similar to: (from BugTraq) openssh2.2.p1 - Re: scp file transfer hole

Displaying 20 results from an estimated 1000 matches similar to: "(from BugTraq) openssh2.2.p1 - Re: scp file transfer hole"

1999 Feb 22
0
Forw: RedHat sysklogd vulnerability
Another from Bugtraq. I've also forwarded this one on to our contact at Red Hat (Stephen Smoogen) and he tells me it's in their QA currently. Dan _______________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L Fermi National Accelerator
2003 Sep 17
0
Fwd: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]
More patch-o-rama :-( ---Mike >From: Michal Zalewski <lcamtuf@dione.ids.pl> >To: bugtraq@securityfocus.com, <vulnwatch@securityfocus.com>, > <full-disclosure@netsys.com> >X-Nmymbofr: Nir Orb Buk >Subject: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) >[CAN-2003-0694] >Sender: full-disclosure-admin@lists.netsys.com >X-BeenThere:
1999 Nov 10
0
Re: undocumented bugs - nfsd
On Tue, Nov 09, 1999 at 11:39:39AM +0100, Mariusz Marcinkiewicz wrote: > After reading lcamtuf's posts I decided write this one. Few months ago one > of my friends - digit - found bug in linux nfsd daemon. I made example > sploit about IV 1999. Now in distributions is new nfsd and nowhere was > information about security weaknes of old version! Well, one gets used to people
1998 Feb 20
0
"not-so-dangerous symlink bugs" - a better look
Typical "[symbolic|hard] link bug" is a vunerability, which allows user X to overwrite files owned by Y (with useless portion of junk) when Y launchs buggy program. But this trivial (and often ignored) attack method can be easily turned into a cute, powerful weapon. Here''s an example how to perform advanced exploitation of gcc symlink bug (I choosen that one, because this
2004 Dec 03
1
[BUGTRAQ] rssh and scponly arbitrary command execution
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [This came over BUGTRAQ this morning. Note the call for volunteers vis-a-vis rssh.] - ----- Forwarded message from Jason Wies <jason at xc.net> ----- List-Id: <bugtraq.list-id.securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe at securityfocus.com> To: bugtraq at securityfocus.com Cc: rssh-discuss at
1998 Jan 07
0
FYI: Apache security advisory
[Mod: headers removed -- alex] ------- Forwarded Message Reply-To: Marc Slemko <marcs@ZNEP.COM> Sender: alan@cymru.net From: Marc Slemko <marcs@ZNEP.COM> Approved: alex@yuriev.com Subject: Apache security advisory X-To: apache-announce@apache.org To: BUGTRAQ@NETSPACE.ORG [ Copies of this are being sent to BUGTRAQ, apache-announce, comp.infosystems.www.servers.unix, and
1998 Feb 05
0
vixie cron 3.0.1 continued
The problem with vixie cron is wider (and more funny) than I expected. Here''s my proggy which allows hiding files of any kind and size into crontab entries (remember, quota is ignored ;-): -- cron_put -- #!/bin/bash echo "Vixie cron 3.0.1 file storage - put utlility" echo "by Michal Zalewski <lcamtuf@staszic.waw.pl>" echo if [ "$1" = "" ];
1997 Apr 23
0
Linux squake security hole (provides root if squake is installed mode 4755)
I''ll just include the letter that I sent to John Carmack and Dave "Zoid" Kirsch concerning this problem. ---------------------------------------------------------------------- From: Greg Alexander <galexand@sietch.bloomington.in.us> Approved: R.E.Wolff@BitWizard.nl To: zoid@threewave.com cc: johnc@idsoftware.com Subject: Security hole in squake. Please respond with this
2005 Feb 17
0
[Bug 856] scp hangs on FIFOs rather than erroring
http://bugzilla.mindrot.org/show_bug.cgi?id=856 ------- Additional Comments From rngadam at yahoo.com 2005-02-18 09:36 ------- Just thought I'd drop in to ask for this bug to be solved and add another vote to solving this bug... I was trying to copy my CrossOver Office config (about 470M worth of data) using scp to another machine configured as follows: The source: kernel 2.6.10
1998 Mar 14
1
Vunerable shell scripts
I made a list of /usr/bin scripts which allows /tmp races. Following ones creates /tmp/something.$$, then, with no permission/ownership checking, /tmp/something.$$.x (x may vary ;), or even performs suitable checks, but gives enough time to alter /tmp contents: glibcbug, bashbug, znew, mailstat, autoupdate, x11perfcomp, gccmakedep, pnmindex, xcopy, autoheader, cvsbug, rcs2log, updatedb, igawk,
2003 Jun 06
1
bugtraq re: remote client address restriction circumvention
does anyone have a comment to make about this? (cert picked it up and we're being asked for a vendor response) http://www.securityfocus.com/archive/1/324016/2003-06-03/2003-06-09/0 do we have an "official" response yet? thanks, wendy -- wendy palm Cray Open Software Development, Cray Inc. wendyp at cray.com, 651-605-9154
1998 Feb 04
0
An old ld-linux.so hole
Section I. Overview Hello, About a half year ago there was some rumour on bugtraq concerning a buffer overflow in Linux dynamic linkers, ld.so and ld-linux.so. You can take a look at the beginning of the thread at http://www.geek-girl.com/bugtraq/1997_3/0089.html to refresh old memories; I''ll capitalize anyway. Briefly, there exists a buffer overrun in ld-linux.so versions 1.7.14,
1997 May 14
0
Security hole in Elm...
