Overview
A local root vulnerability has been discovered in
Exim 4.x (4.10 verified and exploit available) and in
Exim 3.x (3.35 verified).
Impact
--
The vulnerability can only be exploited by the
admin user of exim, who is determined by compiled-in
values. Thus the RISK of this
Hey folks,
During an evaluation of the SAP database for linux I located a
security issue in one of their suid binaries. This issue is a symlink
attack against a binary that makes an execve call to a file in your
current directory. The details of this issue are outlined below. You
should be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 203-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
December 4th, 2002
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --
PACKAGE : pine
SUMMARY : Denial of Service (DoS)
DATE
--
SNS Advisory No.60
Windows XP Disclosure of Registered AP Information
Problem first discovered: 30 Aug 2002
Published: 4 Dec 2002
http://www.lac.co.jp/security/english/snsadv_e/60_e.html
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated KDE packages fix security issues
Advisory ID: RHSA-2002:220-40
Issue date:2002-11-27
Updated on:2002-12-04
Product:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated Webalizer packages fix vulnerability
Advisory ID: RHSA-2002:254-05
Issue date:2002-12-04
Updated on:2002-12-04
Product:
-BEGIN PGP SIGNED MESSAGE-
__
SGI Security Advisory
Title: Buffer Overflow Vulnerability in X Font Server
Number : 20021202-01-I
Date : December 4, 2002
Reference: CERT
-BEGIN PGP SIGNED MESSAGE-
__
SGI Security Advisory
Title: Multiple Vulnerabilities in BIND Name Service Daemon
Number : 20021201-01-P
Date : December 4, 2002
Reference: CERT
Tested and affected software:
Sygate Personal Firewall 5.0 build 1150s (The free version) installed on
Windows XP Pro with SP1
Summary:
Sygate personal firewall has an option to ask for a password before
entering various sections of the application or making some actions
(like moving between
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: exploitable memory leak in ypserv
Advisory number:
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: RPC XDR buffer overflow
Advisory number:
12 matches
Mail list logo