search for: overlow

Displaying 4 results from an estimated 4 matches for "overlow".

Did you mean: overflow
1998 Aug 21
1
Named Overlow Concern
I am running Linux 2.0.30 (Redhat 4.2) and have recently been hacked. I have tightened up security but still feel vulnerable. In running the program mscan which was kindly left on my system I get this. bullnet.co.uk: VULN: linux box vulnerable to named overflow. 194.242.135.145: VULN: redhat linux box running imapd. This is after upgrading to the versions as below. bind-4_9_7-0
2008 Dec 18
2
Contextstack overlow
All - I have a number of rows that I am assigning length classes to via l.class<-with(wae, ifelse((Length>=120)&(Length<130),"125", ifelse((Length>=130)&(Length<140),"135", ifelse((Length>=140)&(Length<150),"145", ifelse((Length>=150)&(Length<160),"155",
2004 Aug 13
1
Dfs and Mangle=hash
If I only run dfs on my samba server, do I still need to worry about the mangle=hash buffer overlow and set "mangle method=hash2" on my older versions of samba? Thank-you, Greg
2003 Jan 08
2
OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS (fwd)
...0x80531bd <input_userauth_info_response_pam+193>: call 0x807306c <xfree> [...] (gdb) break *0x80531bd Breakpoint 1 at 0x80531bd: file auth2-pam.c, line 158. (gdb) continue Continuing. Now that the buggy call to xfree() can be intercepted, the SSH client should trigger the integer overlow and the resulting heap overflow: $ ssh werewolf.research.mmhs.com Password: <type a thousand 'A' characters here and hit enter> After that, the xfree() breakpoint is reached, and the next call to free() should therefore be intercepted in order to comply with the technique developed...