6. one time passwords
       7. SMB : TCP/445 impossible to sniff a document sent to be printed to a
MS Spooler Server
       8. OPIE
       9. Content Filtering Firewall in Linux..
X.    EXCERPTS
       1. SYNGRESS: Host Integrity Monitoring Using Osiris and Samhain
       2. SYNGRESS: Aggressive Network Self-Defense
XI.   UNSUBSCRIBE INSTRUCTIONS
XII.  SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Legal disassembly
By Mark Rasch
When security researcher and ISS employee Michael Lynn went to give a
presentation at the Black Hat conference in Las Vegas, little did he know he
would ignite a legal firestorm questioning whether even the act of looking for
security vulnerabilities violates the law.
http://www.securityfocus.com/columnists/349

2. It's only a matter of time...
By Jason Miller
According to the Apple Web site, Security Update 2005-007 was released to the
public on August 12, 2005. And, as with all of their recent security updates, it
is available to all Apple customers free of charge. I'm sure none of you reading
this article will argue with me about that being a good thing.
http://www.securityfocus.com/columnists/348


II.  BUGTRAQ SUMMARY
--------------------
1. Hummingbird FTP Weak Password Encryption Weakness
BugTraq ID: 14559
Remote: No
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14559
Summary:
Hummingbird FTP does not encrypt passwords with a sufficiently strong algorithm.
 This could allow an attacker who obtained the FTP profile to easily decrypt
user passwords.


2. PHPXMLRPC and PEAR XML_RPC Remote Code Injection Vulnerability
BugTraq ID: 14560
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14560
Summary:
PHPXMLRPC and PEAR XML_RPC are affected by a remote PHP code injection
vulnerability.  This issue is due to a failure in the application to properly
sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary server-side script code
on an affected computer with the privileges of the Web server process. This may
facilitate unauthorized access.


3. KDE Langen2KVTML Insecure Temporary File Creation Vulnerability
BugTraq ID: 14561
Remote: No
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14561
Summary:
KDE langen2kvtml is prone to an insecure temporary file creation vulnerability. 
This issue is due to a design error that causes the application to fail to
verify the existence of a file before writing to it.

An attacker may leverage this issue to overwrite arbitrary files with the
privileges of an unsuspecting user that activates the vulnerable application.

4. Parlano MindAlign Multiple Unspecified Vulnerabilities
BugTraq ID: 14562
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14562
Summary:
Parlano MindAlign is prone to multiple unspecified vulnerabilities.  These
issues include user enumeration, cross-site scripting, authentication bypass,
and weak encryption.

MindAlign versions 5.0 and later are vulnerable to these issues.


5. Dokeos Multiple Directory Traversal Vulnerabilities
BugTraq ID: 14563
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14563
Summary:
Dokeos is prone to multiple directory traversal vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied
input.

The problems present themselves when an attacker passes a name for a target
file, along with directory traversal sequences, to the affected application
through any of the affected parameters.

An attacker may leverage these issues to delete or move arbitrary files on an
affected computer.  Exploitation of this vulnerability could lead to a loss of
integrity and possibly loss of availability.

To exploit these vulnerabilities an attacker must have successfully
authenticated to the vulnerable application with course administration
privileges (e.g. teachers).

6. Discuz! Arbitrary File Upload Vulnerability
BugTraq ID: 14564
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14564
Summary:
Discuz! is prone to an arbitrary file upload vulnerability.  The issue presents
itself due to a lack of sanitization performed on files that are uploaded.  

This issue can ultimately facilitate unauthorized access in the context of the
Web server.




7. CPaint Unspecified Command Execution and Information Disclosure
Vulnerabilities
BugTraq ID: 14565
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14565
Summary:
CPAINT is affected by unspecified command execution and information disclosure
vulnerabilities.  These issues are most likely due to an access validation
error.

Successful exploitation of these vulnerabilities could lead to a compromise of
the server running the affected application.  Information obtained may also aid
in further attacks; other attacks are also possible.

8. Linksys WRT54GS Wireless Authentication Bypass Vulnerability
BugTraq ID: 14566
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14566
Summary:
Linksys WRT54GS is prone to an authentication bypass vulnerability.  Reportedly
the device permits client devices that are using no encryption to connect when
an encryption setting is being used.

An attacker can exploit this vulnerability to bypass authentication and connect
to a wireless network thought to be encrypted.  This results in a false sense of
security.

This issue is reported to affect firmware version 4.50.6; other firmware
versions may also be affected.

This issue also appears to have been addressed in firmware version 4.70.6; this
has not been confirmed by Symantec or the vendor.

Further information suggests this issue occurs when a firmware upgrade to
version 4.50.6 has occurred but the unit has not been reset to factory defaults.
 Resetting the unit once the firmware has been upgraded is part of the
recommended Linksys upgrade procedure.

