Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

'Highly critical' security bugs listed for Linux products Print E-mail
User Rating:      How can I rate this item?
Source: - Posted by Vincenzo Ciaglia   
Security Information about several vulnerabilities in Linux and Linux-based applications that are deemed to be "highly critical" were recently posted on the security Web site Debian was cited as a system with operating system vulnerabilities that could be exploited. Meanwhile, users running RealNetworks' open-source Helix browser, the open-source phpWebSite manager utility, as well as users with a network backup product from Arkeia, were warned of software flaws that could leave systems potentially open to attack.

On Debian, the vulnerability exists with bsmtpd, an SMTP mailer component of the Sendmail and Postfix e-mail server packages. warns that "unsanitised addresses can cause the execution of arbitrary commands during alleged mail delivery." This could lead to the possible hijacking of a user's system.

A bug was also recently reported in Arkeia's backup utility software for managing network backup jobs with Linux. The software flaw could cause a buffer overflow on a system running the Arkeia back-up client and allow attackers to run programs on the system. Exploit code for the vulnerability is available.

A software flaw that makes Linux PCs susceptible to malicious WAV files was reported in RealNetworks' open-source Helix media player, which runs on most Linux systems. The flaw could allow an attacker to create a special WAV file that causes a buffer overflow on the system, leaving it open for hackers to run code on the machine.

Read this full article at

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.