Displaying 20 results from an estimated 6000 matches similar to: "Fwd: [Xen-announce] Xen Security Advisory 19 - guest administrator can access qemu monitor console"
2012 Sep 07
0
Xen Security Advisory 19 (CVE-2012-4411) - guest administrator can access qemu monitor console
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2012-4411 / XSA-19
version 2
guest administrator can access qemu monitor console
UPDATES IN VERSION 2
====================
We have now been issued with a CVE number.
ISSUE DESCRIPTION
=================
A guest administrator who is granted access to the graphical console
of a Xen guest
2012 Sep 06
0
Re: [oss-security] Xen Security Advisory 19 - guest administrator can access qemu monitor console
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 09/06/2012 10:13 AM, Xen.org security team wrote:
> Xen Security Advisory XSA-19
>
> guest administrator can access qemu monitor console
>
>
> ISSUE DESCRIPTION
> =================
>
> A guest administrator who is granted access to the graphical console
> of a Xen guest can access the qemu
2012 Sep 06
0
Bug#686848: CVE-2007-0998: Qemu monitor can be used to access host resources
Package: xen-qemu-dm-4.0
Version: 4.0.1-2+squeeze1
Severity: grave
Tags: squeeze
Copying the Xen Security Advisory:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory XSA-19
guest administrator can access qemu monitor console
ISSUE DESCRIPTION
=================
A guest administrator who is granted access to the graphical console
of a Xen guest can
2005 Jul 27
0
FreeBSD Security Advisory FreeBSD-SA-05:19.ipsec
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:19.ipsec Security Advisory
The FreeBSD Project
Topic: Incorrect key usage in AES-XCBC-MAC
Category: core
Module: netinet6
Announced:
2005 Jul 27
0
FreeBSD Security Advisory FreeBSD-SA-05:19.ipsec
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:19.ipsec Security Advisory
The FreeBSD Project
Topic: Incorrect key usage in AES-XCBC-MAC
Category: core
Module: netinet6
Announced:
2012 Sep 05
7
Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2012-3515 / XSA-17
version 2
Qemu VT100 emulation vulnerability
UPDATES IN VERSION 2
====================
Public release.
ISSUE DESCRIPTION
=================
The device model used by fully virtualised (HVM) domains, qemu, does
not properly handle escape VT100
2012 Sep 05
7
Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2012-3515 / XSA-17
version 2
Qemu VT100 emulation vulnerability
UPDATES IN VERSION 2
====================
Public release.
ISSUE DESCRIPTION
=================
The device model used by fully virtualised (HVM) domains, qemu, does
not properly handle escape VT100
2006 Sep 06
0
FreeBSD Security Advisory FreeBSD-SA-06:19.openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:19.openssl Security Advisory
The FreeBSD Project
Topic: Incorrect PKCS#1 v1.5 padding validation in crypto(3)
Category: contrib
Module: openssl
2000 Jun 06
0
[CSSA-2000-015-0] Caldera Security Advisory: KDE suid root applications
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: kdelibs vulnerability for setuid KDE applications
Advisory number: CSSA-2000-015.0
Issue date: 2000 June, 02
Cross reference:
______________________________________________________________________________
1.
2013 Oct 10
0
Xen Security Advisory 71 (CVE-2013-4375) - qemu disk backend (qdisk) resource leak
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2013-4375 / XSA-71
version 2
qemu disk backend (qdisk) resource leak
UPDATES IN VERSION 2
====================
Public release
Fix patch header corruption in xsa71-qemu-xen-unstable.patch.
