Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Find the information you need for your favorite open source distribution

To browse through our weekly Linux Advisory Watch newsletters, click here.

FreeBSD-SA-96:09:unauthorized access via mount_union / mount_msdos (vfsload)  22 May 1996 
The mount_union and mount_msdos programs invoke another system utility in an insecure fashion while setuid root.
FreeBSD-SA-96:01:sliplogin unauthorized access vulnerability  22 May 1996 
The sliplogin program is used to allow a remote user to dial into a FreeBSD system and start a SLIP connection. The sliplogin program is typically used as replacement user "shell" in this application. The sliplogin program invokes a child process that may be compromised through the passing of certain environment variables.
FreeBSD-SA-96:02:apache httpd meta-character escaping  22 April 1996 
Versions of the apache http daemon before release 1.05 do not properly restrict shell meta-characters transmitted to the daemon via form input (via GET or POST).
FreeBSD-SA-96:08:syslog vulnerability  21 April 1996 
Bounds checking for syslog error messages was not being performed properly.
FreeBSD-SA-96:03:*suggested action only* sendmail smrsh now available  20 April 1996 
Sendmail has the ability to deliver mail to a program on the local system via a pipe. This feature is often used to support automatic mail filtering and vacation programs. This provides a very flexible way to deliver information to an automated task running on a mailserver. Unfortunately, this allows unprivileged users to write tasks that may not properly check for common attacks via the program delivery system. The next release of FreeBSD will now install the sendmail restricted shell utility, smrsh in /usr/libexec and create the directory /usr/libexec/sm.bin to hold programs that may be executed by sendmail to deliver mail to pipes.
<< Start < Prev 43 Next > End >>

Results 295 - 299 of 299


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.