WS_FTP server buffer overflow
There is a new buffer overflow vulnerability discovered WS_FTP version 5.03 and prior. The vulnerability is caused by boundary errors within the handling of the "SITE", "XMKD", "MKD", and "RNFR" commands. Successful exploitation can lead to command execution. Obviously the attacker will to first authenticate with the FTP server first before the exploitation can happen.
DomainKeys is thought to be the solution the spam by many experts. Security professionals know by now that nothing is ever perfect. It turns out that the spammers are using providers that support DomainKeys to broadcast their spam, this indirectly makes the spam look more legitimate. Is there ever a perfect solution for spam?
Knowing that phishing attack is constantly on the rise, it is essential that security professional understand the mechanism of how the phishing attack works. Websense has published a paper detailing the anatomy of a specific phishing attack on MSN and Earthlink customers.
jason /at/ networksec.orgI will be teaching next: Application Security: Securing Web Apps, APIs, and Microservices - SANS Leadership and Cloud Security Dallas 2022 - Live Online
Dec 1st 2004
|Thread locked Subscribe||
Dec 1st 2004
1 decade ago