Displaying 15 results from an estimated 15 matches for "vulerability".
Did you mean:
vulnerability
2017 Aug 31
0
AST-2017-007: Remote Crash Vulerability in res_pjsip
Asterisk Project Security Advisory - AST-2017-007
Product Asterisk
Summary Remote Crash Vulerability in res_pjsip
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
Exploits Known No...
2007 Apr 05
1
Extent of time zone vulerability for POSIX date and time classes
Hi.
I frequently convert date and time data to and from character
representations. I'm frustrated with chron, because 'seconds' are
required to create a time object (my input data never has seconds).
More importantly, I cannot make chron print the format 12/30/2006 (which
my output data requires).
I really like the format flexibility of strftime() and strptime(), but
of course
2016 Oct 17
3
Is bind-9.8.2-0.47.rc1.el6_8.1.x86_64 vulnerable
Hi
I'd like to know if the present version of Bind in CentOS 6 (bind-9.8.2-0.47.rc1.el6_8.1.x86_64) is vulerable to CVE-2016-2776.
According to https://www.isc.org/downloads/, version 9.8.x is End-of-Life (EOL) as of Sep 2014.
Regards
ian
2006 Sep 13
2
ports / www/linux-seamonkey / flashplugin vulnerability
Hi!
Since linux-flashplugin7 r63 is vulnerable according to
http://vuxml.FreeBSD.org/7c75d48c-429b-11db-afae-000c6ec775d9.html
isn't www/linux-seamonkey vulerable, too (it seems to include 7 r25)?
Bye
Arne
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
2004 Sep 20
1
RE: Samba 'make install' chokes on textproc/expat2 & now openldap
At 14:24 9/19/2004, JohnsoBS@vicksburg.navy.mil, wrote:
>Personally, unless one has great need not to, I highly recommend upgrading
>to samba3 to start with. The perfomance gains alone I found well worth it.
>Plus if you plan to integrate into a network with 2k/XP/2K3, it will greatly
>improve compatibility.
OK. I tried to install samba 3.0.7,1. Got the same error:
2013 Aug 14
3
force ciphers order for clients
Hi Timo,
reading this
http://www.kuketz-blog.de/perfect-forward-secrecy-mit-apple-mail/
it looks like DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA can be forced in use
with apple mail
( if no ECDHE is possible ,by missing openssl 1.x etc,
seems that apple mail tries ECDHE first if fails its going to use
RSA-AES128-SHA )
force soltution as tried
ssl_cipher_list =
2008 Jun 22
6
Installing Rails
Having a god-awful time installing Rails. I started with the
instructions found on this page:
http://articles.slicehost.com/2007/11/23/ubuntu-gutsy-mysql-and-ror
I get the following error:
vbfischer@ubuntu:~$ sudo gem install rails
[sudo] password for vbfischer:
Bulk updating Gem source index for: http://gems.rubyforge.org/
Updating metadata for 13 gems from http://gems.rubyonrails.org/
2019 Dec 18
0
"ldap server require strong auth" and MS-AD
...tls".
From [1] :
"""
Summary
LDAP channel binding and LDAP signing provide ways to increase the
security of network communications between an Active Directory Domain
Services (AD DS) or an Active Directory Lightweight Directory Services
(AD LDS) and its clients. There is a vulerability in the default
configuration for Lightweight Directory Access Protocol (LDAP) channel
binding and LDAP signing and may expose Active directory domain
controllers to elevation of privilege vulnerabilities. Microsoft
Security Advisory ADV190023 address the issue by recommending the
administrato...
2005 Jan 28
1
fbsd not vulnerable to recent bind issues?
Hi,
Recently some security issues with bind have come up.
NetBSD patched it's version of 9.3.0:
http://mail-index.netbsd.org/source-changes/2005/01/27/0009.html
Is the version in RELENG_5 not affected?
(ftp://ftp.isc.org/isc/bind/9.3.0/9.3.0-patch1)
Bye,
Mipam.
2015 Nov 25
2
Glibc vulnerbality CVE-2015-1781
Hi,
We are using CentOS 5.5 as a base OS for one of our products.The version of
Glibc we are using was glibc-2.5-123.el5_11.1.
We wanted to see whether this glibc is vulerable to CVE-2015-1781. I have
gone through re-documentation & came across the following link
https://access.redhat.com/security/cve/cve-2015-1781
In the link it is mentioned that, the CVE will not be fixed in Red-Hat 5
2003 May 22
2
issue with ports
my ports database seems to have become broken. I'm running -stable, but
haven't rebuilt the system in a year or so (I know, security vulerabilities,
but the box has been shelved in this time).
anyhow, at this point, I can't do even a make clean in ports, or build
portupgrade. I fetched portupgrade with pkg_add hoping that running pkgdb -F
would sort things out, but it errors with:
**
2002 Jul 30
1
OpenSSL Security Advisory [30 July 2002]
...----------
All four of these are potentially remotely exploitable.
1. The client master key in SSL2 could be oversized and overrun a
buffer. This vulnerability was also independently discovered by
consultants at Neohapsis (http://www.neohapsis.com/) who have also
demonstrated that the vulerability is exploitable. Exploit code is
NOT available at this time.
2. The session ID supplied to a client in SSL3 could be oversized and
overrun a buffer.
3. The master key supplied to an SSL3 server could be oversized and
overrun a stack-based buffer. This issues only affects OpenSSL
0....
2019 Sep 01
6
TLS questions
I am currently NOT using SSL on my Samba domain.
While reading "Configuring_LDAP_over_SSL_(LDAPS)_on_a_Samba_AD_DC" and
thinking about implementing. I'm having trouble "getting my head" around
what certificates go where.
Simply put, I am not clear as to generating certificates on the clients and
then copy which files to to the server or vice versa?
What happens when
2020 Nov 06
2
[DebugInfo] A value-tracking variable location update
Hi debug-info folks,
Time for another update on the variable location "instruction referencing"
implementation I've been doing, see this RFC [0, 1] for background. It's now at
the point where I'd call it "done" (as far as software ever is), and so it's a
good time to look at what results it produces. And here are the
scores-on-the-doors using llvm-locstats, on
2020 Nov 06
0
[DebugInfo] A value-tracking variable location update
Awesome to read how it's coming along - I'm mostly aside from the
debug location work, but had just one or two clarifying questions
On Fri, Nov 6, 2020 at 10:27 AM Jeremy Morse
<jeremy.morse.llvm at gmail.com> wrote:
>
> Hi debug-info folks,
>
> Time for another update on the variable location "instruction referencing"
> implementation I've been doing,