search for: dutecai

Displaying 6 results from an estimated 6 matches for "dutecai".

Did you mean: datecat
1996 Nov 14
1
Security hole in Debian 1.1 dosemu package
...he chattr call for ext2fs. I agree with this -- securelevel should prevent changes to the kernel memory space that would render the system insecure. > Only (4) is implemented right now. Jim Dennis, Starshine Technical Services From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP) Received: (qmail 32342 invoked from network); 27 Nov 1996 09:23:03 -0000 Received: from rosie.et.tudelft.nl (130.161.127.248) by mail2.redhat.com with SMTP; 27 Nov 1996 09:22:59 -0000 Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by ros...
1997 Jan 16
0
/bin/login
...is my version)? Could someone explain the problem, and how to fix it if so. -jjr [Mod: Please refere to message posted to linux-security on Mon, 23 Dec 1996 under subject ''Buffer overflow in Linux''s login program'' -- alex] From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP) Received: (qmail 3750 invoked from network); 17 Jan 1997 07:08:37 -0000 Received: from rosie.et.tudelft.nl (130.161.127.248) by mail2.redhat.com with SMTP; 17 Jan 1997 07:08:36 -0000 Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by rosi...
1996 Nov 21
2
Re: BOUNCE: Re: Chattr +i and securelevel
...sion: 2.6.2 iQCVAwUBMpYbw4xFUz2t8+6VAQF9pgQAhwl4zNBrlfVxgv7+Ubm8uRkRRaZcjvxH 4F4FdFdtBjyqgkj4dMIKEEhy28TZbAqh0ks6eiviwFAYuMnu3G+MBeGLyHOpX4Mw krb7At3wt41Yj5NXHpsz9GebYBVfM8sOl4CKX0UcdXdizxfNKxXd8SJLnYteye2b 8paVHnyyDyo= =9xvg -----END PGP SIGNATURE----- From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP) Received: (qmail 28417 invoked from network); 24 Nov 1996 14:32:27 -0000 Received: from rosie.et.tudelft.nl (130.161.127.248) by mail2.redhat.com with SMTP; 24 Nov 1996 14:32:25 -0000 Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by ros...
1996 Nov 14
0
setgid binaries
...ir password away, and for example the above trick can be used to give just their group access away....] Andrew -- Linux-PAM: http://parc.power.net/morgan/Linux-PAM/index.html libpwdb: http://parc.power.net/morgan/libpwdb/index.html From mail@mail.redhat.com mail2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP) Received: (qmail 11199 invoked from network); 29 Nov 1996 06:56:12 -0000 Received: from rosie.et.tudelft.nl (130.161.127.248) by mail2.redhat.com with SMTP; 29 Nov 1996 06:56:11 -0000 Received: from cave.et.tudelft.nl (cave.et.tudelft.nl [130.161.127.241]) by ros...
1996 Nov 20
2
About DNS again
...rom personal workstations to corporate > firewalls. Discussing it, e-mailing about it, or any other type of > communication in limited forums will end with the bug still being a > problem. With this in mind, we released the advisory. Alex From mail@mail.redhat.com relay2.redhat.com dutecai.et.tudelft.nl by (8.6.10/1.34JP)
1996 Nov 17
5
Sendmail 8.8.2 exploit.
Hm, look what I got hold of today.. Works if sendmail is mode 4111 or similar: #! /bin/sh # # # Hi ! # This is exploit for sendmail smtpd bug # (ver. 8.7-8.8.2 for FreeBSD, Linux and may be other platforms). # This shell script does a root shell in /tmp directory. # If you have any problems with it, drop me a letter. #