security report
    Blues 
    blues w ds6.pg.gda.pl
       
    Pon, 27 Maj 2002, 11:10:04 CEST
    
    
  
Wybrane rzeczy - hurtem. Sendmail jest u nas do poprawki - reszta rzeczy 
nie wiem.
Prosiłbym o zwrócenie na to uwagi priorytetowo.
5. Sendmail
    Vendor: Sendmail Consortium
    A denial of service vulnerability was reported in sendmail.  A
    local user can use file locking mechanisms on critical sendmail
    files to deny service to all sendmail users.
    Impact: Denial of service via local system
    Alert: http://securitytracker.com/alerts/2002/May/1004368.html
22. Ethereal
    Vendor: Ethereal.com
    Several potential vulnerabilities have been reported in the
    Ethereal network sniffer.  A remote user could cause the sniffer to
    crash or possibly execute arbitrary code.
    Impact: Denial of service via network
    Alert: http://securitytracker.com/alerts/2002/May/1004344.html
23. Fetchmail
    Vendor: Raymond, Eric S.
    A buffer overflow vulnerability was reported in 'fetchmail'.  A
    malicious remote server could cause arbitrary code to be executed
    on the system running 'fetchmail'.
    Impact: Denial of service via network
    Alert: http://securitytracker.com/alerts/2002/May/1004342.html
26. Talkd
    Vendor: [Multiple Authors/Vendors]
    A format string vulnerability was reported in many
    implementations of 'talkd'.  A remote user may be able to cause
    'talkd' to execute arbitrary code with root privileges.
    Impact: Execution of arbitrary code via network
    Alert: http://securitytracker.com/alerts/2002/May/1004339.html
34. Bzip2
    Vendor: [Multiple Authors/Vendors]
    A symbolic link (symlink) hole was reported in the 'bzip2' file
    compression utility.  A local user may be able to read files with
    elevated privileges.
    Impact: Disclosure of system information
    Alert: http://securitytracker.com/alerts/2002/May/1004330.html
35. K5su
    Vendor: [Multiple Authors/Vendors]
    A potential vulnerability was reported in the 'k5su' utility
    when run on FreeBSD and possibly other BSD-based operating systems.
    A local user that is not in the 'wheel' user group may access the
    utility.
    Impact: User access via local system
    Alert: http://securitytracker.com/alerts/2002/May/1004329.html
36. ViewCVS
    Vendor: Viewcvs.sourceforge.net
    A vulnerability was reported in the ViewCVS web-based CVS
    interface software.  A remote user can conduct cross-site scripting
    attacks against ViewCVS users to steal their authentication cookies.
    Impact: Disclosure of authentication information
    Alert: http://securitytracker.com/alerts/2002/May/1004328.html
-- 
---------------------------------
pozdr.  Paweł Gołaszewski        
---------------------------------
CPU not found - software emulation...
    
    
Więcej informacji o liście dyskusyjnej pld-devel-pl