exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Matt Zimmerman

Email addressmattz at eff.org
First Active2003-09-10
Last Active2004-11-05
2004_11.txt
Posted Nov 5, 2004
Authored by Matt Zimmerman, Cindy Cohn | Site eff.org

Electronic Frontier Foundation Media Release - Presidential Votes Miscast on E-voting Machines Across the Country. Voters from at least half a dozen states reported that touch-screen voting machines had incorrectly recorded their choices, including for president.

tags | paper
SHA-256 | 98a100dacfc7c8f55898504fcce685353f2fd3e7b663c971e024f8729301ad7c
dsa526.txt
Posted Jul 3, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 526-1 - Two vulnerabilities in Webmin 1.140 allow remote attackers to bypass access control rules and the ability to brute force IDs and passwords.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2004-0582, CVE-2004-0583
SHA-256 | 694a2ef6d53bed289850b8d6f2c1bb2f1bf3c36d715e32c5b082cee265bcc4e3
dsa-522.txt
Posted Jun 22, 2004
Authored by Matt Zimmerman, Max Vozeler | Site debian.org

Debian Security Advisory DSA 522-1 - A format string vulnerability in super has been discovered that allows specified users to execute commands with root privileges. This vulnerability could potentially be exploited by a local user to execute arbitrary code with root privileges.

tags | advisory, arbitrary, local, root
systems | linux, debian
advisories | CVE-2004-0579
SHA-256 | 78c7e1bf65152d505c10fbb236ca5fba4a3cc83b2737cffa0bc5add027d86b91
dsa-513.txt
Posted Jun 9, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 513-1 - Jaguar discovered a format string vulnerability in log2mail, whereby a user able to log a specially crafted message to a logfile monitored by log2mail (for example, via syslog) could cause arbitrary code to be executed with the privileges of the log2mail process. Versions below 0.2.5.2 are affected.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0450
SHA-256 | c85dc5d8cb9ffa868064522f567e6bdf09245a30952b161c8ed87e9348f0d01a
dsa-510.txt
Posted May 30, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 510-1 - jaguar discovered a format string vulnerability in jftpgw, an FTP proxy program, whereby a remote user could potentially cause arbitrary code to be executed with the privileges of the jftpgw server process, which runs as user nobody by default.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2004-0448
SHA-256 | f55238d5fd6e9e9d981a76a2e1dc889b92861edfce10fd634692ef07f9ada8e8
dsa-509.txt
Posted May 30, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 509-1 - Steve Kemp discovered a vulnerability in xatitv, one of the programs in the gatos package. If an administrator removes the default configuration file, a local attacker can escalate to root privileges.

tags | advisory, local, root
systems | linux, debian
advisories | CVE-2004-0395
SHA-256 | 3ce34d6d1e5e9badae4bd01e62d08cce72041031812e1163569eaca982b69ca5
dsa-508.txt
Posted May 25, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 508-1 - Jaguar discovered a vulnerability in one component of xpcd, a PhotoCD viewer. xpcd-svga, part of xpcd which uses svgalib to display graphics on the console, would copy user-supplied data of arbitrary length into a fixed-size buffer in the pcd_open function.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0402
SHA-256 | 933ad9aa3641a27d6c66de69c8de545087b7ec673c070c7da435f57c70450c89
dsa-485.txt
Posted Apr 15, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 485-1 - Max Vozeler discovered two format string vulnerabilities in ssmtp, a simple mail transport agent. Untrusted values in the functions die() and log_event() were passed to printf-like functions as format strings. These vulnerabilities could potentially be exploited by a remote mail relay to gain the privileges of the ssmtp process (including potentially root).

tags | advisory, remote, root, vulnerability
systems | linux, debian
advisories | CVE-2004-0156
SHA-256 | dbb0ababf09e05e0182a9e13cbee4381b08e05056c33cc77cc8e03612c4fa654
dsa-484.txt
Posted Apr 15, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 484-1 - Steve Kemp discovered a vulnerability in xonix, a game, where an external program was invoked while retaining setgid privileges. A local attacker could exploit this vulnerability to gain gid games.

tags | advisory, local
systems | linux, debian
advisories | CVE-2004-0157
SHA-256 | 95a2e6f0eb8456498067248b6ff0d47a81a32f4f950f5e93366646d58927a210
DSA-378-1
Posted Sep 10, 2003
Authored by Matt Zimmerman, Nicolas Boullis | Site debian.org

Debian Security Advisory DSA 378-1 - Two vulnerabilities have been found in the Mah-Jong server version 1.4 and below. One enables a remote attacker to gain privileges of the user running the server while the other leads to a denial of service.

tags | advisory, remote, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2003-0705, CVE-2003-0706
SHA-256 | e161375ef6c09ff61f2b741e2582fbe332bd1e3fe1defc1ddc1487c6dd51bda2
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close