Cotygodniowe dziury
    Blues 
    blues w ds6.pg.gda.pl
       
    Pon,  1 Lip 2002, 11:15:44 CEST
    
    
  
Wygląda na to, że nadążamy w pogoni za łataniem dziur :)
Poprawione:
20. Mod_ssl
    Vendor: Modssl.org
    A vulnerability was reported in mod_ssl.  A local user that can
    create '.htaccess' files may be able to cause mod_ssl to crash or
    execute arbitrary code on the system with the privileges of the web
    server.
    Impact: Denial of service via local system
    Alert: http://securitytracker.com/alerts/2002/Jun/1004636.html
22. Sendmail
    Vendor: Sendmail Consortium
    A buffer overflow was reported in Sendmail.  A remote user with
    control of a DNS server may be able to trigger the overflow if the
    server is configured in a specific manner.
    Impact: Execution of arbitrary code via network
    Alert: http://securitytracker.com/alerts/2002/Jun/1004633.html
34. OpenSSH
    Vendor: OpenSSH.org
    A vulnerability was reported in the OpenSSH implementation of
    the Secure Shell SSH protocol.  A remote user may be able to obtain
    root access on the system.  No further details have been released.
    Impact: Execution of arbitrary code via network
    Alert: http://securitytracker.com/alerts/2002/Jun/1004616.html
**************
To jest BARDZO niepokojące... Pilnie temu się należy przyjrzeć. Bind jest 
na pewno do upgrade - jak bedzie nowa wersja 9.2.2/9.3.0 - jest to podobna 
rzecz jak ta znaleziona ostatnio w sendmailu.
W advisory radza uzyc resolvera z nowego binda 8, bo w 9 jest to po prostu 
kopia.
**************
21. libc
    Vendor: FreeBSD
    A buffer overflow vulnerability was reported in 'libc'.  A
    remote user with control over a DNS server could cause arbitrary
    code to be executed on the system when the system resolves an address.
    Impact: Execution of arbitrary code via network
    Alert: http://securitytracker.com/alerts/2002/Jun/1004635.html
Kolejna rzecz w resinie:
25. Resin
    Vendor: Caucho Technology
    A vulnerability was reported in Caucho's Resin web server.  A
    remote user can determine the physical path of the web root directory.
    Impact: Disclosure of system information
    Alert: http://securitytracker.com/alerts/2002/Jun/1004630.html
-- 
---------------------------------
pozdr.  Paweł Gołaszewski        
---------------------------------
CPU not found - software emulation...
    
    
Więcej informacji o liście dyskusyjnej pld-devel-pl