LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-24-2003, 07:57 PM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LQ weekly security rep - Mon Feb 24th 2003


Feb 24th 2003
14 of 22 issues handled (SF)
1. Util-Linux mcookie Cookie Generation Weakness
2. IndyNews delMediaFile() File Deletion Vulnerability
3. IndyNews manageMedia() File Deletion Vulnerability
4. IndyNews HTML Injection Vulnerability
7. PHP-Board User Password Disclosure Vulnerability
8. Kietu Hit.PHP Remote File Inclusion Vulnerability
9. DotBr PHPInfo Environment Information Disclosure Vulnerability
10. DotBr Config.Inc Information Disclosure Vulnerability
11. DotBr Exec.PHP3 Remote Command Execution Vulnerability
12. DotBr System.PHP3 Remote Command Execution Vulnerability
19. PHP CGI SAPI Code Execution Vulnerability
20. Netcharts Server Chunked Encoding Information Leakage Vulnerability
21. D-Forum Remote File Include Vulnerability
22. BitchX Malformed RPL_NAMREPLY Denial Of Service Vulnerability

Feb 24th 2003
29 of 45 issues handled (ISS)
SuckBot mod_mysql_logger denial of service
IndyNews delMediaFile() file deletion
IndyNews manageMedia() file deletion and
php-Board login.php plaintext passwords
Kietu hit.php remote PHP file include
DotBr foo.php3 information disclosure
DotBr config.inc information disclosure
DotBr exec.php3 and system.php3 command execution
D-Forum header.php3 or footer.php3 script PHP file
BitchX IRC client RPL_NAMREPLY message denial of
PHP could allow access to the CGI SAPI
SYSLINUX privilege elevation
petitforum liste.txt information disclosure
petitforum message.php authentication bypass
cPanel guestbook.cgi command execution
cPanel SCRIPT_FILENAME privilege elevation
Solaris UDP RPC denial of service
myPHPNuke links.php cross-site scripting
Multiple SSL/TLS implementation CBC ciphersuites
Sage $mod cross-site scripting
Sage non-existent module request path disclosure
Multiple operating system boot disks could be used
login_ldap bypass password authentication
PHP-Nuke search module SQL injection
phpBB index.php SQL injection
zlib gzprintf() buffer overflow
Rogue save_into_file() buffer overflow
SuSE Linux Eject information disclosure
WWWBoard message cross-site scripting
 
Old 02-24-2003, 07:58 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Feb 24th 2003 (ISS)

Internet Security Systems

Date Reported: 02/13/2003
Brief Description: SuckBot mod_mysql_logger denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Solaris Any version, FreeBSD Any
version, SuckBot 0.006 and earlier
Vulnerability: suckbot-modmysqllogger-dos
X-Force URL: http://www.iss.net/security_center/static/11340.php

Date Reported: 02/14/2003
Brief Description: IndyNews delMediaFile() file deletion
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, IndyNews Any version
Vulnerability: indynews-delmediafile-delete-files
X-Force URL: http://www.iss.net/security_center/static/11348.php

Date Reported: 02/14/2003
Brief Description: IndyNews manageMedia() file deletion and
modification
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, IndyNews Any version
Vulnerability: indynews-managemedia-delete-files
X-Force URL: http://www.iss.net/security_center/static/11349.php

Date Reported: 02/15/2003
Brief Description: php-Board login.php plaintext passwords
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, php-Board 1
Vulnerability: phpboard-login-plaintext-passwords
X-Force URL: http://www.iss.net/security_center/static/11338.php

Date Reported: 02/15/2003
Brief Description: Kietu hit.php remote PHP file include
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Kietu 2.0, Kietu 2.3
Vulnerability: kietu-hit-file-include
X-Force URL: http://www.iss.net/security_center/static/11341.php
Date Reported: 02/15/2003
Brief Description: DotBr foo.php3 information disclosure
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, DotBr 0.1
Vulnerability: dotbr-foo-info-disclosure
X-Force URL: http://www.iss.net/security_center/static/11353.php

Date Reported: 02/15/2003
Brief Description: DotBr config.inc information disclosure
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, DotBr 0.1
Vulnerability: dotbr-config-info-disclosure
X-Force URL: http://www.iss.net/security_center/static/11354.php

Date Reported: 02/15/2003
Brief Description: DotBr exec.php3 and system.php3 command execution
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, DotBr 0.1
Vulnerability: dotbr-exec-execute-commands
X-Force URL: http://www.iss.net/security_center/static/11355.php

Date Reported: 02/16/2003
Brief Description: D-Forum header.php3 or footer.php3 script PHP file
include
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, D-Forum 1.00 to 1.11
Vulnerability: dform-header-file-include
X-Force URL: http://www.iss.net/security_center/static/11342.php

Date Reported: 02/16/2003
Brief Description: BitchX IRC client RPL_NAMREPLY message denial of
service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Solaris Any version, Windows NT
Any version, FreeBSD Any version, OpenBSD Any
version, Gentoo Linux Any version, Mac OS Any
version, BitchX 75p3, BitchX 1.0c16, BitchX 1.0c19,
BitchX 1.0c20cvs
Vulnerability: bitchx-irc-namreply-dos
X-Force URL: http://www.iss.net/security_center/static/11363.php

Date Reported: 02/17/2003
Brief Description: PHP could allow access to the CGI SAPI
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, OpenPKG CURRENT, Gentoo Linux Any version,
OpenPKG 1.2, PHP 4.3.0
Vulnerability: php-cgi-sapi-access
X-Force URL: http://www.iss.net/security_center/static/11343.php

Date Reported: 02/17/2003
Brief Description: SYSLINUX privilege elevation
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, Gentoo Linux Any version,
SYSLINUX prior to 2.02
Vulnerability: syslinux-gain-privileges
X-Force URL: http://www.iss.net/security_center/static/11351.php

Date Reported: 02/17/2003
Brief Description: petitforum liste.txt information disclosure
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, petitforum Any version
Vulnerability: petitforum-liste-info-disclosure
X-Force URL: http://www.iss.net/security_center/static/11358.php

Date Reported: 02/17/2003
Brief Description: petitforum message.php authentication bypass
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, petitforum Any version
Vulnerability: petitforum-message-auth-bypass
X-Force URL: http://www.iss.net/security_center/static/11359.php

Date Reported: 02/18/2003
Brief Description: cPanel guestbook.cgi command execution
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, cPanel 5 and earlier
Vulnerability: cpanel-guestbook-command-execution
X-Force URL: http://www.iss.net/security_center/static/11356.php

Date Reported: 02/18/2003
Brief Description: cPanel SCRIPT_FILENAME privilege elevation
Risk Factor: High
Attack Type: Host Based
Platforms: Linux Any version, cPanel 5 and earlier
Vulnerability: cpanel-scriptfilename-gain-privileges
X-Force URL: http://www.iss.net/security_center/static/11357.php

Date Reported: 02/18/2003
Brief Description: Solaris UDP RPC denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: Solaris 2.5.1 and earlier, Solaris 2.6, Solaris 7,
Solaris 8, Solaris 9
Vulnerability: solaris-udp-rpc-dos
X-Force URL: http://www.iss.net/security_center/static/11368.php

Date Reported: 02/19/2003
Brief Description: myPHPNuke links.php cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, myPHPNuke Any version
Vulnerability: myphpnuke-links-xss
X-Force URL: http://www.iss.net/security_center/static/11367.php

Date Reported: 02/19/2003
Brief Description: Multiple SSL/TLS implementation CBC ciphersuites
information leak
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Mandrake Linux 7.2, Mandrake
Linux 8.0, Mandrake Single Network Firewall 7.2,
Mandrake Linux 8.1, EnGarde Secure Linux Community
Edition, Mandrake Linux 8.2, OpenPKG CURRENT,
Gentoo Linux Any version, OpenPKG 1.1, Mandrake
Linux 9.0, Mandrake Multi Network Firewall 8.2,
OpenPKG 1.2, OpenSSL prior to 0.9.7a
Vulnerability: ssl-cbc-information-leak
X-Force URL: http://www.iss.net/security_center/static/11369.php

Date Reported: 02/19/2003
Brief Description: Sage $mod cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Sage 1.0b3
Vulnerability: sage-mod-xss
X-Force URL: http://www.iss.net/security_center/static/11371.php

Date Reported: 02/19/2003
Brief Description: Sage non-existent module request path disclosure
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Sage 1.0b3
Vulnerability: sage-module-path-disclosure
X-Force URL: http://www.iss.net/security_center/static/11372.php

