Главная страница


ru.nethack

 
 - RU.NETHACK -------------------------------------------------------------------
 From : Alex Kise                            2:5020/400     07 Jan 2002  18:33:45
 To : AlfaX
 Subject : Re: Re:Есликомунелень.
 -------------------------------------------------------------------------------- 
 
 Для тех кто в танке.
 
 CGI Scripts:CGI - directorymanager bug
 Port: 80
 Description So we can put an "evil code" into $userfile_name variable for
 example $userfile_name=;ls;after it the second path transfer to
 /usr/bin/convert will look like this :/tmp/;ls;.jpg
 Risk Level: High
 How To Fix: Upgrading to the most recent version of directorymanager.
 Related Links: directorymanager Homepage
 Script
 http://socalcoeds.com/edit_image.php?dn=1&userfile=/etc/passwd&userfile_name
 =%20;ls;%20
 
 FTP Servers:ProFTPD 1.2.0 Dos attack
 Port: 21
 Description Proftpd built-in 'ls' command has a globbing bug that allows
 remote denial-of-service.Command ls
 */../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../* takes 100% CPU
 time on the server
 Risk Level: High
 How To Fix: Try another FTP Server or wait new version of ProFTP Server.
 Related Links: ProFTPD Homepage.
 
 FTP Servers:ProFTPD 1.2.0rc2 shutdown format bug
 Port: 21
 Description Format string vulnerability in ProFTPD 1.2.0rc2 may allow
 attackers to execute arbitrary commands by shutting down the FTP server
 while using a malformed working directory.
 Risk Level: High
 How To Fix: Upgrade to the current version of ProFTPD Server.
 Related Links: ProFTPD Homepage.
 CVE CVE-2001-0318
 
 FTP Servers:ProFTPD File Globbing Problems
 Port: 21
 Description The ftpd-child dies with signal 11 (SEGV), but the server stays
 up.A segmentation fault occurs when the server tries to free a unallocated
 memory with a free()-function and it could be a heap corruption
 vulnerability. It is in the file lib/glibc-glob.c in function void globfree
 (pglob) the SEGV occurs.
 Risk Level: High
 How To Fix: Update to the latest version of ProFTPD.
 Related Links: ProFTPD Homepage.
 
 Mail Servers:Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
 Port: 25
 Description The problem is the result of the use of signed integers in the
 program's tTflag() function, which is responsible for processing arguments
 supplied from the command line with the '-d' switch and writing the values
 to it's internal "trace vector." The vulnerability exists because it is
 possible to cause a signed integer overflow by supplying a large numeric
 value for the 'category' part of the debugger arguments. The numeric value
 is used as an index for the trace vector.
 Risk Level: High
 How To Fix: Upgrade to the current version of Sendmail.
 Related Links: Sendmail Homepage.
 CVE GENERIC-MAP-NOMATCH
 
 Mail Servers:Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
 Port: 587
 Description The problem is the result of the use of signed integers in the
 program's tTflag() function, which is responsible for processing arguments
 supplied from the command line with the '-d' switch and writing the values
 to it's internal "trace vector." The vulnerability exists because it is
 possible to cause a signed integer overflow by supplying a large numeric
 value for the 'category' part of the debugger arguments. The numeric value
 is used as an index for the trace vector.
 Risk Level: High
 How To Fix: Upgrade to the current version of Sendmail.
 Related Links: Sendmail Homepage.
 CVE GENERIC-MAP-NOMATCH
 
 Web Servers:PHP-Nuke 4.4 modify banner url
 Port: 80
 Description PHP-Nuke 4.4 and prior versions allow remote attackers to modify
 banner ad URLs by directly calling the Change operation, which does not
 require authentication. This allows an attacker to redirect all users, that
 click a banner, to another site.
 Risk Level: High
 How To Fix: Upgrading to the most recent version of PHP-NUKE will eliminate
 this issue..
 Related Links: PHP-Nuke HomePage
 Script http://socalcoeds.com/banners.php
 
 CGI Scripts:CGI - Network Query Tool remote command execution
 Port: 80
 Description Network Query tool does not check for special meta-characters
 like &;`'\"|*?~<>^()[]{}$\n\r. This allow any user to execute UNIX commands
 on web server.
 Risk Level: Medium
 How To Fix: Upgrade to the current version of Network Query Tool.
 Related Links: Network Query Tool Homepage
 Script http://socalcoeds.com/network_query.php?
 
 CVE GENERIC-MAP-NOMATCH
 CGI Scripts:PHPNuke Remote File Copy Vulnerability
 Port: 80
 Description PHP Nuke contains a vulnerability in 'admin.php' that may allow
 for remote attackers to overwrite files with custom data on target
 webservers. May allow for an attacker to gain access to the host, cause
 denial of service or deface the target website.
 Risk Level: Medium
 How To Fix: If you are not using PHP Nuke then we suggest removing if from
 your system. Otherwise consult the workaround url found below.
 Related Links: Workaround Fix Homepage
 Script http://socalcoeds.com/admin.php
 CVE GENERIC-MAP-NOMATCH
 BugtraqID: 3361
 
 FTP Servers:ProFTPd 1.2.0rc2 USER DoS
 Port: 21
 Description Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause
 a denial of service via a series of USER commands, and possibly SIZE
 commands if the server has been improperly installed.
 Risk Level: Medium
 How To Fix: Upgrade to the current version of ProFTPD Server.
 Related Links: ProFTPD Homepage.
 