9. Apple Mac OS X Multiple Vulnerabilities
BugTraq ID: 14567
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14567
Summary:
Multiple security vulnerabilities are reported to affect Apple Mac OS X; updates
are available.

Apache is prone to five vulnerabilities ranging from buffer overflows to access
validation vulnerabilities.  The CVE Mitre candidate ID's CAN-2005-1344,
CAN-2004-0942, CAN-2004-0885, CAN-2004-1083 and CAN-2004-1084 are assigned to
these issues.

Appkit is prone to three vulnerabilities, two of which could result in arbitrary
code execution, the third could permit the creation of local accounts.  The CVE
Mitre candidate ID's CAN-2005-2501, CAN-2005-2502 and CAN-2005-2503 are assigned
to these issues.

Bluetooth is prone to a vulnerability regarding authentication bypass.  The CVE
Mitre candidate ID CAN-2005-2504 is assigned to this issue.

CoreFoundation is prone to two vulnerabilities, one resulting in a buffer
overflow, the other a denial of service vulnerability.  The CVE Mitre candidate
ID's CAN-2005-2505 and CAN-2005-2506 are assigned to these issues.

CUPS is prone to two vulnerabilities resulting in a denial of service until the
service can be restarted.  The CVE Mitre candidate ID's CAN-2005-2525 and
CAN-2005-2526 are assigned to these issues.

Directory Services is prone to three vulnerabilities.  These issues vary from
buffer overflow, unauthorized account creation and deletion, and privilege
escalation.  The CVE Mitre candidate ID's CAN-2005-2507, CAN-2005-2508 and
CAN-2005-2519 are assigned to these issues.

HItoolbox is prone to a vulnerability that could result in information
disclosure.  The CVE Mitre candidate ID CAN-2005-2513 is assigned to this issue.

Kerberos is prone to five vulnerabilities that may result in a buffer overflow,
execution of arbitrary code, and root compromise.  The CVE Mitre candidate ID's
CAN-2004-1189, CAN-2005-1174, CAN-2005-1175, CAN-2005-1689 and CAN-2005-2511 are
assigned to these issues.

loginwindow is prone to a vulnerability that could permit a user to gain access
to other logged in accounts.  The CVE Mitre candidate ID CAN-2005-2509 is
assigned to this issue.

Mail is prone to a vulnerability regarding the loss of privacy when remote
images are loaded into HTML email.  The CVE Mitre candidate ID CAN-2005-2512 is
assigned to this issue.

MySQL is prone to three vulnerabilities that include arbitrary code execution by
remote authenticated users.  The CVE Mitre candidate ID's CAN-2005-0709,
CAN-2005-0710 and CAN-2005-0711 are assigned to these issues.

OpenSSL is prone to two vulnerabilities resulting in denial of service.  The CVE
Mitre candidate ID's CAN-2004-0079 and CAN-2004-0112 are assigned to these
issues.

ping is prone to a vulnerability that could allow local privilege escalation and
arbitrary code execution.  The CVE Mitre candidate ID CAN-2005-2514 is assigned
to this issue.

QuartzComposerScreenSaver is prone to a vulnerability that could allow users to
open pages while the RSS Visualizer screen is locked.  The CVE Mitre candidate
ID CAN-2005-2515 is assigned to this issue.

Safari is prone to two vulnerabilities that could result in arbitrary command
execution or have information submitted to an incorrect site.  The CVE Mitre
candidate ID's CAN-2005-2516 and CAN-2005-2517 are assigned to these issues.

SecurityInterface is prone to a vulnerability that could expose recently used
passwords. The CVE Mitre candidate ID CAN-2005-2520 is assigned to this issue.

servermgrd is prone to a buffer overflow vulnerability that could ultimately
lead to the execution of arbitrary code.  The CVE Mitre candidate ID
CAN-2005-2518 is assigned to this issue.

servermgr_ipfilter is prone to a vulnerability regarding firewall settings not
always being written to the Active Rules.  The CVE Mitre candidate ID
CAN-2005-2510 is assigned to this issue.

SquirrelMail is prone to two vulnerabilities including a cross-site scripting
issue.  The CVE Mitre candidate ID's CAN-2005-1769 and CAN-2005-2095 are
assigned to these issues.

traceroute is prone to a vulnerability that could result in arbitrary code
execution and privilege escalation. The CVE Mitre candidate ID CAN-2005-2521 is
assigned to this issue.

WebKit is affected by a vulnerability that could result in code execution
regarding a malformed PDF file.  The CVE Mitre candidate ID CAN-2005-2522 is
assigned to this issue.

Weblog Server is prone to multiple cross-site scripting vulnerabilities.  The
CVE Mitre candidate ID CAN-2005-2523 is assigned to this issue.

