Security Hero Rotating Header Image

Virus

4110

4110

BAT/TrojanDownloader.Ftp.NDM, BAT/TrojanDownloader.Ftp.NDN, IRC/SdBot (2), PDF/Exploit.Pidief.ONF, Win32/Adware.AntiVirus1, Win32/Adware.Antivirus2008, Win32/Adware.AntivirusPlus (2), Win32/Adware.BHO.NCX, Win32/Adware.MySideSearch, Win32/Adware.NaviPromo (2), Win32/Adware.PersonalAntivirus (2), Win32/Adware.PrivacyComponents, Win32/Adware.UltraAntivirus2009 (3), Win32/Adware.Virtumonde (2), Win32/Adware.WinPCDefender, Win32/Agent.DKR (2), Win32/Agent.PGA, Win32/Agent.PKT, Win32/Agent.PMI (3), Win32/AntiAVNAK (2), Win32/Autoit.FV (2), Win32/AutoRun.FlyStudio.KC, Win32/AutoRun.IRCBot.AK, Win32/AutoRun.KS, Win32/AutoRun.VB.CX (2), Win32/AutoRun.VB.DP (2), Win32/Bagle.RD, Win32/BHO.NOR, Win32/Delf.ODU, Win32/Delf.OJB, Win32/Dialer.NAD, Win32/Hupigon.NOU, Win32/KillAV.NDT (4), Win32/KillProc.NAF, Win32/Kryptik.QR, Win32/Kryptik.QS, Win32/Mebroot.BL, Win32/Mebroot.BM (2), Win32/Mebroot.BN (2), Win32/Olmarik.GW, Win32/Olmarik.HG (2), Win32/Olmarik.HX (2), Win32/Olmarik.HY (2), Win32/Olmarik.HZ (2), Win32/OlmarikIA (2), Win32/Patched.AW, Win32/PcClient.NDW, Win32/Peerfrag.BD, Win32/Peerfrag.BE, Win32/PSW.Agent.NJL, Win32/PSW.OnLineGames.NMP (7), Win32/PSW.OnLineGames.NMY (11), Win32/PSW.OnLineGames.NNU (4), Win32/PSW.OnLineGames.ODJ (2), Win32/PSW.OnLineGames.OKC, Win32/PSW.OnLineGames.OKD, Win32/PSW.OnLineGames.XTT, Win32/Rootkit.Agent.NLY (2), Win32/Rustock.NIL (2), Win32/SpamTool.Agent.NCL, Win32/Spy.Banker.QYV (2), Win32/Spy.Banker.QYW (2), Win32/Spy.Banker.QYX (2), Win32/Spy.Zbot.JF (2), Win32/Spy.Zbot.RK, Win32/TrojanClicker.Delf.NHF, Win32/TrojanDownloader.Agent.OXA, Win32/TrojanDownloader.Agent.PCX, Win32/TrojanDownloader.Delf.ORH, Win32/TrojanDownloader.FakeAlert.AAX, Win32/TrojanDownloader.FakeAlert.ACE, Win32/TrojanDownloader.FakeAlert.ACT, Win32/TrojanDownloader.Small.OCS, Win32/TrojanDownloader.VB.NXX (2), Win32/TrojanDownloader.Zlob.CUG, Win32/TrojanDownloader.Zlob.CZW (2), Win32/TrojanDropper.Mudrop.NAM, Win32/TrojanDropper.VB.NHX (3), Win32/TrojanProxy.Small.NCA, Win32/Wigon.KU (2)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6079&Itemid=26

