Gentoo Essential and Critical Security Patch Updates - Page 185
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Researchers have discovered a timing attack on RSA keys, to whichOpenSSL is generally vulnerable, unless RSA blinding has been turnedon.
Researchers have discovered a timing attack on RSA keys, to which OpenSSL is generally vulnerable, unless RSA blinding has been turned on.
The xdrmem_getbytes() function in the XDR library provided by Sun Microsystems contains an integer overflow.
Bitchx is full of sprintf() calls and relying on BIG_BUFFER_SIZE being large enough.
Several vulnerabilities have been found in the OpenSSL toolkit.
By controlling a malicious IMAP server and providing a specially crafted folder, an attacker can crash the mail reader and possibly force execution of arbitrary commands on the vulnerable system with the privileges of the user running Mutt.
Three vulnerabilities were found that could lead to various forms of exploitation ranging from denying to users the ability to read email, provoke system unstability, bypassing security context checks for email content and possibly execution of arbitrary commands on vulnerable systems.
The Linux 2.2 and Linux 2.4 kernels have a flaw in ptrace. This hole allows local users to obtain full privileges.
Researchers have discovered a timing attack on RSA keys, to which OpenSSL is generally vulnerable, unless RSA blinding has been turned on.
man 1.5l fixes a bug which results in arbitrary code execution upon reading a specially formatted man file.
Under certain conditions it is possible to execute arbitrary code using a buffer overflow in the recent qpopper.
A buffer overflow and race condition vulnerabilities have been fixed. These vulnerabilities may lead to remote root compromise.
The SOCKS dissector in Ethereal 0.9.9 is susceptible to a formatstring overflow. Additionally, the NTLMSSP code is susceptible to aheap overflow.
The cumulative security patch is available today and addresses thepotential for exploits surrounding buffer overflows (read/write) andsandbox integrity within the player, which might allow malicious usersto gain access to a user's computer.
The file(1) command contains a buffer overflow vulnerability that canbe leveraged by an attacker to execute arbitrary code under theprivileges of another user.
Versions prior to 0.8.9 had all configuration and connection files world readable.
Remote attackers may exploit the buffer overflow condition to run arbitrary code on a Snort sensor with the privileges of the Snort IDS process, which typically runs as the superuser.
Remote attackers may exploit the buffer overflow condition to run arbitrary code on a Snort sensor with the privileges of the Snort IDS process, which typically runs as the superuser.