SuSE Essential and Critical Security Patch Updates - Page 815
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
bind-8.x in all versions of the SuSE distributions contain a bug in the transaction signature handling code that can allow to remotely over-flow a buffer.
kdesu has a flaw which may allow a malicious user to retrieve the root password by listening to a UNIX socket.
The dynamic linker will add user-defined shared libraries to the memory space of a program to be started.
Michal Zalewski has found a buffer overflow in the html parser code of the Netscape Navigator in all versions before and including 4.75.
Many vulnerabilities have been found in the openssh package, along with a compilation problem in the openssh and ssh packages in the SuSE-7.0 distribution.
Several overflowable buffers have been found in SuSE's version of tcpdump that could allow a remote attacker to crash the local tcpdump process.
BIND, the Berkeley Internet Name Daemon, versions before 8.2.2p7, has been found vulnerable to two denial of service attacks.
This notice addresses the latest security advisories from various Linux vendors as well as private contributors on public security forums.
Newer versions of the modprobe program contain a bug which allows local users to gain root priviledges.
Insufficient boundary checking leads to a buffer overflow if a user supplies a specially drafted terminfo database file.
Security problems have been found in the client code of the NIS (Network Information System, aka yp - yellow pages) subsytem.
Using a specially crafted sequence of characters on the commandline, it is possile to trick the traceroute program into running arbitrary code as root.
Insecure temporary file handling may cause the gnorpm package to overwrite arbitrary files on the system.
Errors in both the klogd and the syslogd can cause both daemons do die when specially designed strings get passed to the kernel by the user.
Versions 1.1.5 and before contain a buffer overflow that would allow a remote attacker to gain root access on the target host.
The configuration file for apache contains two security relevant errors.
screen, a tty multiplexer, is installed suid root by default on SuSE Linux distributions.
The glibc implementations in all SuSE distributions starting with SuSE-6.0 have multiple security problems