LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-18-2002, 02:55 PM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LQ weekly security rep - Mon Nov 18th 2002


Nov 22nd 2002
20 issues handled (LAW)
squid
KDE
wwoffled
lynx
tcpdump
fetchmail
courier
nullmailer
mhonarc
smrsh
bind
ypserv
getbyname
ftpd
Red
samba
windowmaker
dhcp
php
gtetrinet

Nov 18th 2002
40 of 57 issues handled (ISS)
Cisco PIX Firewall TCP SYN packets denial of
Safe.pm could allow an attacker to bypass access
Apache mod_php module could allow an attacker to
Linux kernel TF flag denial of service
SquirrelMail strip_tags function PHP_SELF value
nss_ldap DNS query denial of service
Solaris network interface TCP denial of service
MailScanner overly long file name could allow an
CVSup cvsupd.out symlink attack
eZ httpbench could allow an attacker to view files
Hotfoon stores usernames and passwords in plain
Hotfoon "phone number to be dialed" text field
XOOPS quiz module cross-site scripting
KDE kdenetwork resLISa module LOGNAME buffer
Tiny HTTPd "dot dot" directory traversal
KDE kdenetwork LISa buffer overflow
KDE kdenetwork lan:// URL handler buffer overflow
KDE kdelib KIO rlogin:// URL handler remote shell
KDE kdelib KIO telnet:// URL handler remote shell
KGPG wizard creates keys with an empty password
ISC BIND SIG cached resource records (RR) heap
ISC BIND OPT resource record (RR) denial of service
ISC BIND SIG null pointer dereference denial of
Hyperion FTP Server "dot dot" directory traversal
INweb Mail Server HELO command buffer overflow
MasqMail multiple buffer overflows
XOOPS WebChat module SQL injection
Light HTTPd (LHTTPd) remote buffer overflow
Traceroute NANOG implementation buffer overflow
APBoard PHP forum could allow an attacker to post
W3Mail invalid file argument could allow an
ISC BIND DNS stub resolver library (libresolv.a)
LibHTTPD httpdProcessRequest() function buffer
phpBB quick_reply.php script could allow an
libpcap and tcpdump downloads could contain a
SURECOM Internet Mini Broadband Router EP-4501
AirStation WLA-L11G access point port scan denial
Zeroo HTTP Server buffer overflow
Courier mail transport agent (MTA) fails to
GNU Compiler Collection (GCC) memset() function

Nov 18th 2002
20 of 39 issues handled (SF)
1. PADL Software nss_ldap DNS Query Response Denial of Service Vulnerability
14. Zeus Web Server Admin Interface Cross Site Scripting Vulnerability
15. Simple Web Server File Disclosure Vulnerability
17. Sun Solaris Network Interface Denial Of Service Vulnerability
18. MailScanner Attachment Filename Validation Vulnerability
19. CVSup-Mirror Insecure Temporary Files Vulnerability
21. KGPG Key Generation Empty Passphrase Vulnerability
22. EZ Systems HTTPBench Information Disclosure Vulnerability
26. KDE Network RESLISA Buffer Overflow Vulnerability
27. ISC BIND 8 Invalid Expiry Time Denial Of Service Vulnerability
28. ISC BIND OPT Record Large UDP Denial of Service Vulnerability
29. ISC BIND SIG Cached Resource Record Buffer Overflow Vulnerability
32. TinyHTTPD Directory Traversal Vulnerability
33. MasqMail Buffer Overflow Vulnerability
34. Xoops WebChat Module Remote SQL Injection Vulnerability
35. Traceroute-nanog Local Buffer Overflow Vulnerability
36. APBoard Protected Forum Thread Posting Vulnerability
37. APBoard Protected Forum Plaintext Password Weakness
38. W3Mail File Disclosure Vulnerability
39. TCPDump / LIBPCap Trojan Horse Vulnerability

Last edited by unSpawn; 11-25-2002 at 05:02 AM.
 
Old 11-18-2002, 02:57 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Nov 18th 2002 (SF)

SecurityFocus

1. PADL Software nss_ldap DNS Query Response Denial of Service Vulnerability
BugTraq ID: 6130
Remote: Yes
Date Published: Nov 08 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6130
Summary:

nss_ldap is a module offered by Padl Software that allows a system to use
LDAP directories as the source of information for user attributes and
related data.

A vulnerability has been discovered in nss_ldap related to the handling of
DNS queries.

It has been reported that nss_ldap fails to verify whether data returned
in DNS query responses has been truncated by resolver libraries. When
processing a DNS query response containing truncated data, nss_ldap will
attempt to parse more data than is available. This could cause the
nss_ldap process to crash.

It is unlikely that this is exploitable to execute arbitrary code, however
this is not confirmed.

14. Zeus Web Server Admin Interface Cross Site Scripting Vulnerability
BugTraq ID: 6144
Remote: Yes
Date Published: Nov 08 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6144
Summary:

Zeus Web Server is a proprietary webserver for Unix, Linux, Sun, BSD,
HP-UX, and Apple OS X platforms.

The web based administration interface included in Zeus Web Server is
vulnerable to cross site scripting attacks. Due to insufficient
sanitization of user-supplied input it is possible for an attacker to
construct a malicious link which contains arbitrary HTML and script code.
Attacker-supplied HTML and script code may be executed on a web client
visiting the malicious link in the context of the vulnerable server.

Attacks of this nature may make it possible for attackers to steal
cookie-based authentication credentials.

