Displaying 20 results from an estimated 2000 matches similar to: "OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?"
2007 Jan 10
1
Recent vulnerabilities in xorg-server
Colin, good day!
Spotted two patches for x11-servers/xorg-server port: see entries for
x11r6.9.0-dbe-render.diff and x11r6.9.0-cidfonts.diff at
http://xorg.freedesktop.org/releases/X11R6.9.0/patches/index.html
Seems like they are not applied to the xorg-server-6.9.0_5. May be
it should be added to the VuXML document?
There is a ports/107733 issue that incorporates these patches. May
be you
2007 Mar 16
0
freebsd-security Digest, Vol 201, Issue 2
? 2007-3-15???8:00?freebsd-security-request@freebsd.org ???
> Send freebsd-security mailing list submissions to
> freebsd-security@freebsd.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> or, via email, send a message with subject or body 'help' to
> freebsd-security-request@freebsd.org
2009 Dec 01
1
LD_PRELOAD temporary patch
I've used that patch to close the hole. This patch is temporary and doesn't fix real trouble maker - problem in new version in getenv() (after 6.3 it got changed to something monstrous and non-working right if environment has only one variable), hope it will get fixed soon.
*** rtld.c.orig Tue Dec 1 16:55:13 2009
--- rtld.c Tue Dec 1 16:55:55 2009
***************
*** 357,374 ****
2007 Oct 05
2
FastIPSec and OCF
Hi,
Does FASTIPSec in FreeBSD use OCF framework ? Where can I find more
documentation ?
I wish to run cryptographic algorithms after setting a VPN. What command
should I use to run a particular crytographic algorithm (e.g. 3DES etc.)
Where can I find all such information ?
--
Regards,
Bubble
2008 Mar 02
2
*BSD user-ppp local root (when conditions permit)
Good day.
Fri, Feb 29, 2008 at 04:39:03PM -0000, sipherr@gmail.com wrote:
> I just tested this on FreeBSD 6.3. This bug was discovered on NetBSD. It also works on OpenBSD (unconfirmed on 4.2)
>
> Steps to reproduce:
>
> 1. Run ppp
>
> 2. type the following (or atleat some variation of)
>
>
2008 May 18
2
Vulnerability with compromised geli credentials?
I'm not really a developer, but was considering if there is a key
vulnerability in geli given that when you change a key there isn't a disk
update.
Consider the scenario where a new file system is created and populated
with some files. At a later time the original key is changed because
someone has gained access to the key and passphrase. A new key is
generated and attached, but none of
2007 Mar 21
4
Reality check: IPFW sees SSH traffic that sshd does not?
This note is essentially a request for a reality check.
I use IPFW & natd on the box that provides the interface between my home
networks and the Internet; the connection is (static) residential DSL.
I configured IPFW to accept & log all SSH "setup" requests, and use natd
to forward such requests to an internal machine that only accepts public
key authentication; that
2008 Nov 22
0
[patch] [vuxml] net/wireshark: fix DoS in SMTP dissector
>Submitter-Id: current-users
>Originator: Eygene Ryabinkin
>Organization: Code Labs
>Confidential: no
>Synopsis: [patch] [vuxml] net/wireshark: fix DoS in SMTP dissector
>Severity: serious
>Priority: high
>Category: ports
>Class: sw-bug
>Release: FreeBSD 7.1-PRERELEASE i386
>Environment:
System: FreeBSD 7.1-PRERELEASE i386
>Description:
Today the DoS
2007 Dec 02
6
MD5 Collisions...
Hi everyone,
Not sure if you've read http://www.win.tue.nl/hashclash/SoftIntCodeSign/ .
should some kind of advisory be sent to advise people not to rely solely on MD5 checksums? Maybe an update to the man page is due ? :
"
MD5 has not yet (2001-09-03) been broken, but sufficient attacks have
been made that its security is in some doubt. The attacks on MD5 are in
the
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest
patched proftpd distribution.
--
Jez
http://www.munk.nu/
-------------- next part --------------
An embedded message was scrubbed...
From: Dave Ahmad <da@securityfocus.com>
Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise
Vulnerability (fwd)
Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT)
Size: 4588
Url:
2008 Feb 24
0
Zeroing sensitive memory chunks [Was: Security Flaw in Popular Disk Encryption Technologies]
Good day.
I am posting the follow-up to the -hackers and CC'ing to the
-security, because some more-or-less nasty points were found.
Sat, Feb 23, 2008 at 10:32:02PM +0300, Eygene Ryabinkin wrote:
> But there is another concern with bzero(): it is well-known function.
> Especially for compilers. And it is bad: some arrays inside g_eli,
> that hold decryption keys are the local
2005 Jan 13
4
Manager API !!!!!!!!!
Hello all
Has anyone had any success with the Manager API ?
I am trying to check an extension status without too much luck I have
the following
<?php
$fp = fsockopen("127.0.0.1", 5038, $errno, $errstr, 30);
if (!$fp) {
echo "$errstr ($errno)<br />\n";
} else {
$out = "Action: Login\r\n";
$out .=
2006 Mar 09
1
FreeBSD netfront.c / problem
Hello!
I''m working on a guest OS port which uses NetBSD drivers, and I''m
currently working on the netfront support. I''m basing the driver on
the FreeBSD 7.0 driver, and I''ve run into a problem in
network_alloc_rx_buffers.
Parts of the code with line numbers is given below, and I''ll try to
explain where the problem occurs.
The basic problem is that
2002 Mar 22
1
Is OpenSSH vulnerable to the ZLIB problem or isn't it?
SSH.COM says their SSH2 is not vulnerable to the ZLIB problem even though
they use the library (details below). Can OpenSSH say the same thing?
In either case, it seems like there ought to be an openssh-unix-announce
message about what the situation is. I may have missed it, but I don't
believe there was one. Yes, openssh doesn't have its own copy of zlib
source but it would still be
2002 Aug 01
4
openssh-3.4p1.tar.gz on ftp.openbsd.org changing rather than frozen
I have seen that file
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-3.4p1.tar.gz
is continuosly changing.
This seems strange to me as I expected it should be a 'frozen' file;
The signature and diff file are still dated Jun 26.
I am wondering whether this is intentional.
Best regards,
Wojtek
2005 Apr 21
6
Information disclosure?
Hello,
For some reason, I thought little about the "clear" command today..
Let's say a privileged user (root) logs on, edit a sensitive file (e.g,
a file containing a password, running vipw, etc) .. then runs clear and
logout. Then anyone can press the scroll-lock command, scroll back up
and read the sensitive information.. Isn't "clear" ment to clear the
2011 Aug 05
1
Simulacion matrices de varianza-covarianza
Hola!
Para simular matrices de datos normales multivariados con la sentencia
rmvnorm (dentro del paquete mvtnorm) se necesita, entre otras cosas, el
número de vectores a simular, el vector de parámetros-medias correspondiente
a cada variable y su respectiva matriz de Varianza-Covarianza. En este
último punto, tengo problemas.
En lugar de ingresar una matriz sigma creada por mi, necesito simular
2005 Mar 17
1
no patch, is there a problem
http://www.securityfocus.com/bid/12825/info/
no patch or anything, is there any action on this?
2007 Sep 28
2
OpenSSL bufffer overflow
I did not see any commits to the OpenSSL code, recently; is anybody
going to commit the fix?
See http://www.securityfocus.com/archive/1/480855/30/0 for details ...
Regards, STefan
2004 Jun 28
2
Security Vulnerability in Asterisk
The following is pasted from SecurityFocus Newsletter #254:
-------------------------
Asterisk PBX Multiple Logging Format String Vulnerabilities
BugTraq ID: 10569
Remote: Yes
Date Published: Jun 18 2004
Relevant URL: http://www.securityfocus.com/bid/10569
Summary:
It is reported that Asterisk is susceptible to format string
vulnerabilities in its logging functions.
An attacker may use these