-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 388-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Matt Zimmerman
September 19th, 2003
On Fri, Sep 19, 2003 at 01:47:28AM -0400, Robert Brockway wrote:
On Fri, 19 Sep 2003, Matt Zimmerman wrote:
On Thu, Sep 18, 2003 at 10:58:49PM -0400, Robert Brockway wrote:
Was there any particular reason that this newer fixed version has a
version number the makes it look older than
On Thu, Sep 18, 2003 at 07:20:08PM +0200, Javier Fernández-Sanguino Peña wrote:
www.slacks.hpg.ig.com.br/bin/rh Infection: Unix/Osf.A
This is an exploit to an OpenSSL bug.
www.slacks.hpg.ig.com.br/bin/mass Infection: Unix/Osf.A
This is a 'massive' scanner
On Fri, Sep 19, 2003 at 08:47:35AM +0200, Michel Messerschmidt wrote:
Be careful!
These files are really infected and will infect other ELF binaries if
you execute them (and if user rights allow it).
I didn't run them just used 'strings'.
PS: Non-viral malware is usally reported
Diego Brouard wrote:
El Miércoles, 17 de Septiembre de 2003 21:29, Markus Schabel
escribió:
Hello!
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip
segfaultet. I've copied gzip from another server over the version
on this
On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote:
They've put a wildcard DNS entry for .com and .net to resolve to their
product called SiteFinder which offers a IE/MSN like Did you mean
to type services.
So any domain that doesn't exist, or in the PENDING/DELETE states, or
On Wed, Sep 17, 2003 at 12:04:01PM +0100, Dale Amon wrote:
On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote:
They've put a wildcard DNS entry for .com and .net to resolve to their
product called SiteFinder which offers a IE/MSN like Did you mean
to type services.
So any
I cannot get STARTTLS to work with the newest snendmail in unstable. It
*always* complains that the key file is group readable! Now, before you
scream RTFM, I did use GroupReadableKeyFile!
I updated to sendmail 8.12.10-1 to patch CAN-2003-0681 CAN-2003-0694
When I startup I get...
On Friday 19 September 2003 17:59, Brian Rectanus wrote:
Hi Brian,
I cannot get STARTTLS to work with the newest snendmail in unstable. It
*always* complains that the key file is group readable! Now, before you
scream RTFM, I did use GroupReadableKeyFile!
please copy
Hey,
On Fri, 2003-09-19 at 13:33, Marc-Christian Petersen wrote:
On Friday 19 September 2003 17:59, Brian Rectanus wrote:
Hi Brian,
I cannot get STARTTLS to work with the newest snendmail in unstable. It
*always* complains that the key file is group readable! Now, before you
scream
On Friday 19 September 2003 23:27, Richard A Nelson wrote:
Hi Richard,
aha... in my case (all my boxen, in fact) the certificate just
expired !!!
I ran /usr/share/sendmail/update_tls new to create a new set of
certificates and things are now kosher !
Sep 19 21:22:20 renegade
Just finishing up doing updates on my machines after the recent
exploit announcements and DSA issuances... I noticed both my HPPA and my
Alpha machines which run woody/stable did not have any new version above
3.4p1-2 (hppa) and 3.4p1-1.woody.2 (alpha)...
Are these versions safe
On Fri, Sep 19, 2003 at 05:58:04PM -0700, Jeremy T. Bouse wrote:
Just finishing up doing updates on my machines after the recent
exploit announcements and DSA issuances... I noticed both my HPPA and my
Alpha machines which run woody/stable did not have any new version above
3.4p1-2 (hppa)
When is there going to be a patched version of OpenSSH for stable? Sid
got the fixed one (3.6.1p2-9), but there's no fixed version for Stable
on security.debian.org.
P.S. I'm talking about CAN-2003-0682, not CAN-2003-0693 and
CAN-2003-0695 which have already been fixed. As a side note, shouldn't
On Sat, Sep 20, 2003 at 06:34:53AM +0300, Birzan George Cristian wrote:
P.S. I'm talking about CAN-2003-0682, not CAN-2003-0693 and
CAN-2003-0695 which have already been fixed. As a side note, shouldn't
the changelog.Debian list which vulnerabilities have been addressed?
When the CAN is known, it
On Thu, Sep 18, 2003 at 09:12:45PM +0200, Bernd Eckenfels wrote:
In article [EMAIL PROTECTED] you wrote:
I found the problem: The file /var/run/sshd.pid was missing.
Well, this raises the question, since failed restarts of daemons are quite
common because there are simply too much errors
On Thu, Sep 18, 2003 at 10:58:49PM -0400, Robert Brockway wrote:
Was there any particular reason that this newer fixed version has a
version number the makes it look older than the exploitable version?
Simple: it doesn't. The version in stable is 8.12.3-4, and the version on
On Fri, 19 Sep 2003, Matt Zimmerman wrote:
On Thu, Sep 18, 2003 at 10:58:49PM -0400, Robert Brockway wrote:
Was there any particular reason that this newer fixed version has a
version number the makes it look older than the exploitable version?
Simple: it doesn't. The version in stable
On Fri, Sep 19, 2003 at 01:47:28AM -0400, Robert Brockway wrote:
On Fri, 19 Sep 2003, Matt Zimmerman wrote:
On Thu, Sep 18, 2003 at 10:58:49PM -0400, Robert Brockway wrote:
Was there any particular reason that this newer fixed version has a
version number the makes it look older than
On Thu, Sep 18, 2003 at 07:20:08PM +0200, Javier Fernández-Sanguino Peña wrote:
www.slacks.hpg.ig.com.br/bin/rh Infection: Unix/Osf.A
This is an exploit to an OpenSSL bug.
www.slacks.hpg.ig.com.br/bin/mass Infection: Unix/Osf.A
This is a 'massive' scanner
On Fri, Sep 19, 2003 at 08:47:35AM +0200, Michel Messerschmidt wrote:
Be careful!
These files are really infected and will infect other ELF binaries if
you execute them (and if user rights allow it).
I didn't run them just used 'strings'.
PS: Non-viral malware is usally reported
Diego Brouard wrote:
El Miércoles, 17 de Septiembre de 2003 21:29, Markus Schabel
escribió:
Hello!
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip
segfaultet. I've copied gzip from another server over the version
on
On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote:
They've put a wildcard DNS entry for .com and .net to resolve to their
product called SiteFinder which offers a IE/MSN like Did you mean
to type services.
So any domain that doesn't exist, or in the PENDING/DELETE states, or
On Wed, Sep 17, 2003 at 12:04:01PM +0100, Dale Amon wrote:
On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote:
They've put a wildcard DNS entry for .com and .net to resolve to their
product called SiteFinder which offers a IE/MSN like Did you mean
to type services.
So any
I cannot get STARTTLS to work with the newest snendmail in unstable. It
*always* complains that the key file is group readable! Now, before you
scream RTFM, I did use GroupReadableKeyFile!
I updated to sendmail 8.12.10-1 to patch CAN-2003-0681 CAN-2003-0694
When I startup I get...
On Friday 19 September 2003 17:59, Brian Rectanus wrote:
Hi Brian,
I cannot get STARTTLS to work with the newest snendmail in unstable. It
*always* complains that the key file is group readable! Now, before you
scream RTFM, I did use GroupReadableKeyFile!
please copy
Hey,
On Fri, 2003-09-19 at 13:33, Marc-Christian Petersen wrote:
On Friday 19 September 2003 17:59, Brian Rectanus wrote:
Hi Brian,
I cannot get STARTTLS to work with the newest snendmail in unstable. It
*always* complains that the key file is group readable! Now, before you
scream
On Friday 19 September 2003 23:27, Richard A Nelson wrote:
Hi Richard,
aha... in my case (all my boxen, in fact) the certificate just
expired !!!
I ran /usr/share/sendmail/update_tls new to create a new set of
certificates and things are now kosher !
Sep 19 21:22:20 renegade
Just finishing up doing updates on my machines after the recent
exploit announcements and DSA issuances... I noticed both my HPPA and my
Alpha machines which run woody/stable did not have any new version above
3.4p1-2 (hppa) and 3.4p1-1.woody.2 (alpha)...
Are these versions safe
On Fri, Sep 19, 2003 at 05:58:04PM -0700, Jeremy T. Bouse wrote:
Just finishing up doing updates on my machines after the recent
exploit announcements and DSA issuances... I noticed both my HPPA and my
Alpha machines which run woody/stable did not have any new version above
3.4p1-2
When is there going to be a patched version of OpenSSH for stable? Sid
got the fixed one (3.6.1p2-9), but there's no fixed version for Stable
on security.debian.org.
P.S. I'm talking about CAN-2003-0682, not CAN-2003-0693 and
CAN-2003-0695 which have already been fixed. As a side note, shouldn't
On Sat, Sep 20, 2003 at 06:34:53AM +0300, Birzan George Cristian wrote:
P.S. I'm talking about CAN-2003-0682, not CAN-2003-0693 and
CAN-2003-0695 which have already been fixed. As a side note, shouldn't
the changelog.Debian list which vulnerabilities have been addressed?
When the CAN is known,
32 matches
Mail list logo