It is important to note that the user must supply a username and password
for the administrative interface before the script will execute. This
also compounds the problem, since it is now likely that an attacker
exploiting this vulnerability may be able to steal the administrative
user's credentials.

15. Simple Web Server File Disclosure Vulnerability
BugTraq ID: 6145
Remote: Yes
Date Published: Nov 08 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6145
Summary:

Simple Web Server is a simple lightweight webserver available for the
Linux platform.

It has been reported that Simple Web Server does not properly sanitize web
requests. By sending a malicious web request to the vulnerable server,
containing a slash-slash sequence ('//'), it is possible for a remote
attacker to disclose files, effectively bypassing any access control
measures in place.

Disclosure of sensitive files may aid the attacker in launching further
attacks against the target system.

17. Sun Solaris Network Interface Denial Of Service Vulnerability
BugTraq ID: 6147
Remote: Yes
Date Published: Nov 08 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6147
Summary:

Sun has reported a denial of service vulnerability in Solaris 8/9.

It has been reported that it is possible for an unprivileged local or
remote attacker to cause some network interfaces to stop responding to TCP
traffic.

If this condition is exploited, then the affected network interfaces must
be manually brought back up for normal functionality to resume.

Further details about the nature of this vulnerability are not known at
this time. This record will be updated if further details become
available.

18. MailScanner Attachment Filename Validation Vulnerability
BugTraq ID: 6148
Remote: Yes
Date Published: Nov 09 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6148
Summary:

MailScanner is an e-mail security product. It is designed to be deployed
on gateway systems and provides the ability to detect e-mail based attacks
such as viruses. It will run on Unix and Linux variants and provides
support for a number of anti-virus products.

A vulnerability has been reported in how MailScanner handles filenames for
attachments. MailScanner does not sufficiently validate certain types of
malformed filenames.

It may be possible to bypass MailScanner security with attachment
filenames that contain excessive trailing/leading whitespace, are blank,
or use character encodings that are unknown to MailScanner.

The exact consequences of this vulnerability are not known, but it is
possible that some attachments with malicious filenames may slip through
MailScanner or that a malformed filename may cause other aspects of
MailScanner to fail.

19. CVSup-Mirror Insecure Temporary Files Vulnerability
BugTraq ID: 6150
Remote: No
Date Published: Nov 09 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6150
Summary:

cvsup-mirror is included in the FreeBSD ports collection and is intended
to be used in combination with cvsup to create easily maintainable FreeBSD
mirrors.

cvsup-mirror is prone to a vulnerability which may enable local attackers
to corrupt critical system files.

This issue is present in the 'cvsupd.sh' shell script. The source of this
issue is that 'cvsupd.sh' creates temporary files in a directory which
malicious local users may potentialy have access to.

The vulnerable shell script creates a file entitled 'cvsupd.out' in the
/var/tmp/ directory. A local attacker could create a symbolic link in
/var/tmp with the same name, pointing to critical system files. Any
actions performed by cvsup-mirror on 'cvsupd.out' will instead be
performed on files pointed to by the symbolic link. Files that are
writeable by the user running the vulnerable software may be overwritten
in this manner.

This may result in a denial of service if critical files are overwritten,
and may potentially allow for privilege escalation.

21. KGPG Key Generation Empty Passphrase Vulnerability
BugTraq ID: 6152
Remote: Yes
Date Published: Nov 11 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6152
Summary:

KGPG is a KDE graphical front-end for GPG (GNU Privacy Guard). It is
designed for use with the KDE Desktop Environment and GPG. It is available
for Unix and Linux variant operating systems.

A vulnerability has been reported for KGPG. Reportedly, KGPG generates
secret keys in an unsafe manner. The vulnerability is the result of how
KGPG sends command line arguments to GPG. The vulnerability occurs when
keys are generated using the key generation graphical wizard. All keys
generated using the wizard will have an empty passphrase.

An attacker can exploit this vulnerability to obtain access to some
potentially sensitive information.

This vulnerability was reported for KGPG versions 0.6 to 0.8.2.

22. EZ Systems HTTPBench Information Disclosure Vulnerability
BugTraq ID: 6153
Remote: Yes
Date Published: Nov 11 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6153
Summary:

eZ Systems httpbench is a benchmarking utility implemented in PHP. It is
available for Unix and Linux variant as well as Microsoft Windows
operating environments.

An information disclosure vulnerability has been reported for httpbench.
Reportedly, httpbench may disclose the contents of web server readable
files to remote attackers.

This vulnerability can be exploited by a remote attacker to obtain
potentially sensitive information on a vulnerable system. Information
obtained in this manner may be used to launch further, destructive attacks
against a vulnerable system.

This vulnerability was reported for httpbench 1.1. It is not known whether
other versions are affected.

26. KDE Network RESLISA Buffer Overflow Vulnerability
BugTraq ID: 6157
Remote: Yes
Date Published: Nov 11 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6157
Summary:

LISa (LAN Information Server) is a service designed for Linux variant
operating systems. It provides LAN browsing capabilities on Linux systems.
resLISa is a restricted version of LISa and is distributed with LISa.

A buffer overflow vulnerability has been reported for resLISa. The
vulnerability results due to inadequate checks on the LOGNAME environment
variable.

An attacker can exploit this vulnerability by setting a LOGNAME
environment variable with an overly long value. When the attacker invokes
resLISa, it will result in the service crashing and will result in the
attacker obtaining control over the execution of the vulnerable service.

resLISa is typically installed as a setUID root binary.

