Caveat: I am running linux-2.2.12ow6 which contains
many security fixes, yet I believe my comments are still
valid. Also I am not a kernel guru.
Basically the problem is that the execve system call
checks that argv is a valid pointer but it doesn't check
that all of the pointers in argv
Based on the signatures provided by Mr. Dittrich, we have updated
SARA (http://www-arc.com/sara) (version 3.0.2) to detect the presence
of the mstream DDOS (both wild and published).
--
Bob Todd
Advanced Research Corporation
TurboLinux Security Announcement
Vulnerable Packages: netscape-communicator 4.75-1 and earlier
Date: 02/05/2001 5:00 PDT
Affected TurboLinux
___
TurboLinux Security Announcement
Vulnerable Packages: slocate-2.3-1 and earlier
Date: 02/02/2001 5:00 PDT
Affected TurboLinux versions:TL 6.1 WorkStation
___
TurboLinux Security Announcement
Vulnerable Packages: All versions previous to 8.11.2-5
Date: 02/21/2001 5:00 PDT
Affected TurboLinux versions:TL 6.1 WorkStation
___
TurboLinux Security Announcement
Package: Bind
Vulnerable Packages: All versions previous to 8.2.3
Date: 02/21/2001 5:00 PDT
Affected TurboLinux versions:TL 6.1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
++
| EnGarde Secure Linux Security Advisory April 09, 2001 |
| http://www.engardelinux.org/ ESA-20010409-01
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
++
| EnGarde Secure Linux Security Advisory April 26, 2001 |
| http://www.engardelinux.org/ ESA-20010409-02
---
Immunix OS Security Advisory
Packages updated: xinetd
Affected products: Immunix OS 7.0-beta and 7.0
Bugs fixed: immunix/1614
Date: Mon Jun 11 2001
Advisory ID
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: Updated Caldera Public Keys
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: OpenSSH channel code vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: CUPS buffer overflow when reading names of attributes
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: ftp vulnerability in squid
Advisory number:CSSA-2002
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: Name Service Cache Daemon (nscd) advisory
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux - LD_LIBRARY_PATH problem in KDE sessions
Advisory number
Thank you for your posting of a Cross-Site Scripting issue with the mini-browser that
is included with WinAmp 2.78 and above. Gracenote supplies the underlying technology
for the mini-browser. We have fixed the encoding issue at the server. Should you find
any additional security issues
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: rsync supplementary groups vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: Double free in zlib (libz) vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Open UNIX 8.0.0 UnixWare 7.1.1 : X server allows access to any
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Open UNIX 8.0.0 UnixWare 7.1.1 : Buffer overflow in libX11
with -xrm
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: horde/imp cross scripting vulnerabilities
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: squid compressed DNS answer message boundary failure
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: Race condition in fileutils
Advisory number:CSSA-2002
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: imlib processes untrusted images
Advisory number:CSSA
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:OpenServer 5.0.5 : sar -o buffer overflow
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: icecast buffer overflows and denial-of-service
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: REVISED: Race condition in fileutils
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: imapd buffer overflow when fetching partial mailbox
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: OpenSSH ticket and token passing buffer overflow
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: PHP multipart/form-data vulnerabilities
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : popper buffer overflow
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : sort command creates
temporary
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : scoadmin command creates
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: tcpdump AFS RPC and NFS packet vulnerabilities
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Open UNIX 8.0.0 : BIND 9 Denial-of-Service vulnerability
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:OpenServer 5.0.6a : squid compressed DNS answer message
boundary
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : ppptalk root privilege
vulnerability
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: dhcpd dynamic DNS format string vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: Apache Web Server Chunk Handling Vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : Apache Web Server Chunk
Handling
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : rpc.ttdbserverd file creation
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : uux status file name
buffer
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : timed does not enforce
nulls
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: mod_ssl off-by-one error
Advisory number:CSSA-2002
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: multiple vulnerabilities in openssl
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:Linux: local off by one in cvsd
Advisory number
[EMAIL PROTECTED] wrote:
http://lists.netsys.com/pipermail/full-disclosure/2002-August/001073.html
#old solaris bug die hard.something similar, but not quite. Have you audited
your Solstice
#products recently? lit_tty was nothing.
M^ got lost again
(
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
Caldera International, Inc. Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : REVISED
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Open UNIX 8.0.0 UnixWare 7.1.1 : X server insecure popen and
buffer
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : ypxfrd remote file access
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: remote buffer overflow in webalizer reverse lookup code
--
ETHEREANET-NCC Security Report EN-NCC-20021014-04
D-Link Access Point DWL-900AP+ TFTP Vulnerability
Date discovered:Fri, 11 Oct 2002
Vendor notified on: Mon, 14 Oct 2002
Date published: Mon, 21 Oct 2002
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : Buffer Overflow in
Multiple DNS
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: various packet handling vunerabilities in ethereal
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: inn format string and insecure open vulnerabilities
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : rcp of /proc causes
denial
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: uudecode performs inadequate checks on user-specified
output
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: pam_ldap format string vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: bzip2 file creation and symbolic link vulnerabilities
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: chfn (util-linux) temp file race vulnerability
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: Preboot eXecution Environment (PXE) server
denial-of-service
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: libpng progressive image loading vulnerabilities and
other
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: python insecure temporary files in os._execvpe
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : in.talkd format string
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: KDE SSL and XSS vulnerabilities
Advisory number:CSSA
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: wwwoffled remote access vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: lynx CRLF injection vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: sendmail smrsh bypass vulnerabilities
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: exploitable memory leak in ypserv
Advisory number:CSSA
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: RPC XDR buffer overflow
Advisory number:CSSA-2002
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : closed file descriptor race
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : uudecode performs inadequate
checks
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: multiple vulnerabilities in BIND (CERT CA-2002-31)
Advisory
zkfingerd remote exploit, for syslog() format string mistake.
marcetam
/*
*
* remote exploit for zkfingerd-r3-0.9 linux/x86
* gives uid of user who is running zkfingerd (default: nobody)
* by Marceta Milos
*
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: fetchmail at-sign buffer overflow vulnerability
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 : multiple vulnerabilities in BIND (CERT
CA-2002-31
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: wget directory traversal and buffer overrun
vulnerabilities
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: Webmin Cross-site Scripting and Session ID Spoofing
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : command line argument buffer
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: Apache mod_dav module format string vulnerability
Advisory
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : ftp
vulnerability
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: slocate command line buffer overflows
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : Lax
permissions
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : remote buffer
overflow in sendmail
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: format string vulnerability in zlib (gzprintf)
Advisory number:CSSA-2003
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: remote buffer overflow in sendmail (CERT CA-2003-07)
Advisory number:CSSA
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : REVISED: Lax
permissions on /dev/X
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 OpenServer 5.0.7 : remote
buffer overflow in sendmail
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: KDE rlogin.protocol and telnet.protocol url kio
Vulnerability
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: integer overflow vulnerability in XDR/RPC routines
Advisory number:CSSA
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : Several vulnerabilities in
XDR/RPC routines
Advisory number:CSSA
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: apcupsd remote root vulnerability and buffer overflows
Advisory number
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:OpenLinux: sendmail sign extension buffer overflow (CERT
CA-2003-12)
Advisory number
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
For Immediate Disclosure
== Summary ==
Security Alert: NOVL-2003-2966205
Title: iChain 2.2 Field Patch 1a
Date: 05-Jun-2003
Revision: Original
Product Name
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6 : Buffer overflows and other
security vulnerabilities
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
__
SCO Security Advisory
Subject:UnixWare 7.1.x : Security vulnerability in Merge prior
To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
__
SCO Security Advisory
Subject:OpenServer 5.0.5 OpenServer 5.0.6
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:020
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:021
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:022
http://www.mandriva.com/security
1 - 100 of 8280 matches
Mail list logo