Date Reported: 02/19/2003
Brief Description: Multiple operating system boot disks could be used
to gain unauthorized system access
Risk Factor: Medium
Attack Type: Host Based
Platforms: Linux Any version, Windows Any version, Unix Any
version
Vulnerability: boot-disk-unauth-access
X-Force URL: http://www.iss.net/security_center/static/11378.php

Date Reported: 02/20/2003
Brief Description: login_ldap bypass password authentication
Risk Factor: Medium
Attack Type: Network Based
Platforms: login_ldap Any version, OpenLDAP 2.0.x, OpenLDAP
2.1.x
Vulnerability: loginldap-password-bypass
X-Force URL: http://www.iss.net/security_center/static/11374.php

Date Reported: 02/20/2003
Brief Description: PHP-Nuke search module SQL injection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, PHP-Nuke 5.6, PHP-Nuke 6.0
Vulnerability: phpnuke-search-sql-injection
X-Force URL: http://www.iss.net/security_center/static/11375.php

Date Reported: 02/20/2003
Brief Description: phpBB index.php SQL injection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, phpBB 2.0, phpBB 2.0.1, phpBB 2.0.2
Vulnerability: phpbb-index-sql-injection
X-Force URL: http://www.iss.net/security_center/static/11376.php

Date Reported: 02/21/2003
Brief Description: zlib gzprintf() buffer overflow
Risk Factor: Low
Attack Type: Host Based
Platforms: BSD Any version, Linux Any version, Windows Any
version, Unix Any version, zlib 1.1.4-1
Vulnerability: zlib-gzprintf-bo
X-Force URL: http://www.iss.net/security_center/static/11381.php

Date Reported: 02/21/2003
Brief Description: Rogue save_into_file() buffer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: BSD Any version, Linux Any version, Rogue 5.2-2
Vulnerability: rogue-saveintofile-bo
X-Force URL: http://www.iss.net/security_center/static/11382.php

Date Reported: 02/22/2003
Brief Description: SuSE Linux Eject information disclosure
Risk Factor: Low
Attack Type: Host Based
Platforms: SuSE Linux 7.3, Eject 2.0.10
Vulnerability: linux-eject-information-disclosure
X-Force URL: http://www.iss.net/security_center/static/11380.php

Date Reported: 02/22/2003
Brief Description: WWWBoard message cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, WWWBoard 2.0A2.1 and prior
Vulnerability: wwwboard-message-xss
X-Force URL: http://www.iss.net/security_center/static/11383.php
 
Old 02-24-2003, 08:00 PM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Feb 24th 2003 (SF)

SecurityFocus

1. Util-Linux mcookie Cookie Generation Weakness
BugTraq ID: 6855
Remote: Yes
Date Published: Feb 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6855
Summary:

util-linux is a freely available, open source software package that
provides some implementations of standard UNIX utilities, such as login.
Included with util-linux is the mcookie utility that is used to generate
random cookies for use with X authentication.

A weakness has been reported for the mcookie utility where cookies may be
generated in a predictable manner. The weakness occurs because mcookie
uses /dev/urandom to generate cookies.

This may be exploited by an attacker to guess cookie values to steal
credentials of users who use X authentication.

Information obtained in this manner may be used by the attacker to launch
further attacks against vulnerable systems and users.

2. IndyNews delMediaFile() File Deletion Vulnerability
BugTraq ID: 6856
Remote: Yes
Date Published: Feb 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6856
Summary:

IndyNews is a module designed for integration with the PHP-Nuke web portal
software.

A vulnerability has been discovered in the IndyNews module available for
PHP-Nuke. The problem occurs in the delMediaFile() function and may allow
an unauthorized attacker to delete media files. The susceptible files are
only those that have been included in an approved article. This issue
could be exploited to obstruct a website's ability to distribute various
files.

The precise technical details regarding this vulnerability are currently
unknown. This BID will be updated accordingly as more information is made
available.

3. IndyNews manageMedia() File Deletion Vulnerability
BugTraq ID: 6857
Remote: Yes
Date Published: Feb 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6857
Summary:

IndyNews is a module designed for integration with the PHP-Nuke web portal
software.