ISSUE DESCRIPTION
=================
The qdisk PV disk backend in the
2003 Nov 28
0
FreeBSD Security Advisory FreeBSD-SA-03:19.bind
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:19.bind Security Advisory
The FreeBSD Project
Topic: bind8 negative cache poison attack
Category: contrib
Module: contrib_bind
Announced:
2003 Nov 28
0
FreeBSD Security Advisory FreeBSD-SA-03:19.bind
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:19.bind Security Advisory
The FreeBSD Project
Topic: bind8 negative cache poison attack
Category: contrib
Module: contrib_bind
Announced:
1998 Dec 22
0
CERT Advisory CA-98.13 - TCP/IP Denial of Service (fwd)
The following advisory was issued by CERT yesterday. Because it affects
FreeBSD systems as well, we are forwarding it to the appropriate FreeBSD
mailing lists. We would like to thanks CERT for cooperation with the
FreeBSD security officer on this subject.
-----BEGIN PGP SIGNED MESSAGE-----
CERT Advisory CA-98-13-tcp-denial-of-service
Original Issue Date: December 21, 1998
Last Revised
2015 May 13
0
Xen Security Advisory 133 (CVE-2015-3456) - Privilege escalation via emulated floppy disk drive
xen-4.4.2-2, available from the virt6-testing repository, includes the
fix for this issue.
Note that Xen actually does attempt to disable the floppy disk for HVM
domains by default, but due to a bug in qemu, the floppy disk only
partially disabled; enough functionality to exploit this bug remains.
This should be available from the normal xen4 repositories sometime
this afternoon.
-George
1999 Sep 07
0
FreeBSD Security Advisory: FreeBSD-SA-99:03.ftpd
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-99:03 Security Advisory
FreeBSD, Inc.
Topic: Two ftp daemons in ports vulnerable to attack.
Category: ports
Module: wu-ftpd and proftpd
2013 May 17
0
Xen Security Advisory 56 (CVE-2013-2072) - Buffer overflow in xencontrol Python bindings affecting xend
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory CVE-2013-2072 / XSA-56
version 2
Buffer overflow in xencontrol Python bindings affecting xend
UPDATES IN VERSION 2
====================
Public release.
ISSUE DESCRIPTION
=================
The Python bindings for the xc_vcpu_setaffinity call do not properly
check their inputs. Systems
2001 Feb 08
0
[CORE SDI ADVISORY] SSH1 CRC-32 compensation attack detector vulnerability
CORE SDI
http://www.core-sdi.com
SSH1 CRC-32 compensation attack detector vulnerability
Date Published: 2001-02-08
Advisory ID: CORE-20010207
Bugtraq ID: 2347
CVE CAN: CAN-2001-0144
Title: SSH1 CRC-32 compensation attack detector vulnerability
Class: Boundary Error Condition
Remotely Exploitable: Yes
Locally Exploitable: Yes
Release Mode:
1997 Apr 07
1
Is qpopper vulnerable?? Re: CERT Advisory CA-97.09 - Vulnerability in IMAP and POP
I''ve got qualcomm''s qpopper2.2, and am not sure if its vulnerable. The
advisory mentions pop and imap servers, but only says:
version of IMAP (Section B). If your POP server is based on the
University of Washington IMAP server code, you should also upgrade to
the latest version of IMAP. Until you can take one of these actions,
I installed the new imapd about 3
1998 Oct 13
0
FW: CERT Advisory CA-98.12 - mountd
--------
Is this old? I couldn''t find it in the linux-security archives.
If so, please disregard.
Dan
------- Forwarded Message
Return-Path: cppm_reg_sysadmins-owner@fnal.gov
Received: from FNAL.FNAL.Gov (fnal.fnal.gov [131.225.9.8])
by sapphire.fnal.gov (8.8.7/8.8.7) with ESMTP id LAA27322
for <yocum@sapphire.fnal.gov>; Tue, 13 Oct 1998 11:12:23 -0500
Received: from raven
2012 Jun 12
0
FreeBSD Security Advisory FreeBSD-SA-12:04.sysret
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-12:04.sysret Security Advisory
The FreeBSD Project
Topic: Privilege escalation when returning from kernel
Category: core
Module: sys_amd64