what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

winsd.021100.txt

winsd.021100.txt
Posted Feb 11, 2000
Authored by winsd | Site ntsecurity.net

Windows Security Digest update - Four new risks were discovered: A DoS condition within BTT Software's SNMP Trap Watcher, two DoS conditions within True North Software's Internet Anywhere mail server, a means to open unauthorized TCP ports on Checkpoint's Firewall-1, and a means to bypass complete password authentication on MySQL.

tags | tcp, magazine
systems | windows
SHA-256 | bcb4143ae284ce2188d3038dd05e44ef427558d1f9c0b020e168c5c0e4d5e49a

winsd.021100.txt

Change Mirror Download
February 11, 2000 - Four new risks were discovered: Paul Timmons
reported a DoS condition within BTT Software's SNMP Trap Watcher;
Nubuo Miwa reported two DoS conditions within True North Software's
Internet Anywhere mail server; James McDonald and Thomas Lopatic
reported a means to open unauthorized TCP ports on Checkpoint's
Firewall-1; and Robert van der Meulen/Emphyrio and Willem Pinckaers
reported a means to bypass complete password authentication on MySQL.

For complete details on any of these matters, please visit the URLs
listed below:

* SNMP Trap Watcher DoS
http://www.ntsecurity.net/go/load.asp?iD=/security/trap1.htm

* Internet Anywhere DoS
http://www.ntsecurity.net/go/load.asp?iD=/security/ia1.htm

* Unauthorized Firewall-1 TCP Connections
http://www.ntsecurity.net/go/load.asp?iD=/security/fw1-1.htm

* Bypass Complete Password Checking on MySQL
http://www.ntsecurity.net/go/load.asp?iD=/security/mysql1.htm


Thanks for subscribing to Security UPDATE.

Please tell your friends about this newsletter and alert list!

Sincerely,
The Security UPDATE Team
security@ntsecurity.net

=======================================================================
TO UNSUBSCRIBE from this alert list DO NOT REPLY, instead send e-mail
to listserv@listserv.ntsecurity.net with the words "unsubscribe
securityupdate" in the body of the message without the quotes.

TO SUBSCRIBE to this alert list, send e-mail to the same address listed
above with the words "subscribe securityupdate anonymous" in the body
of the message without the quotes.
=======================================================================
Security UPDATE is powered by LISTSERV(R) software
http://www.lsoft.com/LISTSERV-powered.html
=======================================================================
Copyright (c) 2000 Duke Communications Intl. Inc. - ALL RIGHTS RESERVED
Forwarding this email is permitted, as long as the entire message body,
the mail header, and this notice are included.

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close