es

Nokia Decrypts Browser Traffic, Assures Public Not To Worry





es

VeriSign To Sell Network Solutions Business




es

VeriSign Addresses SSL Certificate Flaw




es

Survey - Privacy Breaches Rampant In Corporations




es

Poisoned Websites Staying Contaminated Longer




es

Soaraway Security Spending Keeps Breaches In Check





es

Data Breaches Cost $6.6 Million On Average, Survey Finds




es

Survey - Identity Fraud Climbs, But Costs Less




es

Survey - Half Of Businesses Do Not Secure Personal Data




es

Most Consumers Reuse Banking Passwords On Other Sites




es

Survey Highlights Growth In IT Security Roles




es

Survey Shows Most Flaws Sold For $5,000 Or Less




es

1 In 10 Americans Prefer Colonoscopies To PC Security




es

HP Study Finds Security Holes In Privilege Management












es

Whisper This, But Java Deserialization Vulnerability Affects More Libraries









es

Scientologist Overlord Declares Victory Over Anonymous






es

Surveillance Footage And Code Clues Indicate Stuxnet Hit Iran







es

Worm Wriggles Through Year-Old Flaw, Builds Zombie-Net








es

FutureSoft TFTP Server 2000 Transfer-Mode Overflow

This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all).




es

Windows Media Services ConnectFunnel Stack Buffer Overflow

This Metasploit module exploits a stack buffer overflow in the Windows Media Unicast Service version 4.1.0.3930 (NUMS.exe). By sending a specially crafted FunnelConnect request, an attacker can execute arbitrary code under the "NetShowServices" user account. Windows Media Services 4.1 ships with Windows 2000 Server, but is not installed by default. NOTE: This service does NOT restart automatically. Successful, as well as unsuccessful exploitation attempts will kill the service which prevents additional attempts.