27. ISC BIND 8 Invalid Expiry Time Denial Of Service Vulnerability
BugTraq ID: 6159
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6159
Summary:

BIND is a server program that implements the domain name service protocol.
It is used widely on the Internet.

A denial of service vulnerability has been reported for ISC BIND 8. The
vulnerability is due to caching of SIG RR (resource records) with invalid
expiry times.

An attacker who controls an authoritative name server may be able to cause
vulnerable BIND 8 servers to cache invalid SIG RR elements. When the
vulnerable DNS server attempts to reference the SIG RR elements it will
result in the denial of service condition.

It has been reported that ISC BIND 8 versions up to 8.3.3 are vulnerable
to this issue.

28. ISC BIND OPT Record Large UDP Denial of Service Vulnerability
BugTraq ID: 6161
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6161
Summary:

BIND is a server program that implements the domain name service protocol.
It is in extremely wide use on the Internet, in use by most of the DNS
servers.

Recursive BIND 8 servers are vulnerable to a denial of service condition.
Requesting a DNS lookup on a non-existant sub-domain of a valid domain may
cause BIND to fail.

The attacker would have to attach an OPT resource record with a large UDP
payload size in order to exploit this vulnerability.

The denial of service may also occur when a domain is queried and the
authoritative DNS servers are unreachable.

29. ISC BIND SIG Cached Resource Record Buffer Overflow Vulnerability
BugTraq ID: 6160
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6160
Summary:

BIND is a server program that implements the domain name service protocol.
It is widely used on the Internet.

It has been reported that DNS servers, running BIND with recursive DNS
functionality enabled, are prone to a buffer overflow condition. This
issue is triggered when the vulnerable DNS server is constructing DNS
responses for cached information.

An attacker-controlled authoritative DNS server may cause BIND to cache
information into an internal database, when recursion is enabled. Cached
information is accessed when a DNS client request is received. A
vulnerability exists when creating a DNS response containing, SIG resource
records (RR), which may lead to the buffer overflow condition.

By causing the vulnerable DNS server to cache information, and sending a
malicious client request, it may be possible for a remote attacker to
cause a buffer to be overrun. Exploitation of this issue could result in
the execution of arbitrary attacker-supplied code with the privileges of
the vulnerable BIND daemon.

32. TinyHTTPD Directory Traversal Vulnerability
BugTraq ID: 6158
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6158
Summary:

It has been reported that TinyHTTPD fails to properly sanitize web
requests. By sending a malicious web request to the vulnerable server,
using directory traversal sequences, it is possible for a remote attacker
to access sensitive resources located outside of the web root.

An attacker is able to traverse outside of the established web root by
using dot-dot-slash (../) directory traversal sequences. An attacker may
be able to obtain any web server readable files from outside of the web
root directory.

Disclosure of sensitive system files may aid the attacker in launching
further attacks against the target system.

33. MasqMail Buffer Overflow Vulnerability
BugTraq ID: 6164
Remote: No
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6164
Summary:

MasqMail is a MTA (mail transport agent) designed for systems without a
permanent Internet connection.

A buffer overflow vulnerability has been reported for MasqMail. The
vulnerability may be exploited by an attacker to execute arbitrary
commands with root privileges.

Although not yet confirmed, it is speculated that the vulnerability may be
triggered through malicious entries in a user-supplied configuration file.

Precise technical details regarding the cause of this issue are not yet
known. This BID will be updated as further information becomes available.

34. Xoops WebChat Module Remote SQL Injection Vulnerability
BugTraq ID: 6165
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6165
Summary:

Xoops is open-source, freely available web portal software written in
object-oriented PHP. It is back-ended by a MySQL database and will run on
most Unix and Linux distributions.

A vulnerability exists in the WebChat module included with Xoops. The
vulnerability is due to insufficient sanitization of variables used to
construct SQL queries in the 'index.php' script. Specifically, the
'roomid' variable is not sanitized of malicious SQL input. It is possible
to modify the logic of SQL queries through malformed query strings in
requests for the vulnerable script.

By injecting SQL code into the 'roomid' variable, it may be possible for
an attacker to corrupt database information.

35. Traceroute-nanog Local Buffer Overflow Vulnerability
BugTraq ID: 6166
Remote: No
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6166
Summary:

Traceroute is a tool that is used to track packets in a TCP/IP network to
determine the path of network connections.

Traceroute-nanog fails to drop root privileges after obtaining a RAW
socket. Because of this, it is possible for a local attacker to gain root
privileges by triggering a buffer overflow. Exploiting this issue may
allow a local attacker to overwrite sensitive memory with malicious
values, thereby redirecting typical program flow to execute
attacker-supplied commands with elevated privileges.

Precise technical details regarding the cause of this issue are not yet
known. This BID will be updated as more information becomes available.

36. APBoard Protected Forum Thread Posting Vulnerability
BugTraq ID: 6167
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6167
Summary:

APBoard is a web-based bulletin board package based on PHP and MySQL from
Another PHP Product.

It is possible for any registered APBoard user to create a new thread in a
password protected forum.

The source code of the 'Neues Thema' page contains the following line:
<INPUT TYPE="hidden" NAME="insertinto" VALUE="1">

By changing VALUE= to the value of a password protected forum, then
submitting the page, the thread will be posted to that forum, bypassing
authentication.