New cscope packages fix arbitrary code execution

[SECURITY] [DSA 1806-1] New cscope packages fix arbitrary code execution

<!– Envelope-to: email@address Delivery-date: Mon, 25 May 2009 17:47:31 +0100 Received: from outgoing.securityfocus.com ([205.206.231.26] helo=outgoing2.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M8dKl-0000wJ-NC for email@address; Mon, 25 May 2009 17:47:31 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing2.securityfocus.com (Postfix) with QMQP id C8835144259; Mon, 25 May 2009 08:14:14 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 14511 invoked from network); 24 May 2009 08:28:08 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <jmm@inutil.org> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Flag: NO X-Spam-Score: -9.08 X-Spam-Level: X-Spam-Status: No, score=-9.08 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5, PHONENUMBER=1.5] autolearn=ham X-policyd-weight: using cached result; rate: -6.1 Message-ID: <20090524082751.GA24821@galadriel.inutil.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) X-SA-Exim-Connect-IP: 82.83.229.75 X-SA-Exim-Mail-From: jmm@inutil.org X-SA-Exim-Scanned: No (on inutil.org); SAEximRunCond expanded to false X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <h-kgsMJsh7H.A.NWB.VUQGKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Sun, 24 May 2009 08:28:05 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 9179 Status: O X-UID: 9179 Content-Length: 5245 X-Keywords:

New pidgin packages fix several vulnerabilities

[SECURITY] [DSA 1805-1] New pidgin packages fix several vulnerabilities

<!– Envelope-to: email@address Delivery-date: Fri, 22 May 2009 21:32:55 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M7bQF-0006gJ-A0 for email@address; Fri, 22 May 2009 21:32:55 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id 99FB6237222; Fri, 22 May 2009 14:26:26 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 29893 invoked from network); 22 May 2009 20:04:27 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <jmm@inutil.org> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Flag: NO X-Spam-Score: -9.06 X-Spam-Level: X-Spam-Status: No, score=-9.06 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_DRUGS_REL8=0.02, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5, PHONENUMBER=1.5] autolearn=ham X-policyd-weight: using cached result; rate: -6.1 Message-ID: <20090522200408.GA6386@galadriel.inutil.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) X-SA-Exim-Connect-IP: 82.83.229.75 X-SA-Exim-Mail-From: jmm@inutil.org X-SA-Exim-Scanned: No (on inutil.org); SAEximRunCond expanded to false X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <PdP5w1tVwDM.A.YQC.GVwFKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Fri, 22 May 2009 20:04:22 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 9167 Status: O X-UID: 9167 Content-Length: 12013 X-Keywords:

New ipsec-tools packages fix denial of service

[SECURITY] [DSA 1804-1] New ipsec-tools packages fix denial of service

<!– Envelope-to: email@address Delivery-date: Wed, 20 May 2009 16:44:13 +0100 Received: from outgoing.securityfocus.com ([205.206.231.26] helo=outgoing2.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M6nxl-0003Rd-1C for email@address; Wed, 20 May 2009 16:44:13 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing2.securityfocus.com (Postfix) with QMQP id AD9C0143B50; Wed, 20 May 2009 09:20:49 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 16939 invoked from network); 20 May 2009 14:08:33 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <nion@debian.org> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Flag: NO X-Spam-Score: -9.08 X-Spam-Level: X-Spam-Status: No, score=-9.08 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5, PHONENUMBER=1.5] autolearn=ham X-policyd-weight: using cached result; rate: -5 X-RZG-AUTH: :KHkJeFmIefYsEPPKCBl/ZNLv/wXfcKuujweZef2IiPbnG1Hpql+PuSVCX/7LuieLUUY= X-RZG-CLASS-ID: mo05 Message-ID: <20090520140643.GA25319@ngolde.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; x-action=pgp-signed Content-Disposition: inline X-Mailer: netcat 1.10 X-GPG: 0x73647cff X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <w7iztNLAYjL.A.jXC.l7AFKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Wed, 20 May 2009 14:08:37 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 9145 Status: O X-UID: 9144 Content-Length: 11560 X-Keywords:

CiscoWorks TFTP Directory Traversal Vulnerability

Cisco Security Advisory: CiscoWorks TFTP Directory Traversal Vulnerability

<!– Envelope-to: email@address Delivery-date: Wed, 20 May 2009 16:24:34 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M6nek-00036X-Fh for email@address; Wed, 20 May 2009 16:24:34 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id 5CB312374E7; Wed, 20 May 2009 09:21:26 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 18351 invoked from network); 20 May 2009 15:04:06 -0000 X-TACSUNS: Virus Scanned Sender: nobody@cisco.com Cc: psirt@cisco.com Message-id: <200905201050.cw@psirt.cisco.com> Errors-To: nobody@cisco.com Content-Type: Text/Plain; charset="us-ascii" Prevent-NonDelivery-Report: Content-Return: Prohibited Content-Transfer-Encoding: quoted-printable X-IMAPbase: 1176125385 9143 Status: O X-UID: 9142 Content-Length: 13356 X-Keywords:

4076

4076

BAT/KillFiles.NBH (2), BAT/TrojanDownloader.Ftp.NBZ (2), INF/Autorun, PDF/Exploit.Pidief.OMN, VBS/KillFiles.C, Win32/Adware.Agent.NMS (4), Win32/Adware.Antivirus2008, Win32/Adware.Antivirus2009, Win32/Adware.InternetAntivirus (4), Win32/Adware.PersonalAntivirus, Win32/Adware.PrivacyComponents, Win32/Adware.SystemSecurity, Win32/Adware.Virtumonde.NEK, Win32/Adware.VirusDoctor, Win32/Agent.NYC (2), Win32/Agent.PKG (2), Win32/Agent.PKH (2), Win32/Agent.PKI (2), Win32/Agent.WPI, Win32/AntiAV.AZQ (2), Win32/AntiAV.NAH (2), Win32/AutoRun.IRCBot.AG (2), Win32/AutoRun.KS, Win32/BHO.NOV, Win32/BHO.NOZ (3), Win32/DDoS.Agent.NAF (2), Win32/Delf.OII (3), Win32/Delf.OIJ, Win32/FlyStudio.NLE (6), Win32/FlyStudio.NLF, Win32/FlyStudio.NLG (6), Win32/Hupigon.GUWZ, Win32/Hupigon.NOK, Win32/IRCBot.ANN, Win32/Koutodoor.N, Win32/Kryptik.PH, Win32/PSW.Delf.NPF, Win32/PSW.OnLineGames.NMP (2), Win32/PSW.OnLineGames.NMY (2), Win32/PSW.QQRob.NAQ, Win32/PSW.Small.NBD (4), Win32/Qhost, Win32/Qhost.NJR, Win32/Rootkit.Agent.NKV, Win32/Rootkit.Ressdt.NBA, Win32/Small.NFV (2), Win32/Spy.Banker.QRW, Win32/Spy.Banker.QRX (3), Win32/Spy.Banker.QRY, Win32/Spy.Zbot.JF, Win32/StartPage.DPE, Win32/StartPage.NKF, Win32/TrojanDownloader.Adload.NFM, Win32/TrojanDownloader.Agent.OZA, Win32/TrojanDownloader.Agent.PBU, Win32/TrojanDownloader.Agent.PBV, Win32/TrojanDownloader.Delf.OTL (2), Win32/TrojanDownloader.Delf.OYE (2), Win32/TrojanDownloader.FakeAlert.YV, Win32/TrojanDownloader.Small.OPC (2), Win32/TrojanDownloader.VB.MBZ (2), Win32/TrojanDropperAgent.OAK, Win32/TrojanDropper.Agent.OAL, Win32/TrojanDropper.VB.NHQ (2), Win32/TrojanDropper.VB.NHR, Win32/VB.ODS (2), Win32/VB.ODT (4)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6028&Itemid=26

4070

4070

BAT/TrojanDownloader.Ftp.NDD, PDF/Exploit.Pidief.OMJ, Win32/Adware.Coolezweb, Win32/Adware.InternetAntivirus (3), Win32/Adware.PersonalAntivirus, Win32/Adware.VirusAlarmPro, Win32/Adware.WinPCDefender (2), Win32/Agent.NYA (2), Win32/Agent.WPI, Win32/AutoRun.Agent.NR, Win32/Delf.OHR, Win32/Delf.OHS, Win32/Delf.OIE (3), Win32/Injector.OI, Win32/IRCBot.AGP, Win32/Kryptik.OK, Win32/Kryptik.OL, Win32/Kryptik.OP, Win32/Olmarik.HG, Win32/PSW.OnLineGames.NSU, Win32/PSW.OnLineGames.NTZ, Win32/PSW.OnLineGames.NZD (2), Win32/PSW.OnLineGames.NZN, Win32/PSW.OnLineGames.NZS, Win32/PSW.OnLineGames.NZT (2), Win32/Ransom.I, Win32/Rootkit.Agent.NLH, Win32/Spy.Banker.AFFJ, Win32/Spy.Banker.QLG, Win32/Spy.Banker.QLP, Win32/Spy.Banker.QRT (3), Win32/Spy.Pophot.NAO (55), Win32/Spy.Zbot.JF, Win32/TrojanClicker.VB.NFM, Win32/TrojanDownloader.Bredolab.AA, Win32/TrojanDownloader.FakeAlert.UM, Win32/VB.OCY (3)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6021&Itemid=26

CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities [Updated]

Bugtraq: CA20090126-01: CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities [Updated]

CA20090126-01: CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities [Updated]

URL: http://www.securityfocus.com/archive/1/503447

New qemu packages fix several vulnerabilities

[SECURITY] [DSA 1799-1] New qemu packages fix several vulnerabilities

<!– Envelope-to: email@address Delivery-date: Mon, 11 May 2009 23:09:40 +0100 Received: from outgoing.securityfocus.com ([205.206.231.26] helo=outgoing2.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M3dgq-0006mu-FW for email@address; Mon, 11 May 2009 23:09:40 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing2.securityfocus.com (Postfix) with QMQP id B91671437C3; Mon, 11 May 2009 15:13:52 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 8862 invoked from network); 11 May 2009 21:13:25 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <jmm@inutil.org> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Flag: NO X-Spam-Score: -10.58 X-Spam-Level: X-Spam-Status: No, score=-10.58 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5] autolearn=ham X-policyd-weight: using cached result; rate: -6.1 Message-ID: <20090511211308.GA3953@galadriel.inutil.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) X-SA-Exim-Connect-IP: 82.83.235.163 X-SA-Exim-Mail-From: jmm@inutil.org X-SA-Exim-Scanned: No (on inutil.org); SAEximRunCond expanded to false X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <5W06-Zox0IG.A.AkF.yTJCKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Mon, 11 May 2009 21:13:22 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 9031 Status: O X-UID: 9031 Content-Length: 4834 X-Keywords:

4063

4063

BAT/KillFiles.NBG, BAT/Restart.NAA (2), HTML/Exploit.IESlice.BT (5), JS/Exploit.Pdfka.NJQ, JS/TrojanDownloader.Agent.NLL, JS/TrojanDownloader.Agent.NQB (4), JS/TrojanDownloader.Psyme.NFC (4), PDF/Exploit.Pidief.OLZ, PDF/Exploit.Pidief.OMA, PDF/Exploit.Pidief.OMB, PDF/Exploit.Pidief.OMC, PDF/Exploit.Pidief.OMD, PDF/Exploit.Pidief.OME, PDF/Exploit.Pidief.OMF, SWF/Exploit.Agent.AI, SWF/Exploit.Agent.AJ, SWF/TrojanDownloader.Agent.NAP (2), SWF/TrojanDownloader.Agent.NAQ (2), SWF/TrojanDownloader.Agent.NAR (2), SWF/TrojanDownloader.Agent.NAS (2), VBS/TrojanDownloader.Psyme.NFU (2), Win32/Adware.Antivirus2008, Win32/Adware.Coolezweb, Win32/Adware.PersonalAntivirus (2), Win32/Adware.Virtumonde.NEH, Win32/Adware.Virtumonde.NEI, Win32/Adware.Virtumonde.NEK (3), Win32/Adware.VirusDoctor, Win32/Agent.NGC, Win32/Agent.NGJ (4), Win32/Agent.NXU (6), Win32/Agent.NXV, Win32/AutoRun.ADC (2), Win32/AutoRun.Delf.BU (5), Win32/AutoRun.FakeAlert.AF, Win32/Delf.OHS, Win32/Delf.OHV (2), Win32/Delf.OHW (2), Win32/FakeInit.I (3), Win32/FlyStudio.NKU, Win32/Fujacks, Win32/Hupigon.NOE, Win32/Injector.OA, Win32/IRCBot.ADZ, Win32/KillAV.NDC, Win32/Kryptik.MD, Win32/MeSub.AW, Win32/Olmarik.FT (24), Win32/Olmarik.GW, Win32/Olmarik.HG (2), Win32/Olmarik.HU, Win32/PSW.Delf.NPD, Win32/PSW.Lineage.NHZ, Win32/PSW.Lineage.NIA (2), Win32/PSW.OnLineGames.NMP, Win32/PSW.OnLineGames.NNM, Win32/PSW.OnLineGames.NNU (3), Win32/PSW.OnLineGames.NTR (2), Win32/PSW.OnLineGames.NUE, Win32/Qhost.NJK, Win32/Sivuxa.B, Win32/SpamTool.Agent.NCL, Win32/Spy.Banker.QEP, Win32/Spy.Banker.QRN, Win32/Spy.Delf.NKW (2), Win32/Spy.Zbot.JF (3), Win32/StartPage.NKD (2), Win32/StartPage.NKE, Win32/TrojanDownloader.Agent.OXO (2), Win32/TrojanDownloader.Agent.OZS, Win32/TrojanDownloader.Agent.PBI, Win32/TrojanDownloader.Agent.PBJ, Win32/TrojanDownloader.Agent.PBK, Win32/TrojanDownloader.Agent.PBL (2), Win32/TrojanDownloader.Banload.OPE (2), Win32/TrojanDownloader.Bredolab.AA (2), Win32/TrojanDownloader.FakeAlert.ABB, Win32/TrojanDownloader.FakeAlert.ABU, Win32/TrojanDownloader.FakeAlert.ABX, Win32/TrojanDownloader.Small.OOU, Win32/TrojanDownloader.Swizzor.NBF (4), Win32/TrojanDownloader.VB.NXZ, Win32/TrojanDownloader.VB.NYA (2), Win32/TrojanDropper.Agent.NYR, Win32/TrojanDropper.Agent.OAC, Win32/TrojanDropper.Agent.OAD (2), Win32/TrojanDropper.Agent.OAE, Win32/VB.NQP (2), Win32/VB.ODE, Win32/VB.ODF (2)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6009&Itemid=26

New libwmf packages fix denial of service

[SECURITY] [DSA 1796-1] New libwmf packages fix denial of service

<!– Envelope-to: email@address Delivery-date: Fri, 08 May 2009 00:12:54 +0100 Received: from outgoing.securityfocus.com ([205.206.231.26] helo=outgoing2.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M2Clq-0004hf-E8 for email@address; Fri, 08 May 2009 00:12:54 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing2.securityfocus.com (Postfix) with QMQP id 6BA0A14377B; Thu, 7 May 2009 15:29:48 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 20392 invoked from network); 7 May 2009 21:24:52 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <nion@debian.org> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Flag: NO X-Spam-Score: -7.08 X-Spam-Level: X-Spam-Status: No, score=-7.08 tagged_above=-10000 required=5.3 tests=[FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5, PHONENUMBER=1.5] autolearn=ham X-policyd-weight: DYN_NJABL=SKIP(0) NOT_IN_SBL_XBL_SPAMHAUS=-1.5 NOT_IN_BL_NJABL=-1.5 DSBL_ORG=SKIP(0) CL_IP_EQ_HELO_IP=-2 (check from: .debian. – helo: .mo-p05-fb.rzone. – helo-domain: .rzone.) FROM/MX_MATCHES_NOT_HELO(DOMAIN)=0; rate: -5 X-RZG-AUTH: :KHkJeFmIefYsEPPKCBl/ZNLv/wXfcKuujweZef2IiPbnG1Hpql+PuSVCXPTLuieFew== X-RZG-CLASS-ID: mo05 Message-ID: <20090507162133.GA8784@ngolde.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; x-action=pgp-signed Content-Disposition: inline X-Mailer: netcat 1.10 X-GPG: 0x73647cff X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <CI5_ambNq2D.A.FTH.gG1AKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Thu, 7 May 2009 21:24:48 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 9003 Status: O X-UID: 9003 Content-Length: 15649 X-Keywords:

New Linux 2.6.18 packages fix several vulnerabilities

[SECURITY] [DSA 1794-1] New Linux 2.6.18 packages fix several vulnerabilities

<!– Envelope-to: email@address Delivery-date: Thu, 07 May 2009 15:02:40 +0100 Received: from outgoing.securityfocus.com ([205.206.231.26] helo=outgoing2.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M24BL-00049p-Qi for email@address; Thu, 07 May 2009 15:02:40 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing2.securityfocus.com (Postfix) with QMQP id 8A1CE143CB2; Thu, 7 May 2009 07:59:14 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 9708 invoked from network); 6 May 2009 23:24:04 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <dannf@ldl.fc.hp.com> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org X-policyd-weight: DYN_NJABL=ERR NOT_IN_SBL_XBL_SPAMHAUS=-1.5 NOT_IN_BL_NJABL=-1.5 DSBL_ORG=ERR CL_IP_EQ_HELO_IP=-2 (check from: .hp. – helo: .g1t0027.austin.hp. – helo-domain: .hp.) FROM/MX_MATCHES_HELO(DOMAIN)=-2 <client=15.216.28.34> <helo=g1t0027.austin.hp.com> <from=dannf@ldl.fc.hp.com> <to=debian-security-announce@lists.debian.org>, rate: -7 X-Virus-Scanned: Debian amavisd-new at ldl.fc.hp.com Message-ID: <20090506232313.GF15333@ldl.fc.hp.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Status: No, score=-9.56 tagged_above=3.6 required=5.3 tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_1=1, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_DRUGS_REL8=0.02, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5] X-Spam-Level: X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <4V7e3VNgAyN.A.EuF.NwhAKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Wed, 6 May 2009 23:23:57 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 8993 Status: O X-UID: 8992 Content-Length: 62482 X-Keywords:

4059

4059

JS/Agent.NAK (4), JS/Exploit.Pdfka.GS (2), JS/Exploit.Pdfka.IP, JS/Exploit.Pdfka.NCY, JS/Exploit.Pdfka.NJL, PDF/Exploit.Pidief.ASZ, PDF/Exploit.Pidief.ATC, PDF/Exploit.Pidief.OLP, PDF/Exploit.Pidief.OLQ, PDF/Exploit.Pidief.OLR, VBS/Disabler.NAB, Win32/Adware.Agent.NMG (6), Win32/Adware.Agent.NMQ (2), Win32/Adware.Antivirus2008, Win32/Adware.AntiVirusAgentPro (2), Win32/Adware.BHO.NEO, Win32/Adware.BHO.NGL, Win32/Adware.Coolezweb (3), Win32/Adware.InternetAntivirus (4), Win32/Adware.Virtumonde.NEK, Win32/Adware.WinAntiVirus, Win32/Adware.WinWebSecurity, Win32/Agent.NXS (2), Win32/Agent.OSE (2), Win32/Agent.PAR (2), Win32/Agent.PHC, Win32/Agent.PJL, Win32/Agent.WPI, Win32/AutoRun.ABH (2), Win32/AutoRun.Autoit.P, Win32/AutoRun.Delf.BT, Win32/AutoRun.FlyStudio.IQ, Win32/FlyStudio.NKR (2), Win32/FlyStudio.NKS, Win32/IRCBot.AMC, Win32/Koutodoor.G (2), Win32/Koutodoor.H, Win32/Peerfrag.AP, Win32/PSW.OnLineGames.NZD, Win32/PSW.OnLineGames.NZM, Win32/PSW.OnLineGames.NZN, Win32/Rootkit.Agent.NIZ (2), Win32/Rootkit.Agent.NLJ (5), Win32/Sohanad.BM, Win32/Spy.Ambler.M, Win32/Spy.Ambler.X, Win32/Spy.Banker.PJS (2), Win32/Spy.Banker.PPG, Win32/Spy.Zbot.JF (3), Win32/TrojanClicker.BHO.NBA, Win32/TrojanClicker.Delf.NHH, Win32/TrojanClicker.VB.NFM (2), Win32/TrojanDownloader.Agent.OYF (2), Win32/TrojanDownloader.Agent.PBD, Win32/TrojanDownloader.Agent.PBE (2), Win32/TrojanDownloader.Delf.ORV (2), Win32/TrojanDownloader.Delf.OTG (2), Win32/TrojanDownloader.Delf.OTH, Win32/TrojanDownloader.Small.EVY, Win32/TrojanDownloader.Wigon.BY, Win32/TrojanDropper.Agent.NFC, Win32/TrojanDropper.Agent.NXN, Win32/TrojanDropper.Agent.OAA, Win32/VB.OCZ (3), Win32/Wigon, Win32/Wigon.KI

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6005&Itemid=26

New kdegraphics packages fix multiple vulnerabilities

[SECURITY] [DSA 1793-1] New kdegraphics packages fix multiple vulnerabilities

<!– Envelope-to: email@address Delivery-date: Wed, 06 May 2009 18:02:53 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M1kWC-0004En-FX for email@address; Wed, 06 May 2009 18:02:53 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id A5A96236F58; Wed, 6 May 2009 10:56:00 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 19890 invoked from network); 6 May 2009 16:48:12 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <noahm@klecker.debian.org> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org Message-Id: <E1M1kHh-0001jg-93@klecker.debian.org> Sender: Noah Meyerhans <noahm@klecker.debian.org> X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Status: No, score=-8.08 tagged_above=3.6 required=5.3 tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_1=1, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5, PHONENUMBER=1.5] X-Spam-Level: X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <2QMI7EQO13O.A.oMB.E9bAKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Wed, 6 May 2009 16:48:04 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 8989 Status: O X-UID: 8989 Content-Length: 91401 X-Keywords:

4055

4055

BAT/Agent.Y, PDF/Exploit.Pidief.OGU, PDF/Exploit.Pidief.OKV, Win32/Adware.Antivirus2008, Win32/Adware.AntiVirusAgentPro, Win32/Adware.InternetAntivirus (4), Win32/Adware.MalwareDoctor, Win32/Adware.MSAntispyware2009, Win32/Adware.OneStep (3), Win32/Adware.SpywareProtect2009, Win32/Adware.WinWebSecurity, Win32/Agent.NGC, Win32/Agent.PBE, Win32/Agent.PDB (2), Win32/Agent.PEP, Win32/Agent.PHC, Win32/Agent.PJH, Win32/Agent.WPI, Win32/Autoit.AG, Win32/AutoRun.ACB, Win32/AutoRun.FakeAlert.AF, Win32/AutoRun.FakeAlert.M, Win32/AutoRun.FlyStudio.IO, Win32/AutoRun.VB.DE, Win32/Boberog.W (2), Win32/Delf.OHP, Win32/FlyStudio.NKQ, Win32/Injector.NF, Win32/Koobface.FX (4), Win32/Koobface.NAY, Win32/Kryptik.OM, Win32/Kryptik.ON, Win32/LockScreen.E, Win32/Olmarik.FT (4), Win32/Olmarik.HM, Win32/Olmarik.HT, Win32/Patched.AT, Win32/PcClient (12), Win32/Peerfrag.AO, Win32/PSW.LdPinch.NEL, Win32/PSW.OnLineGames.NMP (2), Win32/PSW.OnLineGames.NNU (2), Win32/PSW.VB.NCL (3), Win32/PSW.WOW.DZI, Win32/Rootkit.Small.XU, Win32/Rustock, Win32/Rustock.NID (2), Win32/SpamTool.Agent.NCL, Win32/Spy.Banker.QEO, Win32/Spy.Banker.QQZ (2), Win32/Spy.Banker.QRA (2), Win32/Spy.Banker.QRB (2), Win32/Spy.Banker.QRC (2), Win32/Spy.Banker.QRD, Win32/Spy.Banker.QRE, Win32/Spy.Banker.QRF (2), Win32/Spy.Zbot.JF (2), Win32/Spy.Zbot.PR, Win32/StartPage.NJY, Win32/Tinxy.AD, Win32/TrojanClicker.BHO.NBA (2), Win32/TrojanClicker.VB.NFM, Win32/TrojanDownloader.Agent.PAC (2), Win32/TrojanDownloader.Agent.PBB, Win32/TrojanDownloader.Banload.OPB (2), Win32/TrojanDownloader.Bredolab.AA (2), Win32/TrojanDownloader.Small.EVY, Win32/TrojanDownloader.Small.OOC, Win32/TrojanDownloader.Small.OOR (2), Win32/TrojanDropper.Agent.NZW, Win32/VB.NRG (3), Win32/VB.OCU (3), Win32/Wigon (2), Win32/Wigon.KQ (2)

URL: http://www.eset.com/joomla/index.php?option=com_content&task=view&id=6000&Itemid=26