LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 27th, 2014
Linux Advisory Watch: October 24th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian
Find the information you need for your favorite open source distribution

To browse through our weekly Linux Advisory Watch newsletters, click here.



Debian: 'postgresql' Multiple vulnerabilities  12 September 2002 
Posted by LinuxSecurity.com Team   
Several buffer overflows and integer overflows have been fixed in the latest version. Special upgrade instructions enclosed within advisory.
 
Debian: 'cacti' Arbitrary code execution vulnerability  10 September 2002 
Posted by LinuxSecurity.com Team   
A problem in cacti, a PHP based frontend to rrdtool for monitoringsystems and services, has been discovered. This could lead into cactiexecuting arbitrary program code under the user id of the web server.
 
Debian: 'mhonarc' XSS Vulnerability  09 September 2002 
Posted by LinuxSecurity.com Team   
When processingmaliciously crafted mails of type text/html, mhonarc, does notdeactivate all scripting parts properly.
 
Debian: 'python' Insecure tmp file vulnerability  09 September 2002 
Posted by LinuxSecurity.com Team   
The bugfix we distributed in DSA 159-1 unfortunately caused Python tosometimes behave improperly when a non-executable file existed earlierin the path and an executable file of the same name existed later inthe path.
 
Debian: ethereal buffer overflow  06 September 2002 
Posted by LinuxSecurity.com Team   
It may be possible to make Ethereal crash or hang by injecting a purposefully malformed packet onto the wire, or by convincing someone to read a malformed packet trace file. It may be possible to make Ethereal run arbitrary code by exploiting the buffer and pointer problems.
 
Debian: 'mantis' Privilege escalation vulnerability  04 September 2002 
Posted by LinuxSecurity.com Team   
The Mantis system didn'tcheck whether a user is permitted to view a bug, but displays it rightaway if the user entered a valid bug id.
 
Debian: scrollkeeper tmp file vulnerability  03 September 2002 
Posted by LinuxSecurity.com Team   
The scrollkeeper-get-cl program creates temporary files in an insecure manner in /tmp using guessable filenames. Since scrollkeeper is called automatically when a user logs into a Gnome session, an attacker with local access can easily create and overwrite files as another user.
 
<< Start < Prev 439 440 441 Next > End >>

Results 3081 - 3087 of 3361
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pirate Bay founder guilty in historic hacker case
Parallels CTO: Linux container security is not the problem
Advisory says to assume all Drupal 7 websites are compromised
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.