Note that it may be possible to modify other variable values to cause
unpredictable results. This has not yet been tested.

37. APBoard Protected Forum Plaintext Password Weakness
BugTraq ID: 6169
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6169
Summary:

APBoard is a web-based bulletin board package based on PHP and MySQL from
Another PHP Product.

When a user is logged into an APboard password protected forum, their
plaintext password is included in the URL:
http://www.your-domain.com/apboard/t...hepasswordhere

By creating a script that logs refering URLs, an attacker could post a
link to the script within the password protected forum. This would allow
the attacker to steal the user's forum password.

38. W3Mail File Disclosure Vulnerability
BugTraq ID: 6170
Remote: Yes
Date Published: Nov 12 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6170
Summary:

W3Mail is a full featured open source web mail application implemented as
a collection of Perl scripts that runs on Linux and Unix systems. It
includes support for fetching mail from POP3 servers, MIME attachments,
and for sending outgoing mail.

To fix the vulnerability described as BID 5314, the email attachments
directory was moved out of the webroot tree. To view attachments, the
script "viewAttachment.cgi" accepts the parameter "file". The value of
this parameter is passed to the open() function as the filename argument
without being sanitized. Attackers may cause any file on the filesystem
to open by specifying its relative path using directory traversal
characters.

As a result, attackers may retrieve any file and download its contents if
it is readable by the webserver process.

It should be noted that a valid session ID is required to exploit this
vulnerability.

39. TCPDump / LIBPCap Trojan Horse Vulnerability
BugTraq ID: 6171
Remote: Yes
Date Published: Nov 13 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6171
Summary:

tcpdump is a freely available , open source tool for analyzing network
traffic. libpcap provides network packet sniffing libraries used by many
popular network intrusion detection systems. Both tools are available for
the Unix and Linux operating systems.

It has been announced that the server hosting tcpdump and libpcap,
www.tcpdump.org, was compromised recently. It has been reported that the
intruder made modifications to the source code of tcpdump and libpcap to
include trojan horse code. Downloads of the source code of tcpdump and
libpcap from www.tcpdump.org, and numerous mirrors, likely contain the
trojan code.

Reports say that the trojan will run once upon compilation of tcpdump or
libpcap. Once the trojan is executed, it attempts to connect to host
212.146.0.34 on port 1963.

The trojan horse modifications can be found in the configure script and
the 'gencode.c' source file. The 'gencode.c' modification affects only
libpcap. Reportedly, 'gencode.c' is modified to force libpcap to ignore
packets to and from the backdoor program. This is an attempt to hide the
back door program's traffic.

The MD5 sums of the trojaned versions are reported to be:
MD5 Sum 73ba7af963aff7c9e23fa1308a793dca libpcap-0.7.1.tar.gz
MD5 Sum 3a1c2dd3471486f9c7df87029bf2f1e9 tcpdump-3.6.2.tar.gz
MD5 Sum 3c410d8434e63fb3931fe77328e4dd88 tcpdump-3.7.1.tar.gz

The MD5 sums of the non-trojaned versions are:
MD5 Sum 0597c23e3496a5c108097b2a0f1bd0c7 libpcap-0.7.1.tar.gz
MD5 Sum 6bc8da35f9eed4e675bfdf04ce312248 tcpdump-3.6.2.tar.gz
MD5 Sum 03e5eac68c65b7e6ce8da03b0b0b225e tcpdump-3.7.1.tar.gz

The non-trojaned versions of these tools are available at the following locations:
http://www.ibiblio.org/pub/Linux/dis...p-0.7.1.tar.gz
http://www.ibiblio.org/pub/Linux/dis...p-3.6.2.tar.gz
http://www.ibiblio.org/pub/Linux/dis...p-3.7.1.tar.gz

Additionally, the trojan displays similarity to those found in irssi,
fragroute, fragrouter, BitchX, OpenSSH, and Sendmail.
 
Old 11-20-2002, 06:29 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Nov 18th 2002 (ISS)

Internet Security Systems

Date Reported: 11/05/2002
Brief Description: Cisco PIX Firewall TCP SYN packets denial of
service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Cisco PIX Firewall 6.2.2
Vulnerability: cisco-pix-packet-dos
X-Force URL: http://www.iss.net/security_center/static/10566.php

Date Reported: 11/05/2002
Brief Description: Safe.pm could allow an attacker to bypass access
restrictions
Risk Factor: Medium
Attack Type: Host Based / Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Safe.pm prior to 2.08
Vulnerability: safe-pm-bypass-restrictions
X-Force URL: http://www.iss.net/security_center/static/10574.php

Date Reported: 11/06/2002
Brief Description: Apache mod_php module could allow an attacker to
take over the httpd process
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Apache HTTP Server 1.3.26
Vulnerability: apache-modphp-process-hijack
X-Force URL: http://www.iss.net/security_center/static/10575.php

Date Reported: 11/06/2002
Brief Description: Linux kernel TF flag denial of service
Risk Factor: Low
Attack Type: Host Based
Platforms: Linux kernel 2.4.18 and earlier
Vulnerability: linux-kernel-tf-dos
X-Force URL: http://www.iss.net/security_center/static/10576.php

Date Reported: 11/07/2002
Brief Description: SquirrelMail strip_tags function PHP_SELF value
cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Debian Linux 3.0, SquirrelMail 1.2.8
Vulnerability: squirrelmail-striptags-phpself-xss
X-Force URL: http://www.iss.net/security_center/static/10634.php