A vulnerability has been discovered in the IndyNews module available for
PHP-Nuke. The problem occurs in the manageMedia() function and may allow
an unauthorized attacker to delete or modify various files.

Exploitation of this issue may allow an attacker to influence the upload
location of remote PHP files, potentially making it possible to execute
arbitrary PHP commands.

The precise technical details regarding this vulnerability are currently
unknown. This BID will be updated accordingly as more information is made
available.

4. IndyNews HTML Injection Vulnerability
BugTraq ID: 6858
Remote: Yes
Date Published: Feb 14 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6858
Summary:

IndyNews is a module designed for integration with the PHP-Nuke web portal
software.

A vulnerability has been discovered in the IndyNews module available for
PHP-Nuke. Due to insufficient sanitization of HTML tags it is possible to
embed HTML code within the 'alt' tags of a news article. When the news
article is viewed by an unsuspecting user the embedded code will be
executed within the context of the site visited.

This issue could be exploited by taking advantage of a bug found in the
editMediaDescr() and editMediaTempDescr() functions. Through the malicious
use of these functions it is possible for an unauthorized user to modify
the 'alt' tags of a proposed or already displayed news article.

The precise technical details regarding this vulnerability are currently
unknown. This BID will be updated accordingly as more information is made
available.

7. PHP-Board User Password Disclosure Vulnerability
BugTraq ID: 6862
Remote: Yes
Date Published: Feb 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6862
Summary:

php-board is web forum software.

A vulnerability has been reported in php-board which may disclose
sensitive information to remote attackers. This flaw exists in the
'login.php' script.

php-board user information is stored in flat files on the system hosting
the software. Access to the files via the web is not sufficiently
restricted. Remote attackers may request user files and gain access to
php-board user and administrative passwords. The attacker must know the
name of the user whose file they are requesting.

The attacker may use the disclosed credentials to perform actions on the
php-board system as the user.

8. Kietu Hit.PHP Remote File Inclusion Vulnerability
BugTraq ID: 6863
Remote: Yes
Date Published: Feb 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6863
Summary:

Kietu is web-based software to tracking web site usage statistics. It is
implemented in PHP.

A flaw exists in the Kietu 'hit.php' script may permit remote attackers to
include malicious remote files. Remote users may influence the include
path for the 'config.php' configuration file. An attacker may exploit
this to include a malicious PHP script named 'config.php' from a remote
host, resulting in execution of arbitrary commands with the privileges of
the webserver process.

9. DotBr PHPInfo Environment Information Disclosure Vulnerability
BugTraq ID: 6864
Remote: Yes
Date Published: Feb 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6864
Summary:

DotBr is a web application implemented in PHP. It includes features to
allow websites to host a poll.

DotBr may disclose sensitive information to remote attackers about the
environment of the system hosting the software. This is due to the use of
the PHP phpinfo() function in the 'foo.php3' script. This may disclose
version information and path information to the attacker.

This information may be helpful in mounting further attacks against the
system.

10. DotBr Config.Inc Information Disclosure Vulnerability
BugTraq ID: 6865
Remote: Yes
Date Published: Feb 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6865
Summary:

DotBr is a web application implemented in PHP. It includes features to
allow websites to host polls. DotBr is backended by a MySQL database.

The DotBr configuration file (config.inc) may potentially disclose
sensitive information to remote attackers. This issue occurs because the
configuration file does not have the proper PHP file extension in the
default installation, and may be displayed by the webserver instead of
handled by the PHP interpreter. Database authentication credentials and
other information may be disclosed as a result.

The attacker may use this information in attempts to gain unauthorized
access to other resources.

11. DotBr Exec.PHP3 Remote Command Execution Vulnerability
BugTraq ID: 6867
Remote: Yes
Date Published: Feb 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6867
Summary:

DotBr is a web application implemented in PHP. It includes features to
allow websites to host polls.

The DotBr 'exec.php3' script is prone to a remote command execution
vulnerability. This is due to insufficient sanitization of user-supplied
data before it is passed through the PHP passthru() function. If
exploited, the function will invoke the underlying shell with
attacker-supplied parameters.

Exploitation may result in execution of arbitrary shell commands with the
privileges of the webserver process.

12. DotBr System.PHP3 Remote Command Execution Vulnerability
BugTraq ID: 6866
Remote: Yes
Date Published: Feb 15 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6866
Summary:

DotBr is a web application implemented in PHP. It includes features to
allow websites to host polls.

The DotBr 'system.php3' script is prone to a remote command execution
vulnerability. This is due to insufficient sanitization of user-supplied
data before it is passed through the PHP system() function. If exploited,
the function will invoke the underlying shell with attacker-supplied
parameters.

Exploitation may result in execution of arbitrary shell commands with the
privileges of the webserver process.

19. PHP CGI SAPI Code Execution Vulnerability
BugTraq ID: 6875
Remote: Yes
Date Published: Feb 17 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6875
Summary:

PHP is a freely available, open source web scripting language package. It
is available for Microsoft Windows, Linux, and Unix operating systems.

An unspecified vulnerability has been reported in the CGI SAPI of PHP
version 4.3.0.

Direct access to the CGI binary can be prevented by using the
configuration option '--enable-force-cgi-redirect' and the php.ini option
'cgi.force_redirect'.

The report states that an unspecified bug could render these options
useless, allowing a remote user to directly access the CGI binary. This
could allow an attacker to read any file that is readable by the web
server user, or to potentially execute arbitrary PHP code. The attacker
would have to be able to inject the PHP code into a file accessible by the
CGI binary, such as the web server access logs.

20. Netcharts Server Chunked Encoding Information Leakage Vulnerability
BugTraq ID: 6877
Remote: Yes
Date Published: Feb 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6877
Summary:

NetCharts Server provides multi-platform data connectivity. Combined
servlet engine, graphics engine and scheduling features.

It has been reported that Netcharts Server is unable to sufficiently
handle invalid chunked encoded HTTP requests.

Although Query-Response communication timing is reportedly difficult to
predict, One scenario may be; An attacker attempting to desynchronize the
Netcharts server in an attempt to lead valid Netcharts Server users to a
specified response. The attacker may achieve this condition by flooding
the Netcharts Server communication channels with an attacker-supplied
response.

This may lead to sensitive information leakage or network performance
degradation as a result of the attackers attempts to exploit this
condition.

21. D-Forum Remote File Include Vulnerability
BugTraq ID: 6879
Remote: Yes
Date Published: Feb 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6879
Summary:

D-Forum is a freely available discussion forum written in PHP.

D-Forum is prone to an issue which may allow remote attackers to include
files located on remote servers. This issue is present in the header.php3
and footer.php3 pages existing in the /includes folder.

Under some circumstances, it is possible for remote attackers to influence
the include path for these scripts to point to an external file on a
remote server by manipulating the '$my_header' and '$my_footer' URI
parameters.

If the remote file is a malicious file, this may be exploited to execute
arbitrary system commands in the context of the webserver.

22. BitchX Malformed RPL_NAMREPLY Denial Of Service Vulnerability
BugTraq ID: 6880
Remote: Yes
Date Published: Feb 18 2003 12:00AM
Relevant URL: http://www.securityfocus.com/bid/6880
Summary:

BitchX is a freely available, open source IRC client. It is available for
Unix, Linux, and Microsoft operating systems.

A problem with BitchX could make it possible for a malicious IRC server to
crash a vulnerable client.

It has been reported that BitchX does not properly handle some types of
replies contained in the RPL_NAMREPLY numeric. When a malformed reply is
received by the client, the client crashes, resulting in a denial of
service.

The problem occurs through the handling of the 353 IRC numeric. It is
suspected that this vulnerability may also make possible the execution of
arbitrary code. In the event that this is possible, code executed through
this vulnerability would be in the context of the BitchX user. This could
allow a remote attacker access to the system on which the affected client
is running with the privileges of the BitchX user.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ weekly security rep - Jun 24th 2003 unSpawn Linux - Security 4 06-24-2003 08:50 PM
LQ weekly security rep - Mon Mar 17th 2003 unSpawn Linux - Security 3 03-21-2003 02:14 PM
LQ weekly security rep - Mon Feb 17th 2003 unSpawn Linux - Security 3 02-19-2003 12:35 PM
LQ weekly security rep - Tue Feb 11th 2003 unSpawn Linux - Security 4 02-17-2003 06:16 AM
LQ weekly security rep - Tue Feb 04th 2003 unSpawn Linux - Security 2 02-04-2003 05:47 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:09 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration