|
Colapse all |
Post message
[SECURITY] [DSA 443-1] New xfree86 packages fix multiple vulnerabilities 2004-02-20 Matt Zimmerman (mdz debian org) OpenLinux: Multiple vulnerabilities were discovered in the saned daemon 2004-02-19 please_reply_to_security sco com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: OpenLinux: Multiple vulnerabilities were discovered in the saned daemon Advisory number: CSSA-2004-005.0 Issue date: 2004 February 1 [ more ] [ reply ] OpenLinux: Fetchmail 6.2.4 and earlier remote dennial of service 2004-02-19 please_reply_to_security sco com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: OpenLinux: Fetchmail 6.2.4 and earlier remote dennial of service Advisory number: CSSA-2004-004.0 Issue date: 2004 February 19 Cros [ more ] [ reply ] OpenLinux: Bind: cache poisoning BIND 8 prior to 8.3.7 and BIND 8.4.x prior 8.4.2 2004-02-19 please_reply_to_security sco com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: OpenLinux: Bind: cache poisoning BIND 8 prior to 8.3.7 and BIND 8.4.x prior 8.4.2 Advisory number: CSSA-2004-003.0 Issue date: 2004 [ more ] [ reply ] OpenLinux: mpg123 remote denial of service and heap-based buffer overflow 2004-02-19 please_reply_to_security sco com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: OpenLinux: mpg123 remote denial of service and heap-based buffer overflow Advisory number: CSSA-2004-002.0 Issue date: 2004 February [ more ] [ reply ] PGP signatures on recent NetBSD Security Advisories 2004-02-19 NetBSD Security-Officer (security-officer netbsd org) -----BEGIN PGP SIGNED MESSAGE----- NetBSD Security-Officer recently published 4 Security Advisories. We have received a number of notes from people that the PGP signatures on these were bad. This has been corrected, and re-signed copies published at: ftp://ftp.NetBSD.org/pub/NetBSD/security/adv [ more ] [ reply ] RE: APC 9606 SmartSlot Web/SNMP management card "backdoor" - Telnet can't be disabled. 2004-02-19 Miskell, Craig (Craig Miskell agresearch co nz) The device appears to need a "restart for this change to take effect" (to quote a phrase from another OS). We have a 9604 (which, incidentally, appears to have the same default password, although the details once logged in are different), and telnet wasn't disabled until I had logged in via telnet [ more ] [ reply ] RE: Second critical mremap() bug found in all Linux kernels 2004-02-18 tlarholm pivx com The mremap() fix in the diff file for the 2.4.24-ow1 kernel patch dates from January 8, 2004 ( http://www.openwall.com/linux/linux-2.4.24-ow1.tar.gz ). The exact same code fix in the 2.4.23-ow2 kernel patch dates from December 18, 2003 ( http://www.openwall.com/linux/linux-2.4.23-ow2.tar.gz ). Kud [ more ] [ reply ] RE: Remote Administrator 2.x: highly possible remote hole or backdoor 2004-02-18 LordInfidel directionweb com From reading the thread on famatech's site, this looks more like a weak password issue, which is true of "ANY" piece of software using simple password authentication. Basically, If Radmin is listening on it's default port tcp/4899, and you are not using the built in IP Filter and/or you are not usi [ more ] [ reply ] NetBSD Security Advisory 2004-002: Inconsistent IPv6 path MTU discovery handling 2004-02-19 NetBSD Security-Officer (security-officer netbsd org) -----BEGIN PGP SIGNED MESSAGE----- NetBSD Security Advisory 2004-002 ================================= Topic: Inconsistent IPv6 path MTU discovery handling Version: NetBSD-current: source prior to February 5, 2004 netBSD 1.6.2: not affected (fixed) NetBSD 1.6.1: affected NetBSD 1.6 [ more ] [ reply ] Re: [RHSA-2004:065-01] Updated kernel packages resolve security vulnerabilities 2004-02-18 Ulrich Keil (ulrich der-keiler de) bugzilla (at) redhat (dot) com [email concealed] wrote: > Paul Starzetz discovered a flaw in return value checking in mremap() > in the Linux kernel versions 2.4.24 and previous that may allow a local > attacker to gain root privileges. No exploit is currently available; > ... There is an Proof-of-concept exploit available: [ more ] [ reply ] NetBSD Security Advisory 2004-003: OpenSSL 0.9.6 ASN.1 parser vulnerability 2004-02-19 NetBSD Security-Officer (security-officer netbsd org) EEYE: ZoneLabs SMTP Processing Buffer Overflow 2004-02-19 Marc Maiffret (mmaiffret eeye com) ZoneLabs SMTP Processing Buffer Overflow Release Date: February 18, 2004 Date Reported: February 13, 2004 Severity: Medium (Local Privilege Escalation/Remote Code Execution) Vendor: ZoneLabs Inc. Software Affected: ZoneAlarm 4.0 and above ZoneAlarm Pro 4.0 and above ZoneAlarm Plus 4.0 and abov [ more ] [ reply ] LiveJournal XSS 2004-02-19 Joshua Miller (jpmiller tds net) LiveJournal (www.livejournal.org), an open source software package used to create popular Internet journals such as LiveJournal (www.livejournal.com) and DeadJournal (www.deadjournal.com), is vulnerable to an XSS vulnerability which allows an attacker to execute script code in a user's browser. [ more ] [ reply ] SUSE Security Announcement: Linux Kernel (SuSE-SA:2004:005) 2004-02-18 thomas suse de (Thomas Biege) NetBSD Security Advisory 2004-004: shmat reference counting bug 2004-02-19 NetBSD Security-Officer (security-officer netbsd org) NetBSD Security Advisory 2004-001: Insufficient packet validation in racoon IKE daemon 2004-02-19 NetBSD Security-Officer (security-officer netbsd org) -----BEGIN PGP SIGNED MESSAGE----- NetBSD Security Advisory 2004-001 ================================= Topic: Insufficient packet validation in racoon IKE daemon Version: NetBSD-current: source prior to January 17, 2004 NetBSD 1.6.2: not affected (fixed) NetBSD 1.6.1: affected NetB [ more ] [ reply ] Cisco Security Advisory: Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities 2004-02-19 Cisco Systems Product Security Incident Response Team (psirt cisco com) APC 9606 SmartSlot Web/SNMP management card "backdoor" - Telnet can't be disabled. 2004-02-19 David Monosov (david monosov futureinquestion net) (1 replies) To your attention: This comes from limited experience with one version of the 9606 firmware (v3.0.3) on MasterSwitch 9xxx series, tested across many of the devices: Although provided an option to disable telnet administratively via the Web interface as well as the Telnet interface itself - telnet d [ more ] [ reply ] Re: APC 9606 SmartSlot Web/SNMP management card "backdoor" - Telnet can't be disabled. 2004-02-19 Keith Clifton (clifton zoomnet net) RE: Multiple WinXP kernel vulns can give user mode programs kernel mode privileges 2004-02-19 first last (randnut hotmail com) >From: "Alun Jones" <alun (at) texis (dot) com [email concealed]> >Umm... yes. And? > >May I quote from the Windows 2000 Server Resource Kit? > >"Debug programs >"(SeDebugPrivilege) >"Allows the user to attach a debugger to any process. This privilege >provides access to sensitive and critical operating system components. >By [ more ] [ reply ] APC Security Advisory - Static factory password vulnerability 2004-02-19 security advisory apcc com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APC Security Advisory - Static factory password vulnerability Who should read this: Customers with products that have APC's hardware-based network management cards installed. APC products that use these cards to attach to the network via a [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 443-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
February 19th, 2004
[ more ] [ reply ]