X11 is prone to a vulnerability that could result in arbitrary code execution. 
The CVE Mitre candidate ID CAN-2005-0605 is assigned to this issue.

zlib is prone to two denial of service vulnerabilities that may ultimately lead
to arbitrary code execution.  The CVE Mitre candidate ID's CAN-2005-2096 and
CAN-2005-1849 are assigned to these issues.

These vulnerabilities will be separated into individual BID's upon further
analysis of the issues.

10. HP Ignite-UX Password File Disclosure Vulnerability
BugTraq ID: 14568
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14568
Summary:
During installation, Ignite-UX can use a TFTP server for remote access.  Under
some circumstances, a copy of the passwd file will be stored in the TFTP server
path.

11. Apple Mac OS X Weblog Server Cross-Site Scripting Vulnerabilities
BugTraq ID: 14569
Remote: Yes
Date Published: 2005-08-15
Relevant URL: http://www.securityfocus.com/bid/14569
Summary:
Apple Mac OS X Weblog Server is prone to cross-site scripting vulnerabilities. 
These issues are due to a failure in the application to properly sanitize
user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.

This issue was originally described in BID 14567 Apple Mac OS X Multiple
Vulnerabilities.  It is now being assigned its own BID.


12. My Image Gallery Multiple Cross Site Scripting Vulnerabilities
BugTraq ID: 14570
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14570
Summary:
My Image Gallery is prone to multiple cross-site scripting vulnerabilities due
to improper sanitization of user-supplied input.

An attacker can exploit these vulnerabilities to inject html and script code
into the Web browser of an unsuspecting victim.  The attacker may then steal
cookie-based authentication credentials. Other attacks are also possible.


13. HP Ignite-UX TFTP File Upload Vulnerability
BugTraq ID: 14571
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14571
Summary:
During installation, Ignite-UX can use a TFTP server for remote access.  Under
certain circumstances, parts of the server path can be made world writable. 
This occurs if the add_new_client command is issued.  Remote TFTP clients may be
able to then write data to parts of the file system anonymously.

14. BlueZ Arbitrary Command Execution Vulnerability
BugTraq ID: 14572
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14572
Summary:
BlueZ is affected by an arbitrary command execution vulnerability.  This issue
is due to a failure in the application to properly sanitize user-supplied input.

Successful exploitation of this vulnerability will permit an attacker to execute
arbitrary commands on the system hosting the affected application in the
security context of the application.  This may aid in further attacks against
the underlying system; other attacks are also possible.

15. Dada Mail Archives HTML Injection Vulnerability
BugTraq ID: 14573
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14573
Summary:
Dada Mail is prone to an HTML injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

16. SafeHTML UTF-7 And CSS Comment Tag Cross Site Scripting Vulnerabilities
BugTraq ID: 14574
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14574
Summary:
SafeHTML is prone to cross-site scripting vulnerabilities, specifically in
dealing with UTF-7 encoding of characters and with CSS comment tags.

Failure to filter HTML content can result in the exploitation of various latent
vulnerabilities in Web based applications. A successful attack may facilitate
HTML injection or cross-site scripting type issues.

17. PersianBlog Userslist.ASP SQL Injection Vulnerability
BugTraq ID: 14575
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14575
Summary:
PersianBlog is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

18. ECW Shop Index.PHP SQL Injection Vulnerability
BugTraq ID: 14576
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14576
Summary:
ECW Shop is prone to an SQL injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in SQL queries.

The consequences of this attack may vary depending on the type of queries that
can be influenced, and the implementation of the database. 


19. CPaint xmlhttp Request Input Validation Vulnerability
BugTraq ID: 14577
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14577
Summary:
CPAINT is prone to an input validation vulnerability.  This issue occurs because
the application fails to properly sanitize malicious scripts and requests from
user-supplied input.

Successful exploitation of this vulnerability could lead to a compromise of the
server running the affected application.  Other attacks are also possible.


20. ECW Shop Index.PHP Cross Site Scripting Vulnerability
BugTraq ID: 14578
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14578
Summary:
ECW Shop is prone to a cross-site scripting vulnerability. This issue is due to
a lack of proper sanitization of user-supplied input.

This type of exploitation could allow for theft of cookie-based authentication
credentials; other attacks are also possible.


21. ECW Shop Index.PHP HTML Injection Vulnerability
BugTraq ID: 14579
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14579
Summary:
ECW Shop is prone to an HTML injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials.  An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.


22. ECW Shop Order Input Validation Vulnerability
BugTraq ID: 14580
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14580
Summary:
ECW Shop is prone to a remote input validation vulnerability. The issue exists
because the software fails to sufficiently sanitize URI parameter data that is
employed when computing product charges.


A remote attacker may exploit this issue to manipulate invoice and payment
charges for a specific ECW Shop order. 

