Displaying 20 results from an estimated 120 matches similar to: "SMB protocol security flaw"
2005 Sep 28
3
Headline - Linux misses Windows of opportunity
Dear CentOS,
Ken wants you to know about this story on http://www.theage.com.au.
Personal Message:
How much did MS pay for the article?
Linux misses Windows of opportunity
September 27, 2005
URL: http://www.theage.com.au/articles/2005/09/26/1127586780339.html
The online edition of The Age brings you updated local and world news, sports results, entertainment news and reviews and the latest
2007 Jan 26
1
Microsoft makes hard call for input
hi all,
you might be interested in this article.
cheers,
joe
A Sydney software engineer has been embroiled in a controversy in which Microsoft stands accused of trying to use him as a paid proxy to finesse entries on the Wikipedia site. Doug Mahugh, Microsoft "technical evangelist", emailed the engineer, Rick Jelliffe, on Monday, hoping to use Mr Jelliffe's
2014 Apr 09
1
FLASH NewsBites - Heartbleed Open SSL Vulnerability (fwd)
For even more information about "Heartbleed".
-Connie Sieh
---------- Forwarded message ----------
Date: Wed, 9 Apr 2014 12:27:54 -0500
From: The SANS Institute <NewsBites at sans.org>
Subject: FLASH NewsBites - Heartbleed Open SSL Vulnerability
FLASH NewsBites - Heartbleed Open SSL Vulnerability
FLASH NewsBites are issued only when a security event demands global and
immediate
2013 Jun 05
2
dovecot and time
I found something interesting via strace. lda is writing a timestamp
with utime before doign the fsync, but I'm really not a C guy, so I
have no idea why that's going on via procmail and not via commandline.
I assume it's related to the choice of pread64 vs read.
when called from commandline (working):
read(0, "July 14-20, 2013\n10 courses. Bon"..., 4096) = 4096
1998 May 17
0
Minor flaw in Caldera OpenLinux 1.2
(I almost didn''t post this cause I hope you would notice it immediately
after installing the OS... It''s here for the people that don''t/won''t use
Caldera OpenLinux 1.2 )
Hello to all!
By default, Caldera OpenLinux 1.2 adds the currrent working directory to
the end of the $PATH on login. This of course gives a normal user the
possibility of gaining a root shell
2003 Jan 24
1
WHITEHAT DISCOVERS SERIOUS SECURITY FLAW AFFECTING ALL WEB SERVER S WORLDWIDE
FYI,
Santa Clara, Calif., Jan. 20, 2003 -- WhiteHat Security, Inc. a Santa Clara,
California based company that specializes in Web Application Security, has
discovered a serious security flaw affecting all web server world wide. From
months of extensive research and testing, WhiteHat has found a way to
exploit
a flaw in the way all web servers communicate.
2004 Jun 23
3
[Bug 883] mdoc2man.awk causes flaw in ssh(1) man page
http://bugzilla.mindrot.org/show_bug.cgi?id=883
Summary: mdoc2man.awk causes flaw in ssh(1) man page
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: Build system
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2004 May 17
0
Zap callwaiting hookflash idiosyncracy/flaw?
Don't know what else to call this. Googling and some time on the IRC
channel haven't gotten me anywhere.
Here's the sitch, which is a bit complicated but is something my
customers are in fact encountering on an everyday basis:
1. Bob is on a Zap channel talking through the PSTN to Carol. Both have
the misfortune, like so many of us, of having LECs who do not offer
disconnect
2004 Sep 30
0
CentOS-3 errata : Updated ruby package fixes security flaw
There is an updated ruby package for CentOS 3.3 (and added
to 3.1)
https://rhn.redhat.com/errata/RHSA-2004-441.html refers
Updated files are :-
ruby-1.6.8-9.EL3.2.i386.rpm
ruby-devel-1.6.8-9.EL3.2.i386.rpm
ruby-libs-1.6.8-9.EL3.2.i386.rpm
ruby-mode-1.6.8-9.EL3.2.i386.rpm
in updates/i386/RPMS/
in addition irb-1.6.8-9.EL3.2.i386.rpm has been added to the addons repository
These are
2016 Jan 16
2
OpenSSH security flaw
Hello all,
Does anybody know if this one has been patched?
http://thehackernews.com/2016/01/openssh-vulnerability-cryptokeys.html
Thanks.
Boris.
