exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

winsd.021100.txt

winsd.021100.txt
Posted Feb 11, 2000
Authored by winsd | Site ntsecurity.net

Windows Security Digest update - Four new risks were discovered: A DoS condition within BTT Software's SNMP Trap Watcher, two DoS conditions within True North Software's Internet Anywhere mail server, a means to open unauthorized TCP ports on Checkpoint's Firewall-1, and a means to bypass complete password authentication on MySQL.

tags | tcp, magazine
systems | windows
SHA-256 | bcb4143ae284ce2188d3038dd05e44ef427558d1f9c0b020e168c5c0e4d5e49a

winsd.021100.txt

Change Mirror Download
February 11, 2000 - Four new risks were discovered: Paul Timmons
reported a DoS condition within BTT Software's SNMP Trap Watcher;
Nubuo Miwa reported two DoS conditions within True North Software's
Internet Anywhere mail server; James McDonald and Thomas Lopatic
reported a means to open unauthorized TCP ports on Checkpoint's
Firewall-1; and Robert van der Meulen/Emphyrio and Willem Pinckaers
reported a means to bypass complete password authentication on MySQL.

For complete details on any of these matters, please visit the URLs
listed below:

* SNMP Trap Watcher DoS
http://www.ntsecurity.net/go/load.asp?iD=/security/trap1.htm

* Internet Anywhere DoS
http://www.ntsecurity.net/go/load.asp?iD=/security/ia1.htm

* Unauthorized Firewall-1 TCP Connections
http://www.ntsecurity.net/go/load.asp?iD=/security/fw1-1.htm

* Bypass Complete Password Checking on MySQL
http://www.ntsecurity.net/go/load.asp?iD=/security/mysql1.htm


Thanks for subscribing to Security UPDATE.

Please tell your friends about this newsletter and alert list!

Sincerely,
The Security UPDATE Team
security@ntsecurity.net

=======================================================================
TO UNSUBSCRIBE from this alert list DO NOT REPLY, instead send e-mail
to listserv@listserv.ntsecurity.net with the words "unsubscribe
securityupdate" in the body of the message without the quotes.

TO SUBSCRIBE to this alert list, send e-mail to the same address listed
above with the words "subscribe securityupdate anonymous" in the body
of the message without the quotes.
=======================================================================
Security UPDATE is powered by LISTSERV(R) software
http://www.lsoft.com/LISTSERV-powered.html
=======================================================================
Copyright (c) 2000 Duke Communications Intl. Inc. - ALL RIGHTS RESERVED
Forwarding this email is permitted, as long as the entire message body,
the mail header, and this notice are included.

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close