23. WinFTP Server Log-SCR Buffer Overflow Vulnerability
BugTraq ID: 14581
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14581
Summary:
WinFTP Server is affected by a buffer overflow vulnerability.  This issue is due
to a failure in the application to do proper bounds checking on user-supplied
data.

A successful attack can result in overflowing a finite sized buffer and may
ultimately lead to arbitrary code execution in the context of the affected
application.

24. EMC Legato Networker Multiple Vulnerabilities
BugTraq ID: 14582
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14582
Summary:
EMC Legato Networker is affected by multiple denial of service, privilege
escalation, unauthorized access and arbitrary command execution vulnerabilities.

Several vulnerabilities affect EMC Legato Networker which can be exploited to
cause denial of service, privilege escalation, unauthorized access and
information disclosure.

25. phpPgAds Lib-View-Direct.INC.PHP SQL Injection Vulnerability
BugTraq ID: 14583
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14583
Summary:
phpPgAds is prone to a SQL injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

This vulnerability will allow a remote attacker to perform SQL injection
attacks. This may result in the unauthorized read and/or write access to data in
the underlying database application.

26. phpPgAds Local File Include Vulnerability
BugTraq ID: 14584
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14584
Summary:
phpPgAds is prone to a local file include vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input.

This issue is due to a failure in the application to perform proper access
validation before granting access to sensitive and privileged information. 


27. Cisco Clean Access API Access Validation Vulnerability
BugTraq ID: 14585
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14585
Summary:
Cisco Clean Access (CCA) is prone to a vulnerability that could allow
unauthorized users to invoke the API to bypass security.

This could allow an attacker to bypass security checks, change user role
assignments, disconnect users from the system, and obtain information on
configured users.



28. Xerox MicroServer Web Server Multiple Authentication Bypass and Input
Validation Vulnerabilities
BugTraq ID: 14586
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14586
Summary:
Xerox MicroServer Web Server is affected by multiple authentication bypass and
input validation vulnerabilities.  These issues are most likely due to a failure
in the application to properly validate user-supplied input.

Successful exploitation of these vulnerabilities may lead to privilege
escalation; other attacks are also possible.

29. Chris Moneymaker's World Poker Championship Buffer Overflow Vulnerability
BugTraq ID: 14587
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14587
Summary:
Chris Moneymaker's World Poker Championship is prone to a boundary condition
error.  Exploitation may cause the application to fail or result in arbitrary
code execution.


30. phpAdsNew Lib-View-Direct.INC.PHP SQL Injection Vulnerability
BugTraq ID: 14588
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14588
Summary:
phpAdsNew is prone to a SQL injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

This vulnerability will allow a remote attacker to perform SQL injection
attacks. This may result in the unauthorized read and/or write access to data in
the underlying database application.


31. PHPFreeNews SearchResults.PHP Multiple SQL Injection Vulnerabilities
BugTraq ID: 14589
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14589
Summary:
PHPFreeNews is prone to multiple SQL injection vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied input
before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

32. PHPFreeNews Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14590
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14590
Summary:
PHPFreeNews is prone to multiple cross-site scripting vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks. 

33. phpAdsNew Local File Include Vulnerability
BugTraq ID: 14591
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14591
Summary:
phpAdsNew is prone to a local file include vulnerability.  This issue is due to
a failure in the application to properly sanitize user-supplied input.

This issue is due to a failure in the application to perform proper access
validation before granting access to sensitive and privileged information.


34. PHPTB Topic Board Multiple Remote File Include Vulnerabilities
BugTraq ID: 14592
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14592
Summary:
PHPTB is prone to multiple remote file include vulnerabilities.  These issues
are due to a failure in the application to properly sanitize user-supplied
input.

An attacker may leverage any of these issues to execute arbitrary server-side
script code on an affected computer with the privileges of the Web server
process. This may facilitate unauthorized access.

35. Mediabox404 Login_Admin_Mediabox404.PHP SQL Injection Vulnerability
BugTraq ID: 14593
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14593
Summary:
mediabox404 is prone to an SQL injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.  Reports indicate an
attacker can exploit this vulnerability to bypass authentication and gain
administrative access to the affected application.

36. Microsoft Visual Studio .NET msdds.dll Remote Code Execution Vulnerability
BugTraq ID: 14594
Remote: Yes
Date Published: 2005-08-17
Relevant URL: http://www.securityfocus.com/bid/14594
Summary:
Microsoft Visual Studio .NET is prone to a vulnerability that could allow remote
arbitrary code execution.

The list of vulnerable packages has been updated to include applications
suspected of installing the vulnerable msdds.dll library.



37. Juniper Netscreen VPN Username Enumeration Vulnerability
BugTraq ID: 14595
Remote: Yes
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14595
Summary:
The Juniper Netscreen VPN implementation will identify valid usernames in IKE
aggressive mode, when pre-shared key authentication is used.  This allows for
attackers to obtain a list of valid VPN users.  With a valid username, an
attacker  can obtain hashed credentials against which a brute force attack may
be performed.   A successful crack would mean that the attacker has complete
access to the network.

38. Mutt Handler.c Buffer Overflow Vulnerability
BugTraq ID: 14596
Remote: Yes
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14596
Summary:
In Mutt's mail attachment encoding and decoding functions, there is a flaw which
will allow a buffer overflow to occur. This could allow a remote attacker to
compromise the application and execute malicious code.

Successful exploitation of this vulnerability could allow a remote attacker to
execute malicious code within carefully crafted email message attachments.


39. W-Agora Site Parameter Directory Traversal Vulnerability
BugTraq ID: 14597
Remote: Yes
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14597
Summary:
W-Agora is prone to a directory traversal vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input.

An unauthorized user can retrieve arbitrary files by supplying directory
traversal strings '../' to the vulnerable parameter.  Exploitation of this
vulnerability could lead to a loss of confidentiality.  Information obtained may
aid in further attacks against the underlying system; other attacks are also
possible.

40. ATutor Login.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 14598
Remote: Yes
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14598
Summary:
ATutor is prone to a cross-site scripting vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site.  This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.


41. Emefa Guestbook Multiple HTML Injection Vulnerabilities
BugTraq ID: 14599
Remote: Yes
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14599
Summary:
Emefa Guestbook is prone to multiple HTML injection vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

42. Whisper32 Plaintext Password Disclosure Vulnerability
BugTraq ID: 14600
Remote: No
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14600
Summary:
Whisper32 is prone to a plaintext password disclosure vulnerability. This issue
is due to the application storing passwords in an insecure manner.

An attacker can exploit this vulnerability to obtained the passwords of various
system applications.

43. PHPOutsourcing Zorum Prod.PHP Arbitrary Command Execution Vulnerability
BugTraq ID: 14601
Remote: Yes
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14601
Summary:
Zorum is prone to an arbitrary command execution vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

This issue may facilitate unauthorized remote access in the context of the Web
server to the affected computer.

44. BBCaffe HTML Injection Vulnerability
BugTraq ID: 14602
Remote: Yes
Date Published: 2005-08-18
Relevant URL: http://www.securityfocus.com/bid/14602
Summary:
Bbcaffe is prone to an HTML injection vulnerability.  This issue is due to a
failure in the application to properly sanitize user-supplied input before using
it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the
affected Web site, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.

45. Adobe Acrobat and Adobe Reader Remote Buffer Overflow Vulnerability
BugTraq ID: 14603
Remote: Yes
Date Published: 2005-08-16
Relevant URL: http://www.securityfocus.com/bid/14603
Summary:
Adobe Acrobat and Adobe Reader are affected by a remote buffer overflow
vulnerability.  This issue presents itself because the application fails to
perform boundary checks prior to copying user-supplied data into sensitive
process buffers.

An attacker can exploit this issue by crafting a malicious PDF file and sending
it to a vulnerable user.  If the victim user opens this PDF file, the attacker
may be able to execute arbitrary code on the affected computer and gain
unauthorized access in the context of the user.

46. Mantis Multiple Input Validation Vulnerabilities
BugTraq ID: 14604
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14604
Summary:
Mantis is prone to multiple input validation vulnerabilities.  These issues
range from SQL injection to cross-site scripting.  These issues are due to a
failure in the application to properly sanitize user-supplied input.

An attacker may leverage the cross-site scripting issue to have arbitrary script
code executed in the browser of an unsuspecting user in the context of the
affected site.  This may facilitate the theft of cookie-based authentication
credentials as well as other attacks.

Successful exploitation of the SQL injection issue could result in a compromise
of the application, disclosure or modification of data, or may permit an
attacker to exploit vulnerabilities in the underlying database implementation.



47. OpenVPN Failed Authentication Denial Of Service Vulnerability
BugTraq ID: 14605
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14605
Summary:
OpenVPN is prone to a denial of service vulnerability. This vulnerability
results in a loss of client connectivity.

This can allow an authenticated attacker to deny service to legitimate users.


48. HAURI Anti-Virus Compressed Files Directory Traversal Vulnerability
BugTraq ID: 14606
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14606
Summary:
HAURI Anti-Virus is prone to a directory traversal vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input.

An unauthorized user can write files to arbitrary locations by supplying
directory traversal strings '../' in archived file names.  Exploitation of this
vulnerability could lead to a loss of integrity and possibly availability.  An
attacker can exploit this vulnerability to possibly cause a denial of service in
the affected application.  This may aid in further attacks against the
underlying system once the anti-virus software has been disabled.

49. OpenVPN Packet Decryption Failure Denial Of Service Vulnerability
BugTraq ID: 14607
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14607
Summary:
OpenVPN is prone to a denial of service vulnerability. This vulnerability
results in a loss of client connectivity.

This can allow an authenticated attacker to deny service to legitimate users.


50. OpenVPN MAC Address Spoofing Denial Of Service Vulnerability
BugTraq ID: 14608
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14608
Summary:
OpenVPN is prone to a denial of service vulnerability. This vulnerability
results in a depletion of operating system memory, and possibly a system crash.

This can allow an authenticated attacker to deny service to legitimate users,
crash the OpenVPN server and possible cause the operating system to crash.


51. Linux Kernel IPSec Policies Authorization Bypass Vulnerability
BugTraq ID: 14609
Remote: No
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14609
Summary:
Linux Kernel is prone to an authorization bypass vulnerability.

This issue is due to a failure in the application to perform proper
authorization before permitting access to a privileged function.  

Successful exploitation will permit a local attacker to bypass intended IPSec
policies, set invalid policies and cause a denial of service when adding
policies until kernel memory is exhausted. 

It should be noted an attacker can use this vulnerability enhance the
exploitation of BID 14477 (Linux Kernel XFRM Array Index Buffer Overflow
Vulnerability); that issue requires the ability to add IPSec policies.

52. OpenVPN Same Client Certificate Denial Of Service Vulnerability
BugTraq ID: 14610
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14610
Summary:
OpenVPN is prone to a denial of service vulnerability. This vulnerability
results in a race condition crashing the affected server.

This vulnerability will allow an authenticated attacker to deny service to
legitimate users and to crash the affected server application.


53. Linux Kernel SNMP Handler Denial of Service Vulnerability
BugTraq ID: 14611
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14611
Summary:
The Linux kernel is prone to a denial of service vulnerability.  This issue is
due to a NULL pointer dereference that can occur when malformed UDP packets are
received by snmpd.


54. Cisco Clean Access Agent Installation Bypass Vulnerability
BugTraq ID: 14612
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14612
Summary:
Cisco Clean Access is affected by a vulnerability that can bypass the mandatory
installation of the agent.

This will allow the an attacker to connect to the network bypassing the
host-based checks.  The remote checks are still performed however.

55. Elm Expires Header Remote Buffer Overflow Vulnerability
BugTraq ID: 14613
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14613
Summary:
Elm is prone to a buffer overflow vulnerability which could allow an attacker to
execute malicious code.  This issue is due to a failure in the application to
perform proper bounds checking on user-supplied data.

A successful attack can result in overflowing a finite sized buffer and may
ultimately lead to arbitrary code execution in the context of the affected
application.

56. Linux Kernel ISO File System Denial Of Service Vulnerability
BugTraq ID: 14614
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14614
Summary:
The kernel driver for compressed ISO file systems is prone to a denial of
service vulnerability.  This issue is due to a failure in the driver to properly
sanitize  input data.

When the kernel attempts to mount a malicious compressed ISO image, the kernel
crashes.

57. MyBulletinBoard Search.PHP SQL Injection Vulnerability
BugTraq ID: 14615
Remote: Yes
Date Published: 2005-08-19
Relevant URL: http://www.securityfocus.com/bid/14615
Summary:
MyBulletinBoard is prone to an SQL injection vulnerability.  This issue is due
to a failure in the application to properly sanitize user-supplied input before
using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

58. Sysinternals Process Explorer CompanyName Value Buffer Overflow
Vulnerability
BugTraq ID: 14616
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14616
Summary:
Process Explorer is prone to a buffer overflow vulnerability.  This issue is due
to a failure in the application to perform proper bounds checking on
user-supplied data.

A successful attack can result in the overflowing of a finite sized buffer and
may ultimately lead to the execution of arbitrary code in the context of the
affected application.

59. Woltlab Burning Board ModCP.PHP SQL Injection Vulnerability
BugTraq ID: 14617
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14617
Summary:
Woltlab Burning Board is prone to an SQL injection vulnerability.  This issue is
due to a failure in the application to properly sanitize user-supplied input
before using it in an SQL query.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

It should be noted an attacker must have moderator credentials to access the
vulnerable script.

60. Land Down Under Multiple SQL Injection Vulnerabilities
BugTraq ID: 14618
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14618
Summary:
Land Down Under is prone to multiple SQL injection vulnerabilities.  These
issues are due to a failure in the application to properly sanitize
user-supplied input before using it in SQL queries.

Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.

61. Land Down Under Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 14619
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14619
Summary:
Land Down Under is prone to multiple cross-site scripting vulnerabilities. 
These issues are due to a failure in the application to properly sanitize
user-supplied input.

An attacker may leverage any of these issues to have arbitrary script code
executed in the browser of an unsuspecting user in the context of the affected
site.  This may facilitate the theft of cookie-based authentication credentials
as well as other attacks.

62. PCRE Regular Expression Heap Overflow Vulnerability
BugTraq ID: 14620
Remote: Yes
Date Published: 2005-08-20
Relevant URL: http://www.securityfocus.com/bid/14620
Summary:
PCRE is prone to a heap overflow vulnerability.  This issue is due to a failure
of the library to properly bounds check user-supplied input prior to copying
data to an internal memory buffer. 

The impact of successful exploitation of this vulnerability depends on the
application and the user credentials utilizing the vulnerable library. 
Successful attack may ultimately permit an attacker to control the contents of
critical memory control structures and write arbitrary data to arbitrary memory
locations.

III. SECURITYFOCUS NEWS ARTICLES
--------------------------------
1. Storm brewing over SHA-1 as further breaks are found
By: Robert Lemos
Three Chinese researchers refine an attack on the encryption standard used to
digitally sign documents, leaving cryptographers to debate whether the Secure
Hash Algorithm needs to be mothballed more quickly.
http://www.securityfocus.com/news/11292

2. Plug-and-play bots worming and warring among Windows systems
By: Robert Lemos
A dozen different worms based on bot software have started attacking
already-compromised Windows 2000 systems with the aim of creating a lasting bot
net, security experts warn. Several companies, such as CNN and the New York
Times, have been infected because they failed to patch in time. 
http://www.securityfocus.com/news/11285

3. Worm spreading through Microsoft Plug-and-Play flaw
By: Robert Lemos
Dubbed Zotob, the worm infects computers using a flaw in the Windows operating
system's Plug-and-Play functionality, but security experts believe that the
attack won't be as significant as previous epidemics.
http://www.securityfocus.com/news/11281

4. NIST, DHS add national vulnerability database to mix
By: Robert Lemos
The National Institute of Standards and Technology has created a
government-funded database of flaws. Will it bring more competition among
vulnerability databases or just be a federally funded clone?
http://www.securityfocus.com/news/11278

5. Worm snaffles online gamers' passwords
By: John Leyden
Players of one fantasy role-playing game Priston Tale have suffered a nasty
attack of reality after virus writers created a worm programmed to steal their
usernames, passwords and data.
http://www.securityfocus.com/news/11294

6. Hotel hacking could pump smut into every room
By: John Leyden
Hotel hybrid broadband internet and TV-on-demand entertainment systems are open
to attack, security researchers warn.
http://www.securityfocus.com/news/11293

7. US Air Force scrambles after privacy breach
By: John Leyden
The US Air Force has been forced to notify more than 33,000 airmen that their
personal details might have been exposed following the discovery of a computer
security breach.
http://www.securityfocus.com/news/11290

8. Exploit for unpatched IE vuln fuels hacker fears
By: John Leyden
Microsoft is investigating an IE security bug amid fears that a hacker attack
based on the vulnerability is imminent.
http://www.securityfocus.com/news/11289

IV.  SECURITY JOBS LIST SUMMARY
-------------------------------
1. [SJ-JOB] Technical Support Engineer, Redwood City
http://www.securityfocus.com/archive/77/408963

2. [SJ-JOB] Regional Channel Manager, DC Metro Area
http://www.securityfocus.com/archive/77/408943

3. [SJ-JOB] Regional Channel Manager, Chicago, Indianapolis or Ohio    based
http://www.securityfocus.com/archive/77/408956

4. [SJ-JOB] Regional Channel Manager, San Diego
http://www.securityfocus.com/archive/77/408944

5. [SJ-JOB] Manager, Information Security, Plymouth Meeting
http://www.securityfocus.com/archive/77/408960

6. [SJ-JOB] Security Engineer, Tampa
http://www.securityfocus.com/archive/77/408920

7. [SJ-JOB] Security Product Manager, Cupertino
http://www.securityfocus.com/archive/77/408953

8. [SJ-JOB] Director, Information Security, Tampa/St. Petersburg
http://www.securityfocus.com/archive/77/408959

9. [SJ-JOB] Sr. Security Analyst, Fredericton
http://www.securityfocus.com/archive/77/408931

10. [SJ-JOB] Developer, Fredericton
http://www.securityfocus.com/archive/77/408952

11. [SJ-JOB] Auditor, New York
http://www.securityfocus.com/archive/77/408913

12. [SJ-JOB] Management, Atlanta
http://www.securityfocus.com/archive/77/408941

13. [SJ-JOB] Information Assurance Engineer, Seattle
http://www.securityfocus.com/archive/77/408912

14. [SJ-JOB] VP, Information Security, New York
http://www.securityfocus.com/archive/77/408949

15. [SJ-JOB] Manager, Information Security, Fairfax
http://www.securityfocus.com/archive/77/408964

16. [SJ-JOB] Customer Support, Columbia
http://www.securityfocus.com/archive/77/408930

17. [SJ-JOB] Security Engineer, San Jose
http://www.securityfocus.com/archive/77/408924

18. [SJ-JOB] Security System Administrator, Fort Lauderdale
http://www.securityfocus.com/archive/77/408812

19. [SJ-JOB] Security System Administrator, Fort Lauderdale
http://www.securityfocus.com/archive/77/408814

20. [SJ-JOB] Sr. Security Engineer, Washington
http://www.securityfocus.com/archive/77/408816

21. [SJ-JOB] Sr. Security Engineer, San Francisco
http://www.securityfocus.com/archive/77/408810

22. [SJ-JOB] Application Security Engineer, District of Columbia
http://www.securityfocus.com/archive/77/408811

23. [SJ-JOB] Security Product Manager, Alexandria
http://www.securityfocus.com/archive/77/408765

24. [SJ-JOB] Security Researcher, Anywhere in the US
http://www.securityfocus.com/archive/77/408741

25. [SJ-JOB] Application Security Engineer, Washington D.C.
http://www.securityfocus.com/archive/77/408742

26. [SJ-JOB] Developer, El Segundo
http://www.securityfocus.com/archive/77/408743

27. [SJ-JOB] Security System Administrator, Picatinny Arsenal
http://www.securityfocus.com/archive/77/408745

28. [SJ-JOB] Security Consultant, Edinburgh
http://www.securityfocus.com/archive/77/408622

29. [SJ-JOB] Security Consultant, Philadelphia
http://www.securityfocus.com/archive/77/408623

30. [SJ-JOB] Security Consultant, London
http://www.securityfocus.com/archive/77/408620

31. [SJ-JOB] Security Auditor, New York
http://www.securityfocus.com/archive/77/408619

32. [SJ-JOB] Security Auditor, Mountain View
http://www.securityfocus.com/archive/77/408621

33. [SJ-JOB] Sr. Security Engineer, Boston
http://www.securityfocus.com/archive/77/408526

34. [SJ-JOB] Manager, Information Security, Hong Kong
http://www.securityfocus.com/archive/77/408523

35. [SJ-JOB] Application Security Architect, Broomfield
http://www.securityfocus.com/archive/77/408524

36. [SJ-JOB] Technical Support Engineer, Cupertino
http://www.securityfocus.com/archive/77/408525

37. [SJ-JOB] Director, Information Security, Charlotte
http://www.securityfocus.com/archive/77/408429

38. [SJ-JOB] Quality Assurance, Aliso Viejo
http://www.securityfocus.com/archive/77/408431

39. [SJ-JOB] Security Engineer, Hunt Valley
http://www.securityfocus.com/archive/77/408432

40. [SJ-JOB] Application Security Architect, North Bay
http://www.securityfocus.com/archive/77/408430

V.   INCIDENTS LIST SUMMARY
---------------------------
1. cuebot-d infection method
http://www.securityfocus.com/archive/75/409026

2. Oracle 8i compromise questions
http://www.securityfocus.com/archive/75/408614

VI.  VULN-DEV RESEARCH LIST SUMMARY
-----------------------------------
1. ToorCon 7 Lineup Finalized & Pre-Registration Ending
http://www.securityfocus.com/archive/82/408935

2. Exploiting heap overflows on XP SP2
http://www.securityfocus.com/archive/82/408609

VII. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Latest patches: restart issues?
http://www.securityfocus.com/archive/88/408678

2. New MS patches crashed my 2k3 SP1 PDC
http://www.securityfocus.com/archive/88/408679

3. exploit to vulnerability
http://www.securityfocus.com/archive/88/408570

4. Exploiting heap overflows on XP SP2
http://www.securityfocus.com/archive/88/408467

5. SharePoint securization
http://www.securityfocus.com/archive/88/408410

VIII. SUN FOCUS LIST SUMMARY
----------------------------
IX. LINUX FOCUS LIST SUMMARY
----------------------------
1. POC /dev/input/event*  keylogger
http://www.securityfocus.com/archive/91/409017

2. Cracking bigcrypt/crypt16 password hashes
http://www.securityfocus.com/archive/91/409016

3. Xvfb Question
http://www.securityfocus.com/archive/91/409023

4. linux password cracking tools
http://www.securityfocus.com/archive/91/408915

5. Linux hardening
http://www.securityfocus.com/archive/91/408758

6. one time passwords
http://www.securityfocus.com/archive/91/408796

7. SMB : TCP/445 impossible to sniff a document sent to be printed to a MS
Spooler Server
http://www.securityfocus.com/archive/91/408574

8. OPIE
http://www.securityfocus.com/archive/91/408479

9. Content Filtering Firewall in Linux..
http://www.securityfocus.com/archive/91/408476

XI. EXCERPTS
------------
1. SYNGRESS: Host Integrity Monitoring Using Osiris and Samhain
http://www.securityfocus.com/excerpts/16

2. SYNGRESS: Aggressive Network Self-Defense
http://www.securityfocus.com/excerpts/14
[ terug ]