>---------- Forwarded message ---------- >Date: Tue, 13 May 1997 21:18:33 +0200 >From: Wojciech Swieboda <wojtek@ajax.umcs.lublin.pl> >To: BUGTRAQ@NETSPACE.ORG > >Hello, > I''ve lately found an overflow vulnerability in Elm (Elm is setgid >mail on linux, and perhaps on some other platforms aswell). I''ve tested >this bug on versions 2.3 and
2004 Apr 07
1
Possible security hole in racoon verified on FreeBSD using racoon-20030711
Hi, while testing racoon on Linux (based on the ported ipsec-tools) the following issue appeared: Racoon did not verify the RSA Signatures during Phase 1 in either main or aggressive mode. Authentication was possible using a correct certificate and a wrong private key. I have verified the below problem using racoon-20030711 on FreeBSD 4.9. I will test it using the SNAP Kit but suspect it to be
2015 Mar 17
0
[ANNOUNCE] X.Org Security Advisory: More BDF file parsing issues in libXfont
X.Org Security Advisory: March 17, 2015 More BDF file parsing issues in libXfont ======================================== Description: ============ Ilja van Sprundel, a security researcher with IOActive, has discovered an issue in the parsing of BDF font files by libXfont. Additional testing by Alan Coopersmith and William Robinet with the American Fuzzy Lop (afl) tool uncovered two more
2008 Aug 16
5
DO NOT REPLY [Bug 5695] New: rsync local timeout
https://bugzilla.samba.org/show_bug.cgi?id=5695 Summary: rsync local timeout Product: rsync Version: 3.0.3 Platform: x86 OS/Version: Linux Status: NEW Severity: normal Priority: P3 Component: core AssignedTo: wayned@samba.org ReportedBy: gabriele.tozzi@gmail.com QAContact:
2004 Aug 06
0
Fwd: Icecast temp patch (OR: Patches? We DO need stinkin' patches!!@$!)
Hi There, re. the recently reported buffer overflow in icecast, is there any "official" security patch against 1.3.11 ? I am reluctant to take any un-official patch like this one ;-) There is nothing on www.icecast.org/releases, maybe it's somewhere else ? Thanks. Alfredo <p><p>>Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm >List-Id:
2001 Jul 10
0
FreeBSD Ports Security Advisory FreeBSD-SA-01:45.samba
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-01:45 Security Advisory FreeBSD, Inc. Topic: samba Category: ports Module: samba Announced: 2001-07-10 Credits: Michal Zalewski
2004 Sep 17
1
Fwd: FreeBSD kernel buffer overflow
Can anyone provide more details about the posting below ? >Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm >List-Id: <bugtraq.list-id.securityfocus.com> >List-Post: <mailto:bugtraq@securityfocus.com> >List-Help: <mailto:bugtraq-help@securityfocus.com> >List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> >List-Subscribe:
2014 Mar 17
1
protocol error : expected control record
Hi All, During scp, I am seeing this message protocol error : expected control record This message came because scp sink was expecting the message starting from 'C' or 'D' , something like C0644 299 group or D0755 0 docs but during dns query we were printing "Using IP address" message on the stdout. So , the message in the buffer was "Using IP address" and