Displaying 6 results from an estimated 6 matches for "dutecai".
Did you mean:
datecat
1996 Nov 14
1
Security hole in Debian 1.1 dosemu package
...he chattr call for ext2fs.
I agree with this -- securelevel should prevent changes
to the kernel memory space that would render the
system insecure.
> Only (4) is implemented right now.
Jim Dennis,
Starshine Technical Services
From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP)
Received: (qmail 32342 invoked from network); 27 Nov 1996 09:23:03 -0000
Received: from rosie.et.tudelft.nl (130.161.127.248)
by mail2.redhat.com with SMTP; 27 Nov 1996 09:22:59 -0000
Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by ros...
1997 Jan 16
0
/bin/login
...is my version)?
Could someone explain the problem, and how to fix it if so.
-jjr
[Mod: Please refere to message posted to linux-security on Mon, 23 Dec 1996
under subject ''Buffer overflow in Linux''s login program'' -- alex]
From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP)
Received: (qmail 3750 invoked from network); 17 Jan 1997 07:08:37 -0000
Received: from rosie.et.tudelft.nl (130.161.127.248)
by mail2.redhat.com with SMTP; 17 Jan 1997 07:08:36 -0000
Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by rosi...
1996 Nov 21
2
Re: BOUNCE: Re: Chattr +i and securelevel
...sion: 2.6.2
iQCVAwUBMpYbw4xFUz2t8+6VAQF9pgQAhwl4zNBrlfVxgv7+Ubm8uRkRRaZcjvxH
4F4FdFdtBjyqgkj4dMIKEEhy28TZbAqh0ks6eiviwFAYuMnu3G+MBeGLyHOpX4Mw
krb7At3wt41Yj5NXHpsz9GebYBVfM8sOl4CKX0UcdXdizxfNKxXd8SJLnYteye2b
8paVHnyyDyo=
=9xvg
-----END PGP SIGNATURE-----
From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP)
Received: (qmail 28417 invoked from network); 24 Nov 1996 14:32:27 -0000
Received: from rosie.et.tudelft.nl (130.161.127.248)
by mail2.redhat.com with SMTP; 24 Nov 1996 14:32:25 -0000
Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by ros...
1996 Nov 14
0
setgid binaries
...ir password away, and
for example the above trick can be used to give just their group access
away....]
Andrew
--
Linux-PAM: http://parc.power.net/morgan/Linux-PAM/index.html
libpwdb: http://parc.power.net/morgan/libpwdb/index.html
From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP)
Received: (qmail 11199 invoked from network); 29 Nov 1996 06:56:12 -0000
Received: from rosie.et.tudelft.nl (130.161.127.248)
by mail2.redhat.com with SMTP; 29 Nov 1996 06:56:11 -0000
Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by ros...
1996 Nov 20
2
About DNS again
...rom personal workstations to corporate
> firewalls. Discussing it, e-mailing about it, or any other type of
> communication in limited forums will end with the bug still being a
> problem. With this in mind, we released the advisory.
Alex
From mail@mail.redhat.com relay2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP)
1996 Nov 17
5
Sendmail 8.8.2 exploit.
Hm, look what I got hold of today.. Works if sendmail is mode 4111 or
similar:
#! /bin/sh
#
#
# Hi !
# This is exploit for sendmail smtpd bug
# (ver. 8.7-8.8.2 for FreeBSD, Linux and may be other platforms).
# This shell script does a root shell in /tmp directory.
# If you have any problems with it, drop me a letter.
#