LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Foresight
Find the information you need for your favorite open source distribution

To browse through our weekly Linux Advisory Watch newsletters, click here.



Foresight: evolution  05 April 2007 
Previous versions of the evolution package were vulnerable to a format string vulnerability which could allow arbitrary code execution at the permission level of the user running evolution (usually non-root) via a specially crafted shared memo.
 
Foresight: ImageMagick  03 April 2007 
Previous versions of the ImageMagick package were vulnerable to buffer overflows in the code which parses DCM and XWD files, which could allow an attacker to execute arbitrary code at the permission level of the user running ImageMagick (usually non-root). The attacker would have to convince a user to open the file in ImageMagick. While these file formats are not common, it is possible to disguise the file such that it appears to be a file of another, more common, type.
 
Foresight: ImageMagick  03 April 2007 
Previous versions of the ImageMagick package were vulnerable to buffer overflows in the code which parses DCM and XWD files, which could allow an attacker to execute arbitrary code at the permission level of the user running ImageMagick (usually non-root). The attacker would have to convince a user to open the file in ImageMagick. While these file formats are not common, it is possible to disguise the file such that it appears to be a file of another, more common, type.
 
Foresight: nas  03 April 2007 
Previous versions of the nas package were vulnerable to a number of buffer overflows, NULL and invalid pointers, and an int overflow. Foresight Linux is not vulnerable to any of these by default, as Foresight does not ship the initscript which starts the nas daemon.
 
Foresight: slocate  29 March 2007 
Previous versions of the slocate package were vulnerable to an information-disclosure vulnerability. Slocate did not properly manage database entries that specify names of files in protected directories. Thus, for example, a user could see via slocate the names of files in a directory chmodded 711.
 
Foresight: openoffice.org  29 March 2007 
Previous versions of openoffice.org were vulnerable to multiple issues which could be exploited to execute arbitrary code at the permission level of the user running openoffice (usually non-root). Attack vectors include coercing a user into opening a URL which contains an exploit, coercing the user into opening a vulnerable WordPerfect file (via bundled libwpd), and coercing a user into opening a vulnerable StarCalc document.
 
Foresight: cups  25 March 2007 
Previous versions of the cups package could be forced to hang via a client "partially negotiating" an ssl connection. In this state, cups would not allow other connections to be made, a denial of service.
 
<< Start < Prev 10 11 12 Next > End >>

Results 71 - 77 of 79
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying
FreeBSD Patches DoS Vulnerability
Rogue cell towers discovered in Washington, D.C.
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.