 Mail Servers:Sendmail Debug Mode Leaks Information
 Port: 587
 Description This is a fairly low-risk vulnerability related to user-driven
 queue processing abilities. Debugging flags can be used to obtain the
 complete mail system configuration, gather potentially interesting
 information about the mail queue (full message path, subject, mail software,
 etc.) even if local users (and the attacker) are not allowed to read the
 configuration or mail queue directly. This can be achieved by issuing the
 following command:sendmail -q -d0-nnnn.xxx
 Risk Level: Medium
 How To Fix: Upgrade to the current version of Sendmail.
 Related Links: Sendmail Homepage.
 
 Mail Servers:Sendmail Debug Mode Leaks Information
 Port: 25
 Description This is a fairly low-risk vulnerability related to user-driven
 queue processing abilities. Debugging flags can be used to obtain the
 complete mail system configuration, gather potentially interesting
 information about the mail queue (full message path, subject, mail software,
 etc.) even if local users (and the attacker) are not allowed to read the
 configuration or mail queue directly. This can be achieved by issuing the
 following command:sendmail -q -d0-nnnn.xxx
 Risk Level: Medium
 How To Fix: Upgrade to the current version of Sendmail.
 Related Links: Sendmail Homepage.
 
 Mail Servers:Sendmail Queue Manipulation and Destruction
 Port: 587
 Description All versions of Sendmail allow any user to process the whole
 mail queue, unless this feature is administratively disabled. This feature
 itself is not dangerous. Due to a programming bug, specific
 attacker-specified mail delivery options will be honored. It is possible to,
 for example, force Sendmail to drop queue contents by setting initial
 message hop count above the limit:sendmail -q -h1000
 Risk Level: Medium
 How To Fix: Upgrade to the current version of Sendmail.
 Related Links: Sendmail Homepage.
 
 Mail Servers:Sendmail Queue Manipulation and Destruction
 Port: 25
 Description All versions of Sendmail allow any user to process the whole
 mail queue, unless this feature is administratively disabled. This feature
 itself is not dangerous. Due to a programming bug, specific
 attacker-specified mail delivery options will be honored. It is possible to,
 for example, force Sendmail to drop queue contents by setting initial
 message hop count above the limit:sendmail -q -h1000
 Risk Level: Medium
 How To Fix: Upgrade to the current version of Sendmail.
 Related Links: Sendmail Homepage.
 
 Web Servers:Apache mod_usertrack Predictable ID Generation Vulnerability
 Port: 80
 Description Apache ships with a module called 'mod_usertrack'. This module
 contains code to generate unique identifiers for individual web sessions and
 requests.The session IDs that are generated are not not random. They are
 generated using the IP address of the client, the system time and the server
 process ID. These IDs are not meant to be used for authentication
 purposes.Any applications that rely on these IDs for authentication may be
 vulnerable to ID prediction attacks.It should be noted that this is not a
 vulnerability in Apache. This is only a vulnerability when an application
 uses these IDs to track authenticated users.
 Risk Level: Medium
 How To Fix: Upgrading to the most recent version of Apache.
 Related Links: Apache Web Server
 BugtraqID: 3521
 
 Web Servers:Apache Possible Directory Index Disclosure Vulnerability
 Port: 80
 Description A possible vulnerability exists in Apache that could cause
 directory contents to be disclosed when directory indexing is enabled,
 despite the presence of an 'index.html' file. The problem is likely the
 result of an error in "multiview" functionality provided as part of Apache's
 content negotiation support. Exploitation of this problem may lead to the
 dislosure of sensitive information to attackers.
 Risk Level: Medium
 How To Fix: Upgrading to the most recent version of Apache.
 Related Links: Apache Web Server
 CVE GENERIC-MAP-NOMATCH
 BugtraqID: 2503
 
 FTP Servers:ProFTPD 1.2
 Port: 21
 Description Переполнение в команде quote.
 Пример
 
 ftp> quote %99s
 
 процесс рушиться.
 Risk Level: Low
 
 Mail Servers:SMTP without AuthLogin
 Port: 25
 Description All people can use this SMTP server for send mail without
 password
 Risk Level: Low
 How To Fix: Follow your SMTP server's manual on how to install authlogin.
 
 Mail Servers:SMTP without AuthLogin
 Port: 587
 Description All people can use this SMTP server for send mail without
 password
 Risk Level: Low
 How To Fix: Follow your SMTP server's manual on how to install authlogin.
 "AlfaX" <kewworld@online.ru> сообщил/сообщила в новостях следующее:
 news:a18uh4$3p2$1@news.sovam.com...
 
 > > Вот сайт (легкое эро), 64.157.92.77  и его порты с багами 21 25 80 587 .
 > Кто тебе сказал что там порты с багами ? ;)
 > > Остальные вроде без дырок.
 > > Если кому не лень - проанализируйте. У меня кончается инет.
 > Возникает вопрос резонный - а зачем оно кому надо ?
 --- ifmail v.2.15dev5
  * Origin: ReIS Ltd. (2:5020/400)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 Если кому не лень.   Alex Kise   05 Jan 2002 05:07:59 
 Re:Есликомунелень.   AlfaX   06 Jan 2002 11:31:58 
 Re: Re:Есликомунелень.   Alex Kise   07 Jan 2002 18:33:45 
Архивное /ru.nethack/114256e398c5c.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional