search for: globalintersec

Displaying 3 results from an estimated 3 matches for "globalintersec".

2003 Jan 08
0
[Fwd: Re: OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS]
According to the authors of the original advisory, this is _definitely_ a hoax. -------- Original Message -------- Subject: Re: OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS Date: Mon, 06 Jan 2003 20:05:32 +0000 From: Global InterSec Research <lists at globalintersec.com> To: bugtraq at securityfocus.com As some may have gathered, the advisory recently posted by mmhs at hushmail.com was indeed a fake, intended to highlight several unclear statements made in GIS2002062801. The advisory in question is currently being updated with more detailed informatio...
2003 Jan 08
2
OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS (fwd)
...is only valuable if it makes a difference. (*) in the case of a leap year, we of course provide a 24 x 7, 366 days premier service. TECHNICAL BACKGROUND - -------------------- The following advisory is based on the excellent advisory published by Global InterSec LLC *six months ago*: http://www.globalintersec.com/adv/openssh-2002062801.txt After more than six months of intensive underground research, our ISO 31337 certified security department evidenced that the bug (an integer overflow, resulting in a heap overflow) described in the aforementioned advisory still exists in OpenSSH 3.5p1 and 3.4p1, and...
2002 May 13
0
FreeBSD Security Notice FreeBSD-SN-02:02
...n error output. <URL:http://puf.sourceforge.net/ChangeLog> +------------------------------------------------------------------------+ Port name: sudo Affected: versions < sudo-1.6.6 Status: Fixed Heap overflow may allow local users to gain root access. <URL:http://www.globalintersec.com/adv/sudo-2002041701.txt> +------------------------------------------------------------------------+ Port name: webalizer Affected: versions < webalizer-2.1.10 Status: Fixed Buffer overflow in the DNS resolver code. <URL:http://www.mrunix.net/webalizer/news.html> &...