search for: digitaldefense

Displaying 3 results from an estimated 3 matches for "digitaldefense".

2003 Apr 07
0
Fwd: [VulnWatch] [DDI-1013] Buffer Overflow in Samba allows remote root compromise
...atch-unsubscribe@vulnwatch.org> >List-Subscribe: <mailto:vulnwatch-subscribe@vulnwatch.org> >Delivered-To: mailing list vulnwatch@vulnwatch.org >Delivered-To: moderator for vulnwatch@vulnwatch.org >Date: Mon, 7 Apr 2003 07:44:58 +0000 (UTC) >From: Erik Parker <erik.parker@digitaldefense.net> >X-X-Sender: Erik Parker <erik.parker@digitaldefense.net> >To: vulnwatch@vulnwatch.org >Subject: [VulnWatch] [DDI-1013] Buffer Overflow in Samba allows remote >root compromise > >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > > >|----------------------...
2003 Apr 07
7
[SECURITY] Samba 2.2.8a security available for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This release provides an important security fix outlined in the release notes that follow. This is the latest stable release of Samba and the version that all production Samba servers should be running for all current bug-fixes. The source code can be downloaded from : http://download.samba.org/samba/ftp/ in the file samba-2.2.8a.tar.gz or
2003 Apr 07
7
[SECURITY] Samba 2.2.8a security available for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This release provides an important security fix outlined in the release notes that follow. This is the latest stable release of Samba and the version that all production Samba servers should be running for all current bug-fixes. The source code can be downloaded from : http://download.samba.org/samba/ftp/ in the file samba-2.2.8a.tar.gz or