2016 Aug 12
3
Linux TCP flaw
Hi
So after reading this, felt I should apply the fix to a CentOS6 VPS that
I have.
http://www.zdnet.com/article/linux-tcp-flaw-lets-anyone-hijack-internet-traffic/
The article doesn't talk about CentOS or Redhat, but I assume the
problem is the same, and hoping the solution is the same.
However that doesn't seem to be the case.
[root at vps ~]# uname -r
2.6.32-042stab108.7
[root at
2016 Aug 12
0
Linux TCP flaw
> Hi
>
> So after reading this, felt I should apply the fix to a CentOS6 VPS that I
> have.
> http://www.zdnet.com/article/linux-tcp-flaw-lets-anyone-hijack-internet-traffic/
>
> The article doesn't talk about CentOS or Redhat, but I assume the problem is
> the same, and hoping the solution is the same.
> However that doesn't seem to be the case.
>
>
2016 Aug 12
2
Linux TCP flaw
On 12/08/16 17:56, Barry Brimer wrote:
>> [root at vps ~]# uname -r
>> 2.6.32-042stab108.7
>
> Not needed. This affects 3.6+ kernels. You don't have one of those.
It affects RHEL6 which runs 2.6.32, they backported the features that it
affects. If the above openvz kernel was based on a RHEL6 kernel (and
I'd guess it was) then it's affected.
Peter
2016 Aug 12
0
Linux TCP flaw
On Fri, 12 Aug 2016, Peter wrote:
> On 12/08/16 17:56, Barry Brimer wrote:
>>> [root at vps ~]# uname -r
>>> 2.6.32-042stab108.7
>>
>> Not needed. This affects 3.6+ kernels. You don't have one of those.
>
> It affects RHEL6 which runs 2.6.32, they backported the features that it
> affects. If the above openvz kernel was based on a RHEL6 kernel (and
2016 Aug 12
1
Linux TCP flaw
On 08/11/2016 11:07 PM, Barry Brimer wrote:
>
> On Fri, 12 Aug 2016, Peter wrote:
>
>> On 12/08/16 17:56, Barry Brimer wrote:
>>>> [root at vps ~]# uname -r
>>>> 2.6.32-042stab108.7
>>>
>>> Not needed. This affects 3.6+ kernels. You don't have one of those.
>>
>> It affects RHEL6 which runs 2.6.32, they backported the
2016 Aug 12
1
Linux TCP flaw
Thanks for the info Peter.
The VPS is running on a Plesk environment.
------ Original Message ------
From: "Peter" <peter at pajamian.dhs.org>
To: centos at centos.org
Sent: 12/08/2016 3:36:32 PM
Subject: Re: [CentOS] Linux TCP flaw
>On 12/08/16 17:33, Andrew Dent wrote:
>> So after reading this, felt I should apply the fix to a CentOS6 VPS
>>that
>> I
2016 Aug 12
1
Linux TCP flaw
Would a successful attack on the IP address of a VPS in a Plesk
environment expose the VPS, the Virtual Host or both (and all other
VPSs)?
------ Original Message ------
From: "Johnny Hughes" <johnny at centos.org>
To: centos at centos.org
Sent: 12/08/2016 9:08:23 PM
Subject: Re: [CentOS] Linux TCP flaw
>On 08/12/2016 05:58 AM, Andrew Dent wrote:
>> Thanks for the
2016 Oct 23
0
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On Sat, October 22, 2016 7:49 pm, Valeri Galtsev wrote:
> Dear All,
>
> I guess, we all have to urgently apply workaround, following, say, this:
>
> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/
>
> At least those of us who still have important multi user machines running
> Linux.
I should have said CentOS 7. Older ones
2016 Oct 23
1
CVE-2016-5195 ?DirtyCOW?: Critical Linux Kernel Flaw
On Sat Oct 22 08:20:24 PM, Valeri Galtsev wrote:
> I should have said CentOS 7. Older ones (CentOS 6 and 5) are not vulnerable.
https://bugzilla.redhat.com/show_bug.cgi?id=1384344
Comment #35 points to a link that doesn't depend on /proc/self/mem and
claims to work on CentOS 6 and 5. I'm not quite sure what I should
be looking for when I run the program, though.
I do hope Redhat
2016 Oct 25
0
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
What is the best approach on centos 6 to mitigate the problem is
officially patched? As far as I can tell Centos 6 is vulnerable to
attacks using ptrace.
There is a mitigation described here
https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13
which doesn't fix the underlying problem, but at least protects against
known attack vectors. However, I'm unsure if the script only