[CLA-2001:373] Conectiva Linux Security Announcement - php4

2001-01-18 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : php4 SUMMARY : Problems with per-directory

[CLA-2001:374] Conectiva Linux Security Announcement - icecast

2001-01-25 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : icecast SUMMARY : Remote root exploit DATE

[CLA-2001:375] Conectiva Linux Security Announcement - MySQL

2001-01-25 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : MySQL SUMMARY : Remote exploit DATE :

[CLA-2001:377] Conectiva Linux Security Announcement - bind

2001-01-30 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : bind SUMMARY : Buffer overflow in bind

[CLA-2001:378] Conectiva Linux Security Announcement - kde2

2001-01-30 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : kde2 SUMMARY : Password sniffing via kdesu

[CLA-2001:379] Conectiva Linux Security Announcement - glibc

2001-02-05 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : glibc SUMMARY : Local root vulnerability in

[CLA-2001:380] Conectiva Linux Security Announcement - proftpd

2001-02-08 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : proftpd SUMMARY : Denial of Service DATE

[CLA-2001:381] Conectiva Linux Security Announcement - sudo

2001-02-26 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : sudo SUMMARY : Local buffer overflow DATE

[CLA-2001:384] Conectiva Linux Security Announcement - cups

2001-03-19 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : cups SUMMARY : Several vulnerabilities in

[CLA-2001:387] Conectiva Linux Security Announcement - icecast

2001-03-19 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : icecast SUMMARY : Remote buffer overflow

[CLA-2001:388] Conectiva Linux Security Announcement - imap

2001-03-20 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : imap SUMMARY : Remote buffer overflow DATE

[CLA-2001:389] Conectiva Linux Security Announcement - licq

2001-03-27 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : licq SUMMARY : Remote command execution

[CLA-2001:390] Conectiva Linux Security Announcement - sgml-tools

2001-03-27 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : sgml-tools SUMMARY : Insecure temporary

[CLA-2001:391] Conectiva Linux Security Announcement - openssh

2001-03-28 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : openssh SUMMARY : Passive traffic analysis

[CLA-2001:392] Conectiva Linux Security Announcement - xntp3

2001-04-09 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : xntp3 SUMMARY : Remote buffer overflow DATE

[CLA-2001:393] Conectiva Linux Security Announcement - netscape

2001-04-17 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : netscape SUMMARY : Remote javascript

[CLA-2001:394] Conectiva Linux Security Announcement - kernel

2001-04-20 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : kernel SUMMARY : Several security problems

[CLA-2001:395] Conectiva Linux Security Announcement - samba

2001-04-20 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : samba SUMMARY : Temporary file

[CLA-2001:399] Conectiva Linux Security Announcement - gnupg

2001-06-07 Thread secure
vulnerabilities DATE : 2001-06-07 15:44:00 ID: CLA-2001:399 RELEVANT RELEASES : 4.0, 4.0es, 4.1, 4.2, 5.0, prg graficos, ecommerce, 5.1, 6.0 - - DESCRIPTION Gnupg is a OpenPGP-compliant tool for secure communication

[CLA-2001:402] Conectiva Linux Security Announcement - exim

2001-06-13 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : exim SUMMARY : Format string vulnerability

[CLA-2001:403] Conectiva Linux Security Announcement - fetchmail

2001-06-19 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : fetchmail SUMMARY : Remote buffer overflow

[CLA-2001:404] Conectiva Linux Security Announcement - xinetd

2001-06-19 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : xinetd SUMMARY : Two security fixes for

[CLA-2001:405] Conectiva Linux Security Announcement - samba

2001-06-24 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : samba SUMMARY : Remote root vulnerability

[CLA-2001:406] Conectiva Linux Security Announcement - xinetd

2001-07-02 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : xinetd SUMMARY : Remote buffer overflow

[CLA-2001:407] Conectiva Linux Security Announcement - Zope

2001-07-02 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : Zope SUMMARY : Remote vulnerability DATE

[CLA-2001:409] Conectiva Linux Security Announcement - tcltk

2001-07-19 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : tcltk SUMMARY : Insecure runtime library

[CLA-2002:470] Conectiva Linux Security Announcement - imlib

2002-03-29 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : imlib SUMMARY : Potential vulnerabilities

[CLA-2002:471] Conectiva Linux Security Announcement - cups

2002-04-03 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : cups SUMMARY : Buffer Overflow DATE :

[CLA-2002:474] Conectiva Linux Security Announcement - ethereal

2002-04-25 Thread secure
two vulnerabilities stated in ethereal's home page: 1.SNMP and LDAP string handling[1] The PROTOS[2] test suite developed by the Oulu University Secure Programming Group found some flaws in SNMP and LDAP protocols support in ethereal. It may be possible to crash or execute arbitrary code

[CLA-2002:476] Conectiva Linux Security Announcement - webalizer

2002-04-26 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : webalizer SUMMARY : Buffer overflow DATE

[CLA-2002:477] Conectiva Linux Security Announcement - mod_python

2002-05-03 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : mod_python SUMMARY : Remote vulnerability

[CLA-2002:483] Conectiva Linux Security Announcement - dhcp

2002-05-09 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : dhcp SUMMARY : Format string vulnerability

[CLA-2002:487] Conectiva Linux Security Announcement - imap

2002-05-24 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : imap SUMMARY : Remote buffer overflow DATE

[CLA-2002:489] Conectiva Linux Security Announcement - mailman

2002-05-24 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : mailman SUMMARY : Cross site scripting

[CLA-2002:490] Conectiva Linux Security Announcement - mozilla

2002-05-29 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : mozilla SUMMARY : Mozilla vulnerabilities

[CLA-2002:494] Conectiva Linux Security Announcement - bind

2002-06-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : bind SUMMARY : Denial of Service

[CLA-2002:507] Conectiva Linux Security Announcement - Resolver libraries

2002-07-11 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : Resolver libraries SUMMARY : Resolver

[CLA-2002:513] Conectiva Linux Security Announcement - openssl

2002-07-31 Thread secure
DATE : 2002-07-31 11:54:00 ID: CLA-2002:513 RELEVANT RELEASES : 6.0, 7.0, 8 - - DESCRIPTION OpenSSL implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well

[CLA-2002:519] Conectiva Linux Security Announcement - kde

2002-08-29 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : kde SUMMARY : X.509 certificate check

[CLA-2002:522] Conectiva Linux Security Announcement - mailman

2002-09-03 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : mailman SUMMARY : Cross site scripting

[CLA-2002:524] Conectiva Linux Security Announcement - postgresql

2002-09-19 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : postgresql SUMMARY : Buffer overflow

[CLA-2002:525] Conectiva Linux Security Announcement - kdelibs

2002-09-20 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : kdelibs SUMMARY : Cross site scripting

[CLA-2002:526] Conectiva Linux Security Announcement - xchat

2002-09-23 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : xchat SUMMARY : /dns command vulnerability

[CLA-2002:527] Conectiva Linux Security Announcement - python

2002-10-01 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : python SUMMARY : os.execvpe()

[CLA-2002:529] Conectiva Linux Security Announcement - XFree86

2002-10-03 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : XFree86 SUMMARY : Local vulnerabilities

[CLA-2002:530] Conectiva Linux Security Announcement - apache

2002-10-07 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : apache SUMMARY : DoS and other

[CLA-2002:533] Conectiva Linux Security Announcement - XFree86

2002-10-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : XFree86 SUMMARY : Several vulnerabilities

[CLA-2002:531] Conectiva Linux Security Announcement - fetchmail

2002-10-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : fetchmail SUMMARY : Multidrop mode

[CLA-2002:539] Conectiva Linux Security Announcement - ypserv

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : ypserv SUMMARY : Ypserv memory leak DATE

[CLA-2002:541] Conectiva Linux Security Announcement - mod_ssl

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : mod_ssl SUMMARY : Cross site scripting

[CLA-2002:540] Conectiva Linux Security Announcement - heartbeat

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : heartbeat SUMMARY : Remote format string

[CLA-2002:537] Conectiva Linux Security Announcement - tetex

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : tetex SUMMARY : dvips command execution

[CLA-2002:534] Conectiva Linux Security Announcement - krb5

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : krb5 SUMMARY : Buffer overflow

[CLA-2002:542] Conectiva Linux Security Announcement - gv/kghostview

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : gv/kghostview SUMMARY : Buffer overflow

[CLA-2002:538] Conectiva Linux Security Announcement - tar/unzip

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : tar/unzip SUMMARY : Directory transversal

[CLA-2002:535] Conectiva Linux Security Announcement - glibc

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : glibc SUMMARY : Fix for several

[CLA-2002:544] Conectiva Linux Security Announcement - linuxconf

2002-11-06 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : linuxconf SUMMARY : Open relay in mailconf

[CLA-2002:545] Conectiva Linux Security Announcement - php4

2002-11-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : php4 SUMMARY : Safe mode bypass and other

[CLA-2002:547] Conectiva Linux Security Announcement - syslog-ng

2002-11-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : syslog-ng SUMMARY : Buffer overflow

[CLA-2002:546] Conectiva Linux Security Announcement - bind

2002-11-17 Thread secure
a vulnerability are made public after all vendors were notified in advance and have had a reasonable amount of time to prepare and test updated packages. We believe this to be the most secure and responsible method for disclosing vulnerabilities. SOLUTION All BIND users should upgrade immediately

[CLA-2002:549] Conectiva Linux Security Announcement - dhcpcd

2002-11-18 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : dhcpcd SUMMARY : Characters expansion

[CLA-2002:550] Conectiva Linux Security Announcement - samba

2002-11-23 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : samba SUMMARY : Buffer overflow

[CLA-2002:551] Conectiva Linux Security Announcement - pine

2002-12-04 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : pine SUMMARY : Denial of Service (DoS) DATE

[CLA-2002:552] Conectiva Linux Security Announcement - wget

2002-12-13 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : wget SUMMARY : Directory transversal

[CLA-2002:554] Conectiva Linux Security Announcement - fetchmail

2002-12-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : fetchmail SUMMARY : Remote vulnerability

[CLA-2002:553] Conectiva Linux Security Announcement - kernel 2.4

2002-12-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : kernel 2.4 SUMMARY : Local denial of

[CLA-2002:556] Conectiva Linux Security Announcement - openldap

2002-12-19 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : openldap SUMMARY : Several vulnerabilities

[CLA-2002:557] Conectiva Linux Security Announcement - cyrus-imapd

2002-12-27 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : cyrus-imapd SUMMARY : Remote command

[CLA-2003:561] Conectiva Linux Security Announcement - cvs

2003-01-23 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : cvs SUMMARY : Update: cvs remote double

[CLA-2003:564] Conectiva Linux Security Announcement - libpng

2003-01-23 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : libpng SUMMARY : Buffer overflow

[CLA-2003:567] Conectiva Linux Security Announcement - mcrypt

2003-02-05 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : mcrypt SUMMARY : Buffer overflow and memory

[CLA-2003:568] Conectiva Linux Security Announcement - mozilla

2003-02-13 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : mozilla SUMMARY : Several vulnerabilities

[CLA-2003:569] Conectiva Linux Security Announcement - kde

2003-02-20 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : kde SUMMARY : Multiple vulnerabilities in

[CLA-2003:570] Conectiva Linux Security Announcement - openssl

2003-02-24 Thread secure
in encrypted connections DATE : 2003-02-24 19:25:00 ID: CLA-2003:570 RELEVANT RELEASES : 6.0, 7.0, 8 - - DESCRIPTION OpenSSL[1] implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1

[CLA-2003:571] Conectiva Linux Security Announcement - sendmail

2003-03-03 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : sendmail SUMMARY : Remote vulnerability

Contact information for Symantec Vulnerability Management

2006-01-05 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 This email is intended to provide contact information for reporting vulnerabilities in Symantec products. If you believe that you have discovered a vulnerability in one of Symantec supported products, we encourage you to contact [EMAIL PROTECTED] In

Re: SEP(Symantec) Bug

2009-02-16 Thread secure
Symantec has reviewed the issue that was reported with smc.exe crashing from the command line. We have confirmed that an improperly formatted command line can cause the user mode process to crash. However, the privileged service process is unaffected. The client machine maintained full

Symantec Security Advisory SYM06-004

2006-03-17 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Symantec Security Advisory SYM06-004 17 March 2006 Veritas Backup Exec: Application Memory Denial of Service Revision History None Severity Medium Remote Access - Yes Local Access - No Authentication Required -No Exploit publicly available - No

Symantec Security Advisory, SYM06-005

2006-03-20 Thread secure
Symantec Security Advisory SYM06-005 17 March 2006 Veritas Backup Exec for Windows Servers: Media Server BENGINE Service Job log Format String Overflow Revision History None Severity Low (network/system authorization and specific configuration required) Remote Access Yes Local Access No

SYM06-006, Veritas NetBackup: Multiple Overflow Vulnerabilities in NetBackup Daemons

2006-03-27 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 3Com/TippingPoint identified multiple buffer overflow vulnerabilities in daemons running on Veritas NetBackup Master, Media Servers and clients. See http://securityresponse.symantec.com/avcenter/security/Content/2006.03.37.h tml for full advisory

Re: SYM06-006, Veritas NetBackup: Multiple Overflow Vulnerabilities in NetBackup Daemons

2006-03-28 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 the correct URL for the full advisory should be http://securityresponse.symantec.com/avcenter/security/Content/2006.03.2 7.html -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.0.5 (Build 5050)

[Symantec Security Advisory] LiveUpdate for Macintosh Local Privilege Escalation

2006-04-18 Thread Secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Title: Symantec LiveUpdate for Macintosh Local Privilege Escalation Threat: Moderate Impact: Local Privilege Escalation Product: LiveUpdate for Macintosh Situation Overview: Some components of Symantecs LiveUpdate for Macintosh do not set their

[Symantec Security Advisor] Symantec Scan Engine Multiple Vulnerabilities

2006-04-21 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Title: Symantec Scan Engine Multiple Vulnerabilities Threat: Moderate Impact: Unauthorized access Product: Symantec Scan Engine Situation Overview: Three vulnerabilities have been discovered in the Symantec Scan Engine. Symantec Scan Engine is

Stack Overflow in Third-Party ActiveX Controls affects Multiple Vendor Products Including Some Symantec Consumer Products and Automated Support

2007-02-23 Thread secure
the Automatic LiveUpdate function, Symantec recommends customers interactively run Symantec LiveUpdate frequently to ensure they have the most current protection available. Establishing more secure Internet zone settings for the local user can prohibit activation of ActiveX controls without the user’s

Re: 3Com's TippingPoint Denial of Service

2007-04-25 Thread Secure
TippingPoint is committed to assuring the security of our customers, and we take all reports of potential security issues against our products very seriously. Even though this report seems less than credible, we would encourgage the author of this advisory to contact us directly and provide

Symantec Product Security: Norton Personal Firewall 2004 ActiveX Control vulnerability

2007-05-16 Thread secure
SYM07-007 May 16, 2007 Symantec Norton Personal Firewall 2004 ActiveX Control Buffer Overflow Risk Impact Medium Affected Products Norton Internet Security 2004 Norton Personal Firewall 2004 Details CERT notified Symantec that a buffer overflow exists in an ActiveX Control used by

SYM07-009,Symantec Storage Foundation for Windows Volume Manager: Authentication Bypass and Potential Code Execution in Scheduler Service

2007-06-04 Thread secure
Symantec Security Advisory http://www.symantec.com/avcenter/security/Content/2007.06.01.html SYM07-009 1 June, 2007 Symantec Storage Foundation for Windows Volume Manager: Authentication Bypass and Potential Code Execution in Scheduler Service Revision History None Severity Medium

SYM07-012 Symantec Reporting Server elevation of privilege

2007-06-05 Thread secure
SYM07-012 Symantec Reporting Server Elevation of Privilege June 5, 2007 Risk Impact Medium Remote Access: Yes Local Access: Yes Authentication Required: No Exploit available: No Overview Files created by a Reporting Server may be accessible to an unauthorized user. Affected

SYM07-011 Symantec Reporting Server password disclosure

2007-06-05 Thread secure
SYM07-011: Symantec Reporting Server Password Disclosure June 5, 2007 Risk Impact: Medium Remote Access: Yes Local Access: Yes Authentication Required:Yes Exploit available: No Overview The administrator password for Symantec Reporting Server could be disclosed after a failed login

Symantec Product Security: Symantec Device Driver Local Elevation of Privilege

2007-09-10 Thread secure
SYM07-024 September 05, 2007 Symantec SYMTDI.SYS Device Driver Local Denial of Service Revision History: None Risk Impact: Low Remote Access: No Local Access: Yes Authentication Required: Yes, to the local system Exploit available: No Overview Some versions of Symantec’s device driver

SYM06-013 Symantec On-Demand Protection Encrypted Data Exposure

2006-08-01 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Symantec has posted a Security Advisory for Symantec On-Demand Protection. PLease see the advisory for complete information: http://www.symantec.com/avcenter/security/Content/2006.08.01a.html -BEGIN PGP SIGNATURE- Version: PGP

(Security Advisory) SYM06-014 Symantec Backup Exec Internal RPC Overflow

2006-08-12 Thread Secure
Any further revisions to this information, if required, will be posted to the official advisory located at : http://www.symantec.com/avcenter/security/Content/2006.08.11.html Symantec Security Advisory SYM06-014 BID 19479 11 August 2006 Symantec Backup Exec for Windows Server: RPC

Symantec Security Advisory: Symantec AntiVirus Corporate Edition

2006-09-18 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Symantec AntiVirus and Symantec Client Security Elevation of Privilege September 13, 2006 Overview An elevation of privilege vulnerability in Symantec Client Security and Symantec AntiVirus Corporate Edition could potentially allow a local

Symantec Product Security: Symantec Device Driver Elevation of Privileg

2006-10-23 Thread secure
Symantec Product Security Advisory October 23, 2006 SYM06-022 Symantec Device Driver Elevation of Privilege Risk Impact: Medium Remote Access: No Local Access: Yes Authentication Required: Yes Exploit available: No Overview Symantec was notified of a vulnerability in a device driver which,

SYM07-029 Symantec BEWS Multiple DoS in Job Engine

2007-11-28 Thread Secure
Symantec Security Advisory SYM07-029 http://www.symantec.com/avcenter/security/Content/2007.11.27.html 27 Nov 2007 Symantec Backup Exec for Windows Server: Multiple Denial of Service Issues in Job Engine Revision History None Severity Medium Remote Access Yes Local Access

Re: Symantec Fax Viewer Control v10 (DCCFAXVW.DLL) remote buffer overflow exploit

2009-04-30 Thread secure
Symantec discontinued sales and support for Winfax Pro in early 2006. As such, there will be no further updates to the product. Anyone running a legacy version of this product and concerned about this issue may want to follow the procedures outlined in MSKB 240797

Re: Local / Remote D.o.S Attack in War FTP Daemon 1.70Vulnerability

1999-12-16 Thread ussr secure
Well maybe some times the D.O.S no work in local mode, but in my computer works, in local mode. anyway it works in Remote Mode "Federico - Comnet S.A." wrote: Yes, we've tried the exploit various computers just for try it, and we can't use the exploit in the local machine, allways the

Determina Fix for CVE-2006-1359 (Zero Day MS Internet Explorer Remote CreateTextRange() Code Execution)

2006-03-28 Thread Determina Secure
March 27, 2006 Determina Fix for CVE-2006-1359 (Zero Day MS Internet Explorer Remote CreateTextRange() Code Execution) Overview Instructions On Downloading The Free Determina Shield For CVE-2006-1359 Based on the same technology used in the VPS LiveShield product, Determina has engineered

Trustix Security Advisory - diffutils squid

2001-01-12 Thread Trustix Secure Linux Team
Hi Trustix today released updated versions of the diffutils and squid packages with patches fixing insecure tempfile handling leading to potential local root compromise. All versions of Trustix Secure Linux are, as far as we know, vulnerable and should be updated. MD5sums: 1.2

Trustix Security Advisory - glibc

2001-01-22 Thread Trustix Secure Linux Team
Hi Trustix is, like many other linux distributions, based on Glibc 2.1.3 and is therefore open to the "preload hole" discussed in various postings to bugtraq and other lists. This is a local security hole, and all users of TSL should upgrade their boxes. MD5sums: 1.2:

  1   2   >