Displaying 3 results from an estimated 3 matches for "digitaldefense".
2003 Apr 07
0
Fwd: [VulnWatch] [DDI-1013] Buffer Overflow in Samba allows remote root compromise
...atch-unsubscribe@vulnwatch.org>
>List-Subscribe: <mailto:vulnwatch-subscribe@vulnwatch.org>
>Delivered-To: mailing list vulnwatch@vulnwatch.org
>Delivered-To: moderator for vulnwatch@vulnwatch.org
>Date: Mon, 7 Apr 2003 07:44:58 +0000 (UTC)
>From: Erik Parker <erik.parker@digitaldefense.net>
>X-X-Sender: Erik Parker <erik.parker@digitaldefense.net>
>To: vulnwatch@vulnwatch.org
>Subject: [VulnWatch] [DDI-1013] Buffer Overflow in Samba allows remote
>root compromise
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>
>|----------------------...
2003 Apr 07
7
[SECURITY] Samba 2.2.8a security available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This release provides an important security fix outlined in the
release notes that follow. This is the latest stable release of
Samba and the version that all production Samba servers should be
running for all current bug-fixes.
The source code can be downloaded from :
http://download.samba.org/samba/ftp/
in the file samba-2.2.8a.tar.gz or
2003 Apr 07
7
[SECURITY] Samba 2.2.8a security available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This release provides an important security fix outlined in the
release notes that follow. This is the latest stable release of
Samba and the version that all production Samba servers should be
running for all current bug-fixes.
The source code can be downloaded from :
http://download.samba.org/samba/ftp/
in the file samba-2.2.8a.tar.gz or