what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

winsd.021100.txt

winsd.021100.txt
Posted Feb 11, 2000
Authored by winsd | Site ntsecurity.net

Windows Security Digest update - Four new risks were discovered: A DoS condition within BTT Software's SNMP Trap Watcher, two DoS conditions within True North Software's Internet Anywhere mail server, a means to open unauthorized TCP ports on Checkpoint's Firewall-1, and a means to bypass complete password authentication on MySQL.

tags | tcp, magazine
systems | windows
SHA-256 | bcb4143ae284ce2188d3038dd05e44ef427558d1f9c0b020e168c5c0e4d5e49a

winsd.021100.txt

Change Mirror Download
February 11, 2000 - Four new risks were discovered: Paul Timmons
reported a DoS condition within BTT Software's SNMP Trap Watcher;
Nubuo Miwa reported two DoS conditions within True North Software's
Internet Anywhere mail server; James McDonald and Thomas Lopatic
reported a means to open unauthorized TCP ports on Checkpoint's
Firewall-1; and Robert van der Meulen/Emphyrio and Willem Pinckaers
reported a means to bypass complete password authentication on MySQL.

For complete details on any of these matters, please visit the URLs
listed below:

* SNMP Trap Watcher DoS
https://www.ntsecurity.net/go/load.asp?iD=/security/trap1.htm

* Internet Anywhere DoS
https://www.ntsecurity.net/go/load.asp?iD=/security/ia1.htm

* Unauthorized Firewall-1 TCP Connections
https://www.ntsecurity.net/go/load.asp?iD=/security/fw1-1.htm

* Bypass Complete Password Checking on MySQL
https://www.ntsecurity.net/go/load.asp?iD=/security/mysql1.htm


Thanks for subscribing to Security UPDATE.

Please tell your friends about this newsletter and alert list!

Sincerely,
The Security UPDATE Team
security@ntsecurity.net

=======================================================================
TO UNSUBSCRIBE from this alert list DO NOT REPLY, instead send e-mail
to listserv@listserv.ntsecurity.net with the words "unsubscribe
securityupdate" in the body of the message without the quotes.

TO SUBSCRIBE to this alert list, send e-mail to the same address listed
above with the words "subscribe securityupdate anonymous" in the body
of the message without the quotes.
=======================================================================
Security UPDATE is powered by LISTSERV(R) software
https://www.lsoft.com/LISTSERV-powered.html
=======================================================================
Copyright (c) 2000 Duke Communications Intl. Inc. - ALL RIGHTS RESERVED
Forwarding this email is permitted, as long as the entire message body,
the mail header, and this notice are included.

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close