Security Hero Rotating Header Image

Buffer Overflow

Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability

Vuln: Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability

Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability

URL: http://www.securityfocus.com/bid/35891

Need information, for MPlayer demux_open_vqf TwinVQ File Handling Buffer Overflow CVE-2008-5616

Bugtraq: Need information, for MPlayer demux_open_vqf TwinVQ File Handling Buffer Overflow CVE-2008-5616

Need information, for MPlayer demux_open_vqf TwinVQ File Handling Buffer Overflow CVE-2008-5616

URL: http://www.securityfocus.com/archive/1/505165

NASA Common Data Format remote buffer overflow(s)

[INFIGO-2009-07-09]: NASA Common Data Format remote buffer overflow(s)

Posted by infocus on Jul 21

===================================================================

 ‘Celebrating 40 years of Apollo and 20 years of buffer overflows’

===================================================================

        INFIGO IS Security Advisory…

URL: http://seclists.org/fulldisclosure/2009/Jul/0298.html

DBD::Pg ‘pg_getline()’ and ‘getline()’ Heap Buffer Overflow Vulnerabilities

Vuln: DBD::Pg ‘pg_getline()’ and ‘getline()’ Heap Buffer Overflow Vulnerabilities

DBD::Pg ‘pg_getline()’ and ‘getline()’ Heap Buffer Overflow Vulnerabilities

URL: http://www.securityfocus.com/bid/34755

CastRipper ‘.m3u’ File Remote Stack Buffer Overflow Vulnerability

Vuln: CastRipper ‘.m3u’ File Remote Stack Buffer Overflow Vulnerability

CastRipper ‘.m3u’ File Remote Stack Buffer Overflow Vulnerability

URL: http://www.securityfocus.com/bid/34915

Sun Solstice AdminSuite ‘sadmind’ ‘adm_build_path()’ Remote Stack Buffer Overflow Vulnerability

Vuln: Sun Solstice AdminSuite ‘sadmind’ ‘adm_build_path()’ Remote Stack Buffer Overflow Vulnerability

Sun Solstice AdminSuite ‘sadmind’ ‘adm_build_path()’ Remote Stack Buffer Overflow Vulnerability

URL: http://www.securityfocus.com/bid/31751

Sun Solaris quotsadmindquot Buffer Overflow Vulnerability

Secunia Research: Sun Solaris quotsadmindquot Buffer Overflow Vulnerability

Posted by Secunia Research on May 23

======================================================================

                     Secunia Research 23/05/2009

       – Sun Solaris…

URL: http://seclists.org/fulldisclosure/2009/May/0198.html

1759 (dtorrent, ctorrent)

CVE-2009-1759 (dtorrent, ctorrent)

Stack-based buffer overflow in the btFiles::BuildFromMI function (trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and probably earlier, and CTorrent 1.3.4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Torrent file containing a long path.

URL: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1759

Pidgin Multiple Buffer Overflow Vulnerabilities

Vuln: Pidgin Multiple Buffer Overflow Vulnerabilities

Pidgin Multiple Buffer Overflow Vulnerabilities

URL: http://www.securityfocus.com/bid/35067

Novell GroupWise Internet Agent SMTP Request Processing Buffer Overflow Vulnerability

Vuln: Novell GroupWise Internet Agent SMTP Request Processing Buffer Overflow Vulnerability

Novell GroupWise Internet Agent SMTP Request Processing Buffer Overflow Vulnerability

URL: http://www.securityfocus.com/bid/35065

Novell GroupWise Internet Agent Email Address Processing Buffer Overflow Vulnerability

Vuln: Novell GroupWise Internet Agent Email Address Processing Buffer Overflow Vulnerability

Novell GroupWise Internet Agent Email Address Processing Buffer Overflow Vulnerability

URL: http://www.securityfocus.com/bid/35064

Nullsoft Winamp ‘gen_ff.dll’ Buffer Overflow Vulnerability

Vuln: Nullsoft Winamp ‘gen_ff.dll’ Buffer Overflow Vulnerability

Nullsoft Winamp ‘gen_ff.dll’ Buffer Overflow Vulnerability

URL: http://www.securityfocus.com/bid/35052

New DNS Bug and Fix Announced

New DNS Bug and Fix Announced

Domain name registries are scrambling to patch a newly discovered bug in popular open source DNS software that could be exploited for denial-of-service attacks.

The bug and a corresponding fix were announced Monday by NLnet Labs, a research group that provides authoritative domain name server software called NSD to domain name registrars.

The bug allows for an attack on an NSD server that would cause it to stop responding to queries. The bug affects all versions of NSD 2.0.0 to 3.2.1, NLnet Labs said calling the bugfix “critical.” The bug is a “one-byte buffer overflow that allows a carefully crafted exploit to take down your name server,” NLnet Labs said.

URL: http://www.hackinthebox.org/index.php?name=News&file=article&sid=31366

NSD ‘packet.c’ Off-By-One Buffer Overflow Vulnerability

Vuln: NSD ‘packet.c’ Off-By-One Buffer Overflow Vulnerability

NSD ‘packet.c’ Off-By-One Buffer Overflow Vulnerability

URL: http://www.securityfocus.com/bid/35029

libsndfile/Winamp VOC Processing Heap Buffer Overflow

[TKADV2009-006] libsndfile/Winamp VOC Processing Heap Buffer Overflow

<!– Envelope-to: email@address Delivery-date: Tue, 19 May 2009 22:45:39 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M6X7z-0002Ls-MA for email@address; Tue, 19 May 2009 22:45:39 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id F14AD2377E8; Tue, 19 May 2009 12:04:20 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 13577 invoked from network); 16 May 2009 08:22:17 -0000 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; t=1242462134; l=5686; s=domk; d=trapkit.de; h=Content-Type:Subject:To:MIME-Version:From:Date:X-RZG-CLASS-ID: X-RZG-AUTH; bh=0bnuDmtOartTeOl1wt3wJ7bagf8=; b=ju7yVQs2i2JF7L5aazidnjVDdGbBE/UCLrVOZ2UY54Zr4+j6GXyJIqpZOlh5i1VS1ka e0NISF7Rz/7OegEFl37bWr3GgmUv3eRW8xXi3Fi/FgZXcCAEwzPOY4k7qdg5Qe20+/gUv DlQBr4q+tLRcmZVIN2ppVzPvQYzhAToXZjc= X-RZG-AUTH: :OGckYVKpa/RorD1n4vbkpyN1OrydUB3M3D078vRVBTvDAWjAyJ2Lqy4= X-RZG-CLASS-ID: mo00 Message-ID: <4A0E7787.2020602@trapkit.de> User-Agent: Mutt/1.5.19 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="————070107060709010308060402" X-IMAPbase: 1176125385 9121 Status: O X-UID: 9121 Content-Length: 5890 X-Keywords: