[SECURITY] [DSA-262-1] samba security fix

2003-03-15 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-262-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman March 15, 2003

[SECURITY] [DSA-257-1] sendmail remote exploit

2003-03-04 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-257-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman March 4, 2003

[SECURITY] [DSA-212-1] Multiple MySQL vulnerabilities

2002-12-17 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-212-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman December 17, 2002

[SECURITY] [DSA-209-1] two wget problems

2002-12-12 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-209-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman December 12, 2002

[SECURITY] [DSA-210-1] lynx CRLF injection

2002-12-12 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-210-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman December 13, 2002

[SECURITY] [DSA-206-1] tcpdump BGP decoding error

2002-12-10 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-206-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman December 10, 2002

[SECURITY] [DSA-205-1] gtetrinet buffer overflows

2002-12-10 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-205-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman December 10, 2002

[SECURITY] [DSA-190-1] buffer overflow in Window Maker

2002-11-07 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-190-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman November 7, 2002

[SECURITY] [DSA-138-1] Remote execution exploit in gallery

2002-07-31 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-138-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman August 1, 2002

[SECURITY] [DSA-128-1] sudo buffer overflow

2002-04-25 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-128-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman April 26, 2002

[SECURITY] [DSA-126-1] Horde and IMP cross-site scripting attack

2002-04-16 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-126-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman April 16, 2002

[SECURITY] [DSA-127-1] buffer overflow in xpilot-server

2002-04-16 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-127-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman April 17, 2002

[SECURITY] [DSA-066-1] cfingerd remote exploit

2001-07-11 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-066-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman July 11, 2001

Re: smbd remote file creation vulnerability

2001-06-27 Thread Wichert Akkerman
Previously Pavol Luptak wrote: Linux kernels with openwall patch (with restricted links in /tmp) are imunne to this type of attack (following symlinks does not work, link owner does not match with file's owner). If symlink don't work you can still use a hardlink though. Wichert. --

[SECURITY] [DSA-065-1] samba remote file append/creation problem

2001-06-24 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-065-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 23, 2001

[SECURITY] [DSA-063-1] two xinetd problems

2001-06-18 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-063-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 17, 2001

Re: Rxvt vulnerability

2001-06-16 Thread Wichert Akkerman
Previously Samuel Dralet wrote: RXVT Vulnerability Date : 2001/06/05 Vulnerable system : rxvt 2.6.2 on Debian Linux 2.2 [.. snip snip ..] Status vendor : contacted two weeks ago but no response. I'm curious who you contacted; from what I can see you did not contact Debian

[SECURITY] [DSA-060-1] fetchmail buffer overflow

2001-06-16 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-060-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 16, 2001

[SECURITY] [DSA-061-1] multiple gnupg problems

2001-06-16 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-061-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 16, 2001

[SECURITY] [DSA-059-1] man-db symlink attack

2001-06-12 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-059-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 12, 2001

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-11 Thread Wichert Akkerman
Previously Peter van Dijk wrote: crypt() passwords are never more than 8 characters - anything beyond 8 characters is discarded. That highly depends on the crypt implementation. The original crypt only used 8 characters, but modern implementations can use different schemes (md5 for example).

[SECURITY] [DSA-058-1] exim printf format attack

2001-06-10 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-058-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 10, 2001

Re: Vixie cron vulnerability

2001-05-15 Thread Wichert Akkerman
Previously Kris Kennaway wrote: I think this is a Linux-specific enhancement to vixie cron; nothing remotely similar to the affected code seems to be in the FreeBSD version, and I thought we were using the most recent vendor version. As the Debian advisory mentioned, this was the result of a