Date Reported: 11/08/2002
Brief Description: nss_ldap DNS query denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Solaris Any version, Mandrake
Linux 7.2, Mandrake Linux 8.0, Mandrake Single
Network Firewall 7.2, Mandrake Linux 8.1, Mandrake
Linux 8.2, Mandrake Linux 9.0
Vulnerability: nssldap-dns-query-dos
X-Force URL: http://www.iss.net/security_center/static/10578.php

Date Reported: 11/08/2002
Brief Description: Solaris network interface TCP denial of service
Risk Factor: Low
Attack Type: Host Based / Network Based
Platforms: Solaris 8, Solaris 9
Vulnerability: solaris-tcp-interface-dos
X-Force URL: http://www.iss.net/security_center/static/10600.php

Date Reported: 11/09/2002
Brief Description: MailScanner overly long file name could allow an
attacker to bypass virus protection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, MailScanner prior to 3.2 6-1, MailScanner
prior 4.0 5-1
Vulnerability: mailscanner-filename-protection-bypass
X-Force URL: http://www.iss.net/security_center/static/10609.php

Date Reported: 11/09/2002
Brief Description: CVSup cvsupd.out symlink attack
Risk Factor: Medium
Attack Type: Host Based
Platforms: BSD Any version, Linux Any version, Unix Any
version, CVSup 1.2
Vulnerability: cvsup-cvsupd-out-symlink
X-Force URL: http://www.iss.net/security_center/static/10610.php

Date Reported: 11/10/2002
Brief Description: eZ httpbench could allow an attacker to view files
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, eZ httpbench 1.1
Vulnerability: ez-httpbench-view-files
X-Force URL: http://www.iss.net/security_center/static/10589.php

Date Reported: 11/10/2002
Brief Description: Hotfoon stores usernames and passwords in plain
text
Risk Factor: Medium
Attack Type: Host Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Hotfoon 4.00
Vulnerability: hotfoon-plaintext-passwords
X-Force URL: http://www.iss.net/security_center/static/10591.php

Date Reported: 11/10/2002
Brief Description: Hotfoon "phone number to be dialed" text field
buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Hotfoon 4.00
Vulnerability: hotfoon-phone-number-bo
X-Force URL: http://www.iss.net/security_center/static/10593.php

Date Reported: 11/10/2002
Brief Description: XOOPS quiz module cross-site scripting
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, XOOPS 1.0 RC3
Vulnerability: xoops-quiz-module-xss
X-Force URL: http://www.iss.net/security_center/static/10594.php

Date Reported: 11/11/2002
Brief Description: KDE kdenetwork resLISa module LOGNAME buffer
overflow
Risk Factor: High
Attack Type: Host Based
Platforms: Gentoo Linux Any version, KDE prior to 3.0.5, LISa
prior to 0.2.2, Debian Linux 3.0
Vulnerability: kde-kdenetwork-reslisa-bo
X-Force URL: http://www.iss.net/security_center/static/10592.php

Date Reported: 11/11/2002
Brief Description: Tiny HTTPd "dot dot" directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, Tiny HTTPd 0.1.0
Vulnerability: tinyhttpd-dotdot-directory-traversal
X-Force URL: http://www.iss.net/security_center/static/10596.php

Date Reported: 11/11/2002
Brief Description: KDE kdenetwork LISa buffer overflow
Risk Factor: High
Attack Type: Host Based / Network Based
Platforms: Linux Any version, SuSE Linux 7.2, SuSE Linux 7.3,
SuSE eMail Server III Any version, SuSE Linux
Connectivity Server Any version, SuSE Linux
Enterprise Server 7, SuSE Linux Office Server Any
Version, SuSE eMail Server 3.1, KDE prior to 3.0.5,
LISa prior to 0.2.2
Vulnerability: kde-kdenetwork-lisa-bo
X-Force URL: http://www.iss.net/security_center/static/10597.php

Date Reported: 11/11/2002
Brief Description: KDE kdenetwork lan:// URL handler buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: SuSE Linux 7.2, SuSE Linux 7.3, SuSE eMail Server
III Any version, SuSE Linux Connectivity Server Any
version, SuSE Linux Enterprise Server 7, SuSE Linux
Office Server Any Version, SuSE eMail Server 3.1,
KDE prior to 3.0.5, LISa prior to 0.2.2
Vulnerability: kde-kdenetwork-lan-bo
X-Force URL: http://www.iss.net/security_center/static/10598.php

Date Reported: 11/11/2002
Brief Description: KDE kdelib KIO rlogin:// URL handler remote shell
command execution
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Gentoo Linux Any version, KDE
prior to 3.0.5
Vulnerability: kde-rlogin-command-execution
X-Force URL: http://www.iss.net/security_center/static/10602.php

Date Reported: 11/11/2002
Brief Description: KDE kdelib KIO telnet:// URL handler remote shell
command execution
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, KDE 2.1 to 2.2.2
Vulnerability: kde-telnet-command-execution
X-Force URL: http://www.iss.net/security_center/static/10603.php

Date Reported: 11/11/2002
Brief Description: KGPG wizard creates keys with an empty password
Risk Factor: Medium
Attack Type: Host Based
Platforms: Gentoo Linux Any version, Kpng 0.6 to 0.8.2, KPNG
0.6 to 0.8.2
Vulnerability: kgpg-wizard-empty-password
X-Force URL: http://www.iss.net/security_center/static/10629.php

Date Reported: 11/12/2002
Brief Description: ISC BIND SIG cached resource records (RR) heap
buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Solaris 2.6,
HP-UX 10.20, Solaris 7, BIND 8.2, BIND 8.2.1, BIND
8.1, BIND 8.1.1, BIND 8.1.2, BIND 8.2.2, Solaris 8,
AIX 4.0, HP-UX 11, SuSE Linux 7.0, BIND 4.x, SuSE
Linux 7.1, Compaq Tru64 UNIX, SuSE Linux 7.2, SuSE
Linux 7.3, SuSE Linux 8.0, Red Hat Linux 7.x, BIND
8.3.3, BIND 8.3.2, BIND 8.3.1, BIND 8.3.0, BIND
8.2.6, BIND 8.2.5, BIND 8.2.4, BIND 8.2.3, BIND
8.2.2-P7, BIND 8.2.2-P5, BIND 8.2.2-P3, FreeBSD <
4.7-RELEASE, SuSE Linux 8.1
Vulnerability: bind-sig-rr-bo
X-Force URL: http://www.iss.net/security_center/static/10304.php

Date Reported: 11/12/2002
Brief Description: ISC BIND OPT resource record (RR) denial of service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, Solaris 2.6,
HP-UX 10.20, Solaris 7, BIND 8.2, BIND 8.2.1, BIND
8.1, BIND 8.1.1, BIND 8.1.2, BIND 8.2.2, Solaris 8,
AIX 4.0, HP-UX 11, SuSE Linux 7.0, SuSE Linux 7.1,
Compaq Tru64 UNIX, SuSE Linux 7.3, SuSE Linux 8.0,
Red Hat Linux 7.x, BIND 8.3.3, BIND 8.3.2, BIND
8.3.1, BIND 8.3.0, BIND 8.2.6, BIND 8.2.5, BIND
8.2.4, BIND 8.2.3, BIND 8.2.2-P7, BIND 8.2.2-P5,
BIND 8.2.2-P3, FreeBSD < 4.7-RELEASE, SuSE Linux
8.1
Vulnerability: bind-opt-rr-dos
X-Force URL: http://www.iss.net/security_center/static/10332.php

Date Reported: 11/12/2002
Brief Description: ISC BIND SIG null pointer dereference denial of
service
Risk Factor: Low
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, BIND 8.2, BIND
8.2.1, BIND 8.1, BIND 8.1.1, BIND 8.1.2, BIND
8.2.2, SuSE Linux 7.0, SuSE Linux 7.1, SuSE Linux
7.2, SuSE Linux 7.3, SuSE Linux 8.0, BIND 8.3.3,
BIND 8.3.2, BIND 8.3.1, BIND 8.3.0, BIND 8.2.6,
BIND 8.2.5, BIND 8.2.4, BIND 8.2.3, BIND 8.2.2-P7,
BIND 8.2.2-P5, BIND 8.2.2-P3, FreeBSD < 4.7-
RELEASE, SuSE Linux 8.1
Vulnerability: bind-null-dereference-dos
X-Force URL: http://www.iss.net/security_center/static/10333.php

Date Reported: 11/12/2002
Brief Description: Hyperion FTP Server "dot dot" directory traversal
Risk Factor: Medium
Attack Type: Network Based
Platforms: Windows Any version, Hyperion FTP Server 2.8.1
Vulnerability: hyperion-dotdot-directory-traversal
X-Force URL: http://www.iss.net/security_center/static/10599.php

Date Reported: 11/12/2002
Brief Description: INweb Mail Server HELO command buffer overflow
Risk Factor: Low
Attack Type: Network Based
Platforms: Windows Any version, INweb Mail Server 2.01
Vulnerability: inweb-helo-command-bo
X-Force URL: http://www.iss.net/security_center/static/10601.php

Date Reported: 11/12/2002
Brief Description: MasqMail multiple buffer overflows
Risk Factor: High
Attack Type: Host Based
Platforms: Debian Linux 3.0, MasqMail Any version
Vulnerability: masqmail-bo
X-Force URL: http://www.iss.net/security_center/static/10605.php

Date Reported: 11/12/2002
Brief Description: XOOPS WebChat module SQL injection
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, XOOPS 1.0 RC3
Vulnerability: xoops-webchat-sql-injection
X-Force URL: http://www.iss.net/security_center/static/10606.php

Date Reported: 11/12/2002
Brief Description: Light HTTPd (LHTTPd) remote buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, LHTTPd 0.1
Vulnerability: light-httpd-bo
X-Force URL: http://www.iss.net/security_center/static/10607.php

Date Reported: 11/12/2002
Brief Description: Traceroute NANOG implementation buffer overflow
Risk Factor: High
Attack Type: Host Based
Platforms: SuSE Linux 7.0, SuSE Linux 7.1, SuSE Linux 7.2,
SuSE Linux 7.3, SuSE Linux Firewall Any version,
SuSE eMail Server III Any version, SuSE Linux
Connectivity Server Any version, SuSE Linux
Enterprise Server 7, SuSE Linux 8.0, SuSE Linux
Office Server Any Version, SuSE eMail Server 3.1
Vulnerability: traceroute-nanog-bo
X-Force URL: http://www.iss.net/security_center/static/10608.php

Date Reported: 11/12/2002
Brief Description: APBoard PHP forum could allow an attacker to post
to protected forums
Risk Factor: Low
Attack Type: Network Based
Platforms: BSD Any version, Linux Any version, Unix Any
version, APBoard 2.02, APBoard 2.03
Vulnerability: apboard-protected-forum-bypass
X-Force URL: http://www.iss.net/security_center/static/10611.php

Date Reported: 11/12/2002
Brief Description: W3Mail invalid file argument could allow an
attacker to read files
Risk Factor: Medium
Attack Type: Network Based
Platforms: Unix Any version, W3Mail Any version
Vulnerability: w3mail-argument-read-files
X-Force URL: http://www.iss.net/security_center/static/10612.php

Date Reported: 11/12/2002
Brief Description: ISC BIND DNS stub resolver library (libresolv.a)
stack buffer overflows
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, BIND 4.9.2 to
4.9.10
Vulnerability: bind-dns-libresolv-bo
X-Force URL: http://www.iss.net/security_center/static/10624.php

Date Reported: 11/13/2002
Brief Description: LibHTTPD httpdProcessRequest() function buffer
overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, LibHTTPD 1.2
Vulnerability: libhttpd-httpdprocessrequest-bo
X-Force URL: http://www.iss.net/security_center/static/10615.php

Date Reported: 11/13/2002
Brief Description: phpBB quick_reply.php script could allow an
attacker to include PHP files
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Unix Any
version, phpBB Any version
Vulnerability: phpbb-quickreply-file-include
X-Force URL: http://www.iss.net/security_center/static/10617.php

Date Reported: 11/13/2002
Brief Description: libpcap and tcpdump downloads could contain a
backdoor
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, tcpdump 3.6.2, tcpdump 3.7.1,
libcap 0.7.1
Vulnerability: libpcap-tcpdump-backdoor
X-Force URL: http://www.iss.net/security_center/static/10620.php

Date Reported: 11/13/2002
Brief Description: SURECOM Internet Mini Broadband Router EP-4501
default SNMP
Risk Factor: High
Attack Type: Network Based
Platforms: SURECOM Internet Mini Broadband Router EP-4501
Vulnerability: surecom-default-snmp-string
X-Force URL: http://www.iss.net/security_center/static/10621.php

Date Reported: 11/13/2002
Brief Description: AirStation WLA-L11G access point port scan denial
of service
Risk Factor: Low
Attack Type: Network Based
Platforms: AirStation WLA-L11G 2.31
Vulnerability: airstation-wla-l11g-ap-dos
X-Force URL: http://www.iss.net/security_center/static/10623.php

Date Reported: 11/15/2002
Brief Description: Zeroo HTTP Server buffer overflow
Risk Factor: High
Attack Type: Network Based
Platforms: Linux Any version, Windows Any version, Zeroo HTTP
Server 1.5
Vulnerability: zeroo-http-server-bo
X-Force URL: http://www.iss.net/security_center/static/10642.php

Date Reported: 11/15/2002
Brief Description: Courier mail transport agent (MTA) fails to
properly enforce permissions
Risk Factor: Medium
Attack Type: Host Based
Platforms: Debian Linux 3.0, Courier Any version
Vulnerability: courier-mta-insecure-permissions
X-Force URL: http://www.iss.net/security_center/static/10643.php

Date Reported: 11/16/2002
Brief Description: GNU Compiler Collection (GCC) memset() function
results in weaker security
Risk Factor: Medium
Attack Type: Network Based
Platforms: Linux Any version, Unix Any version, GNU Compiler
Collection (GCC) 3.2
Vulnerability: gcc-memset-weak-security
X-Force URL: http://www.iss.net/security_center/static/10641.php
 
Old 11-25-2002, 05:03 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
November 22nd 2002 (LAW)

Package: squid
Date: 11-14-2002
Description:
Several bugfixes and cleanup of the Gopher client, both to correct some
security issues and to make Squid properly render certain Gopher menus.
Security fixes in how Squid parses FTP directory listings into HTML. FTP
data channels are now sanity checked to match the address of the requested
FTP server. This to prevent theft or injection of data.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2574.html

Package: KDE SSL
Date: 11-15-2002
Description:
Konqueror's cross site scripting (XSS) protection fails to initialize the
domains on sub-(i)frames correctly. As a result, Javascript can access any
foreign subframe which is defined in the HTML source. KDE's SSL
implementation fails to check the basic constraints on certificates and as
a result may accept certificates as valid that were signed by an issuer
who was not authorized to do so.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2579.html

Package: wwoffled
Date: 11-18-2002
Description:
wwwoffled allows remote attackers to cause a denial of service and
possibly execute arbitrary code via a negative Content-Length value.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2586.html

Package: lynx
Date: 11-18-2002
Description:
If lynx is given a url with some special characters on the command line,
it will include faked headers in the HTTP query. This feature can be used
to force scripts (that use Lynx for downloading files) to access the wrong
site on a web server with multiple virtual hosts.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2587.html

Package: tcpdump
Date: 11-19-2002
Description:
There is a miscalculation in the use of the sizeof operator in
tcpdump, allowing, at the least, a denial-of-service attack.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2594.html

Package: fetchmail
Date: 11-15-2002
Description:
Several buffer overflows have been found in fetchmail. These bugs may be
remotely exploited if fetchmail is running in multidrop mode.
Caldera Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2599.html

Package: courier
Date: 11-15-2002
Description:
A problem in the Courier sqwebmail package, a CGI program to grant
authenticated access to local mailboxes, has been discovered. The program
did not drop permissions fast enough upon startup under certain
circumstances so a local shell user can execute the sqwebmail binary and
manage to read an arbitrary file on the local filesystem.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2577.html
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2588.html

Package: nullmailer
Date: 11-15-2002
Description:
A problem has been discovered in nullmailer, a simple relay-only mail
transport agent for hosts that relay mail to a fixed set of smart relays.
When a mail is to be delivered locally to a user that doesn't exist,
nullmailer tries to deliver it, discovers a user unknown error and stops
delivering. Unfortunately, it stops delivering entirely, not only this
mail. Hence, it's very easy to craft a denial of service.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2584.html

Package: mhonarc
Date: 11-19-2002
Description:
Steven Christey discovered a cross site scripting vulnerability in
mhonarc, a mail to HTML converter. Carefully crafted message headers can
introduce cross site scripting when mhonarc is configured to display all
headers lines on the web. However, it is often useful to restrict the
displayed header lines to To, From and Subject, in which case the
vulnerability cannot be exploited.
Debian Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2589.html

Package: smrsh
Date: 11-15-2002
Description:
Users with a local account and the ability to create or modify their
`.forward' files can circumvent the smrsh restrictions. This is mostly of
consequence to systems which have local users that are not normally
allowed access to a login shell, as such users may abuse this bug in order
to execute arbitrary commands with normal privileges.
FreeBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2575.html

Package: bind
Date: 11-15-2002
Description:
BIND SIG Cached RR Overflow Vulnerability: A remote attacker may be able
to cause a name server with recursion enabled to execute arbitrary code
with the privileges of the name server process. BIND OPT DoS and BIND SIG
Expiry Time DoS: A remote attacker may be able to cause the name server
process to crash.
FreeBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2576.html
NetBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2591.html
OpenPKG Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2580.html
Trustix Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2581.html

Package: ypserv
Date: 11-18-2002
Description:
A memory leak that could be triggered remotely was discovered in ypserv
2.5 and earlier. This could lead to a Denial of Service as repeated
requests for a non-existant map will result in ypserv consuming more and
more memory, and also running more slowly. If the system runs out of
available memory, ypserv would also be killed.
Mandrake Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2590.html

Package: getbyname
Date: 11-15-2002
Description:
getnetbyname(3) and getnetbyaddr(3) lacked important boundary checks, and
are vulnerable to malicious DNS responses, which could cause a buffer
overrun on the stack. The vulnerability could cause a remote root
compromise, if a privileged process uses these library functions.
NetBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2592.html

Package: ftpd
Date: 11-15-2002
Description:
NetBSD's ftpd responds to the STAT command in a way that is not standards
conformant, when a filename that contains "\n[0-9]" is specified. This
could be used by a malicious party to corrupt state tables in firewall
devices between an FTP client and a NetBSD FTP server.
NetBSD Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2593.html

Package: Red Hat kernel
Date: 11-15-2002
Description:
The kernel in Red Hat Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 are vulnerable to
a local denial of service attack. Updated packages are available which
address this vulnerability, as well as bugs in several drivers.
Red Hat:
http:http://www.linuxsecurity.com/advisor...sory-2578.html
Trustix Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2582.html

Package: samba
Date: 11-18-2002
Description:
The error consists of a buffer overflow in a commonly used routine that
accepts user input and may write up to 127 bytes past the end of the
buffer allocated with static length, leaving enough room for an exploit.
The resulting vulnerability can be exploited locally in applications using
the sm_smbpass Pluggable Authentication Module (PAM). It may be possible
to exploit this vulnerability remotely, causing the running smbd to crash
or even to execute arbitrary code.
SuSE Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2598.html
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2597.html

Package: windowmaker
Date: 11-18-2002
Description:
A possible scenario for this vulnerability could be that of an attacker
making a specially crafted image available and convincing an unsuspecting
user to set it as a background image.
Conectiva Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2583.html

Package: dhcp
Date: 11-18-2002
Description:
Simon Kelley pointed out a vulnerability in the way quotes inside these
assignments are treated. By exploiting this, a malicious DHCP server (or
attackers able to spoof DHCP responses) can execute arbitrary shell
commands on the DHCP client (which is run by root).
Conectiva Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2585.html

Package: php
Date: 11-20-2002
Description:
Two vulnerabilities exists in mail() PHP function. The first one allows to
execute any program/script bypassing safe_mode restriction, the second one
may give an open-relay script if mail() function is not carefully used in
PHP scripts.
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2595.html

Package: gtetrinet
Date: 11-20-2002
Description:
Several buffer overflows was found in gtetrinet versions below 0.4.3.
According to the authors these could be remotley explotied.
Gentoo Vendor Advisory:
http:http://www.linuxsecurity.com/advisor...sory-2595.html
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LQ weekly security rep - Mon Dec 02nd 2002 unSpawn Linux - Security 3 12-06-2002 06:52 PM
LQ weekly security rep - Mon Nov 25th 2002 unSpawn Linux - Security 3 11-29-2002 07:16 PM
LQ weekly security rep - Tue Nov 12th 2002 unSpawn Linux - Security 5 11-17-2002 06:55 AM
LQ weekly security rep - Mon Nov 04th 2002 unSpawn Linux - Security 3 11-11-2002 07:56 AM
LQ weekly security rep - Thu Jul 18th 2002 unSpawn Linux - Security 4 07-19-2002 09:32 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:13 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration