833円!!あの有名女優の....

2005-08-11 Thread dvd
http://www.uradvdfun.com
激安!!あの有名女優の無修正DVDが一枚833円!!
高品質!!高画質!!秘密厳守!!
局留め、フリメOK即日発送ですぐにお手元に

   絶対に後悔はさせません
  (引きこもりに注意)

広告代理店「有限会社アストロ」
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Apache 1.3 also vulnerable?

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 clone 316173 -1
Bug#316173: SECURITY: HTTP proxy responses with both Transfer-Encoding and 
Content-Length headers (CAN-2005-2088)
Bug 316173 cloned as bug 322607.

 clone 320048 -2
Bug#320048: SECURITY: buffer-overrun in apache2-ssl (CAN-2005-1268)
Bug is marked as being merged with others.

 reassign -1 apache
Bug#322607: SECURITY: HTTP proxy responses with both Transfer-Encoding and 
Content-Length headers (CAN-2005-2088)
Bug reassigned from package `apache2' to `apache'.

 reassign -2 apache
Bug number -2 not found.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?

2005-08-11 Thread Christian Hammers
Package: apache2
Severity: grave
Tags: security

Hello Apache maintainers,

please check if Debian is vulnerable to CAN-2005-1344 and make sure it
enters http://www.debian.org/security/crossreferences or the not-vulnerable
lists.

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1344
Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute
arbitrary code via a long realm argument. NOTE: since htdigest is normally
only locally accessible and not setuid or setgid, there are few attack
vectors which would lead to an escalation of privileges, unless htdigest is
executed from a CGI program. Therefore this may not be a vulnerability.

thanks,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#322613: Processed: Apache 1.3 also vulnerable?

2005-08-11 Thread Christian Hammers
Package: apache
Severity: critical
Tags: security
thanks

Cloning did not work, so I open a new bug report. Reason was that
RedHat/Fedora also updated their 1.3.27 packages so this version
might also be vulnerable.

  clone 320048 -2
 Bug#320048: SECURITY: buffer-overrun in apache2-ssl (CAN-2005-1268)
 Bug is marked as being merged with others.
 
  reassign -2 apache
 Bug number -2 not found.

bye,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 notfound 322604 2.0.54-3
Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?
Bug marked as not found in version 2.0.54-3.

 merge 307134 322604
Bug number 307134 not found.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?

2005-08-11 Thread Joey Hess
notfound 322604 2.0.54-3
merge 307134 322604
thanks

Christian Hammers wrote:
 Hello Apache maintainers,
 
 please check if Debian is vulnerable to CAN-2005-1344 and make sure it
 enters http://www.debian.org/security/crossreferences or the not-vulnerable
 lists.

You can find a note that this bug was fixed in the changelog for apache2
(2.0.54-3), as well as in the testing security teams's database. Bug
#307134 was previously filed for that. It might be wise to at least
check the changelog before filing grave bug reports in the future.

So this hole was not present in the stable release and thus the stable
security team will never issue a DSA for it (apache2 is not in
oldstable), and so it will never appear on the Debian website.

-- 
see shy jo


signature.asc
Description: Digital signature


Processed: closing 322604

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.4
 close 322604 2.0.54-3
Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.0.54-3, send any further explanations to 
Christian Hammers [EMAIL PROTECTED]


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]