ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] Setslice patch, 0day for FF and vuln in TrendMicro



> 
> ----------------------------------------------------------------------
> 
> Message: 1
> Date: Sat, 30 Sep 2006 11:47:27 -0500 (CDT)
> From: Gadi Evron <ge@xxxxxxxxxxxx>
> Subject: [Full-disclosure] ZERT patch for setSlice()
> To: bugtraq@xxxxxxxxxxxxxxxxx
> Cc: funsec@xxxxxxxxxxxx, full-disclosure@xxxxxxxxxxxxxxxxx
> Message-ID: <Pine.LNX.4.21.0609301147000.29516-100000@xxxxxxxxxxxx>
> Content-Type: TEXT/PLAIN; charset=US-ASCII
> 
> A ZERT patch has now been released and is avilable on our site (
> http://isotf.org/zert/ ).
> 
> A full patch (for limited Windows versions, which is built 
> very nicely) is
> available from Determina.
> 
> Our patch automates the Microsoft suggested workaround.
> 
> Thanks,
> 
>       Gadi.
> 
> 
> 
> 
> 

> ------------------------------
> 
> Message: 9
> Date: Sun, 01 Oct 2006 21:20:20 +0200
> From: Thor Larholm <thor@xxxxxxxxxxxx>
> Subject: [Full-disclosure] 0day in Firefox from ToorCon '06
> To: full-disclosure@xxxxxxxxxxxxxxxxx
> Cc: funsec@xxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx
> Message-ID: <452014F4.6010901@xxxxxxxxxxxx>
> Content-Type: text/plain; charset=ISO-8859-1; format=flowed
> 
> CNet is writing about some 0day vulnerabilities in Firefox that were 
> demonstrated at ToorCon '06 by Mischa Spiegelmock and Andrew Wbeelsoi:
> 
> http://news.zdnet.com/2100-1009_22-6121608.html
> 
> Mischa and Andrew also claim to have found about 30 0day 
> vulnerabilities 
> in Firefox. The article mention that the vulnerabilities from the 
> presentation are specific to Firefox's implementation of 
> Javascript and 
> hints that they are stack overflows. On the other hand, the recent 
> security-related Mozilla commits following the presentation deal with 
> improper validation of scope chain lookups in jsxml.c, jsinterp.c and 
> jsiter.c, which could allow injecting content into the Chrome 
> context. 
> We'll probably see a security release of Firefox in the next 
> week, but 
> in the mean time I have put a couple of links to the code diff's that 
> fix these vulnerabilities at
> 
> http://blogs.securiteam.com/index.php/archives/657
> 
> 
> --
> Thor Larholm
> 
> 
> 

> ------------------------------
> 
> Message: 11
> Date: Sun, 01 Oct 2006 18:10:11 -0400
> From: Deral Heiland <dh@xxxxxxxxxxxxxxxxxx>
> Subject: [Full-disclosure] Layered Defense Advisory: TrendMicro
>       OfficesScan Corporate Edition Format String Vulnerability
> To: ull-disclosure@xxxxxxxxxxxxxxxxx
> Message-ID: <7.0.1.0.0.20061001180650.021ff140@xxxxxxxxxxxxx>
> Content-Type: text/plain; charset="us-ascii"; format=flowed
> 
> ==================================================
> Layered Defense Research Advisory 1 October 2006
> ==================================================
> 1) Affected Software
> TrendMicro OfficeScan Corporate Edition 7.3
> ==================================================
> 2) Severity
> Rating: Medium risk
> Impact: Execution of arbitrary code, potential remote exploit, and 
> denial of service.
> ==================================================
> 3) Description of Vulnerability
> A format string vulnerability was discovered within Trendmicro 
> OfficeScan Corporate Edition 7.3. The vulnerability is due to 
> improper processing of format strings within OfficeScan Management 
> consoles ActiveX Control "ATXCONSOLE.OCX". Specially crafted format 
> string passed back to the Management consoles Remote Client Install 
> name search would allow access to the process stack. If successfully 
> exploited, this could allow the user to execute code of the attackers 
> choice on the system running the ActiveX management Console.
> ==================================================
> 4) Solution
> The solutions to fix this vulnerability is addressed by OfficeScan 
> Corporate Edition 7.3 Patch 1
> http://www.trendmicro.com/download/product.asp?productid=5
> ==================================================
> 5) Time Table
> 06/27/2006 -- Reported Vulnerability to Vendor.
> 06/30/2006 -- Vendor supplied hot fix to Layered Defense for testing.
> 09/21/2006 -- Vendor releases fix in Patch 1 to public.
> ==================================================
> 6) Credits
> Discovered by Deral Heiland, www.LayeredDefense.com
> ==================================================
> 7) About Layered Defense Research
> Layered Defense Research, Is a group of security professionals that 
> work together on ethical Research, Testing and Training within the 
> information security arena.
> http://www.layereddefense.com
> ================================================== 
> 
> 




 




Copyright © Lexa Software, 1996-2009.