Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Find the information you need for your favorite open source distribution

To browse through our weekly Linux Advisory Watch newsletters, click here.

Ubuntu: 1056-1: vulnerabilities  02 February 2011 
Posted by Benjamin D. Thomas   
Charlie Miller discovered several heap overflows in PPT processing. Ifa user or automated system were tricked into opening a specially craftedPPT document, a remote attacker could execute arbitrary code with userprivileges. Ubuntu 10.10 was not affected. (CVE-2010-2935, CVE-2010-2936) [More...]
Ubuntu: 1055-1: OpenJDK vulnerabilities  01 February 2011 
Posted by Benjamin D. Thomas   
It was discovered that IcedTea for Java did not properly verifysignatures when handling multiply signed or partially signed JAR files,allowing an attacker to cause code to execute that appeared to comefrom a verified source. (CVE-2011-0025) [More...]
Ubuntu: 1053-1: Subversion vulnerabilities  01 February 2011 
Posted by Benjamin D. Thomas   
It was discovered that Subversion incorrectly handled certain 'partialaccess' privileges in rare scenarios. Remote authenticated users could usethis flaw to obtain sensitive information (revision properties). This issueonly applied to Ubuntu 6.06 LTS. (CVE-2007-2448) [More...]
Ubuntu: 1052-1: OpenJDK vulnerability  26 January 2011 
Posted by Benjamin D. Thomas   
It was discovered that the JNLP SecurityManager in IcedTea for JavaOpenJDK in some instances failed to properly apply the intendedscurity policy in its checkPermission method. This could allow anattacker execute code with privileges that should have been prevented.(CVE-2010-4351) [More...]
Ubuntu: 1047-1: AWStats vulnerability  24 January 2011 
Posted by Benjamin D. Thomas   
It was discovered that AWStats did not correctly filter the LoadPluginconfiguration option. A local attacker on a shared system could use thisto inject arbitrary code into AWStats. [More...]
Ubuntu: 1048-1: Tomcat vulnerability  24 January 2011 
Posted by Benjamin D. Thomas   
It was discovered that Tomcat did not properly escape certain parameters inthe Manager application which could result in browsers becoming vulnerableto cross-site scripting attacks when processing the output. With cross-sitescripting vulnerabilities, if a user were tricked into viewing serveroutput during a crafted server request, a remote attacker could exploit [More...]
Ubuntu: 1046-1: Sudo vulnerability  20 January 2011 
Posted by Benjamin D. Thomas   
Alexander Kurtz discovered that sudo would not prompt for a password whena group was specified in the Runas_Spec. A local attacker could exploitthis to execute arbitrary code as the specified group if sudo wasconfigured to allow the attacker to use a program as this group. The groupRunas_Spec is not used in the default installation of Ubuntu. [More...]
<< Start < Prev 181 182 183 Next > End >>

Results 1261 - 1267 of 1884


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Infosec geniuses hack a Canon PRINTER and install DOOM
How network virtualization is used as a security tool
Here's What Hackers Can Do With Your CRM Data
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.