security report
Blues
blues w ds6.pg.gda.pl
Pon, 27 Maj 2002, 11:10:04 CEST
Wybrane rzeczy - hurtem. Sendmail jest u nas do poprawki - reszta rzeczy
nie wiem.
Prosiłbym o zwrócenie na to uwagi priorytetowo.
5. Sendmail
Vendor: Sendmail Consortium
A denial of service vulnerability was reported in sendmail. A
local user can use file locking mechanisms on critical sendmail
files to deny service to all sendmail users.
Impact: Denial of service via local system
Alert: http://securitytracker.com/alerts/2002/May/1004368.html
22. Ethereal
Vendor: Ethereal.com
Several potential vulnerabilities have been reported in the
Ethereal network sniffer. A remote user could cause the sniffer to
crash or possibly execute arbitrary code.
Impact: Denial of service via network
Alert: http://securitytracker.com/alerts/2002/May/1004344.html
23. Fetchmail
Vendor: Raymond, Eric S.
A buffer overflow vulnerability was reported in 'fetchmail'. A
malicious remote server could cause arbitrary code to be executed
on the system running 'fetchmail'.
Impact: Denial of service via network
Alert: http://securitytracker.com/alerts/2002/May/1004342.html
26. Talkd
Vendor: [Multiple Authors/Vendors]
A format string vulnerability was reported in many
implementations of 'talkd'. A remote user may be able to cause
'talkd' to execute arbitrary code with root privileges.
Impact: Execution of arbitrary code via network
Alert: http://securitytracker.com/alerts/2002/May/1004339.html
34. Bzip2
Vendor: [Multiple Authors/Vendors]
A symbolic link (symlink) hole was reported in the 'bzip2' file
compression utility. A local user may be able to read files with
elevated privileges.
Impact: Disclosure of system information
Alert: http://securitytracker.com/alerts/2002/May/1004330.html
35. K5su
Vendor: [Multiple Authors/Vendors]
A potential vulnerability was reported in the 'k5su' utility
when run on FreeBSD and possibly other BSD-based operating systems.
A local user that is not in the 'wheel' user group may access the
utility.
Impact: User access via local system
Alert: http://securitytracker.com/alerts/2002/May/1004329.html
36. ViewCVS
Vendor: Viewcvs.sourceforge.net
A vulnerability was reported in the ViewCVS web-based CVS
interface software. A remote user can conduct cross-site scripting
attacks against ViewCVS users to steal their authentication cookies.
Impact: Disclosure of authentication information
Alert: http://securitytracker.com/alerts/2002/May/1004328.html
--
---------------------------------
pozdr. Paweł Gołaszewski
---------------------------------
CPU not found - software emulation...
Więcej informacji o liście dyskusyjnej pld-devel-pl