similar to: Nasty ping with pattern '+++ATH0' - how to stop?

Displaying 20 results from an estimated 700 matches similar to: "Nasty ping with pattern '+++ATH0' - how to stop?"

2001 Aug 13
0
Security Update: [CSSA-2001-30.0] Linux - Telnet AYT remote exploit
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera International, Inc. Security Advisory Subject: Linux - Telnet AYT remote exploit Advisory number: CSSA-2001-030.0 Issue date: 2001, August 10 Cross reference: ______________________________________________________________________________ 1. Problem
2000 May 23
1
further problems Re: scp not found with solaris 8/2.1.0p2
Thanks to Richard June, John Horne and Bosko Radivojevic, who pointed out that I probably need to set the configure-time option --with-default-path, so I did this (rather than make symlink messes, which I'd prefer to avoid) : 1489 ./configure --with-default-path=/bin:/usr/bin:/opt/local/bin --prefix=/opt/local --with-random=/dev/random 1490 make 1491 make install 1492 pkill -TERM
1999 Aug 19
1
[RHSA-1999:029-01] Denial of service attack in in.telnetd
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Denial of service attack in in.telnetd Advisory ID: RHSA-1999:029-01 Issue date: 1999-08-19 Updated on: Keywords: telnet telnetd Cross references: --------------------------------------------------------------------- 1. Topic: A denial of service attack has been fixed in
2002 Jul 12
4
tftp-hpa 0.28, 0.29 interoperability problem
Hi, I have a tftp client which loads quite happily from a tftpd built from netkit-tftp-0.16 but which fails to load from from a tftpd built from tftp-hpa 0.29. In both cases, tftpd was built from pristine sources and run from xinetd under Redhat 7.3. [netkit-tftp-0.16 is the ancestor of tftp-hpa, predating HPA's maintenance of same] [the tftp client also.. .. fails with the prebuilt tftpd
1996 Nov 25
0
LSF Update#14 v1.2 "lpr vulnerability"
-----BEGIN PGP SIGNED MESSAGE----- $Id: lpr-vulnerability-0.6-linux,v 1.2 1996/11/25 22:39:20 alex Exp $ Linux Security FAQ Update lpr Vulnerability Mon Nov 25 16:56:59 EST 1996 Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu) CIS Laboratories
2006 May 10
4
validates_uniqueness_of and create atomicity
Hi folks, I have a question regarding validates_uniqueness_of, and similar before-filter-like events attempting to guarantee some DB state prior to modification. >From my reading of ActiveRecord, validate_uniqueness_of appears to cause a SELECT on the underlying table attempting to ensure that a record with ID(s) specified in the validates_uniqueness_of statement is not already present, prior
2013 May 09
0
Rmre 0.0.7 released
Rmre version 0.0.7 has been released! Rmre is utility gem for creating Ruby on Rails, at the moment only ActiveRecord, models for legacy databases. Besides creating all models it sets proper table name and primary key if tables and columns naming doesn''t follow Rails convention. It also tries to read all foreign keys data from a database if DBE is MySql, PostgreSQL, Oracle or MS
2008 Aug 01
2
Cisco 7970, CTLSEP<mac>.tlv
I just wanted to post this so that it was out there and Googleable. Hopefully it will save other people a bit of time. If you have a Cisco phone (I was testing with a 7970, though presumably it would affect 7960 and others as well) that is looping trying to fetch the CTL tlv file - it may be because you are using Debians 'tftpd' (should be netkit-tftpd...*cough*hey, Debian
2000 May 19
0
Re: [Security - intern] Re: ssh and chroot...
Good call - I forgot to mention that. Caldera released an advisory a couple months ago about it if anyone's interested: ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-008.0.txt Dave -----Original Message----- From: Thomas Biege [mailto:thomas@suse.de] Sent: Friday, May 19, 2000 2:44 AM To: David LaPorte Cc: Mike Bowie; linux-security@redhat.com Subject: Re: [Security -
2006 Dec 11
2
Nut setup on fedora core 6
Hello. I'm trying to setup NUT on Fedora Core 6 x86_64 and have little problems with it. SELinux is disabled at this time. I have ups - MGE Nova 600 AVR connected on serial port. I've installed nut via yum package manager. Everything it seems to work fine, untill one powerfail. Upsmon detect that system is on battery. But when battery level reached "Battery Low" it seems that
2000 Mar 31
4
anomalous wtmp logging bug
I've noticed rather strange wtmp logging behavior in sshd. Can anyone confirm or solve the following: Once a user authenticates themself to sshd, sshd among other things records the login in the wtmp, which `last` reads. However, sshd logs hostnames which are longer than 16 characters instead of IPs like normal programs would. As a result, I have useless entries such as: tempest
2007 Sep 19
1
pdbedit -P "password history" doesn't work !!
Hi ! This is my firs post here. I've got a problem with password history policy -C 3 which doesn't work !! I set policy pdbedit -P "maximum password age" -C 777600 (90days) pdbedit -P "minimum password age" -C 691200 (80days) "user must logon to change password" -C 2 "password history" -C 3 On clients (XP PRO) some of people
2005 Dec 28
0
update.packages() and loaded packages (PR#8448)
Hello! This is not a severe bug, but an inconsistency in update.packages(). I updated packages and I was not carefull enough to detach loaded packages. The update.packages() warrned me about this, which is fine, but at the end of the update the following warrning was issued (the whole session output can be found at the end of this mail): ... The downloaded packages are in
1997 Jan 12
9
dos-attack on inetd.
Hi. I don''t know if this one is known, but I can''t recall seeing anything about it. If it is old news I apologize. I discovered a bug in the inetd that comes with NetKit-B-0-08 and older. If a single SYN is sent to port 13 of the server, inetd will die of Broken Pipe: write(3, "Sun Jan 12 21:50:35 1997\r\n", 26) = -1 EPIPE (Broken pipe) --- SIGPIPE (Broken pipe) ---
1996 Nov 22
0
LSF Update#14: Vulnerability of the lpr program.
-----BEGIN PGP SIGNED MESSAGE----- $Id: lpr-vulnerability-0.6-linux,v 1.1 1996/11/22 21:42:46 alex Exp $ Linux Security FAQ Update lpr Vulnerability Thu Nov 21 22:24:12 EST 1996 Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu) CIS Laboratories
1996 Nov 21
2
Re: BOUNCE: Re: Chattr +i and securelevel
Alexander O. Yuriev wrote: > > Your message dated: Wed, 20 Nov 1996 18:04:39 EST > > >has anyone played with the securelevel variable in the kernel and the > > >immutable flags in the ext2 file system? > > > > Yes, and its actualy quite nice. > > > > >The sysctrl code seems to allow the setting of the flag > > >only by init (PID=1)
1999 Dec 24
1
Problem with 1.2.1pre19
Hello to all There is some very strange problem in 1.2.1pre19. I can not even log in, I'm always getting message "Permission denied, please try again." Seems like problem in auth-passwd.c or something. I tried to mix pre18 & pre19, but... ;) Bye
2005 Mar 14
1
colinux fresh install, zaptel does not compile, size_t error
Hi, I followed the instructions on http://www.asterisk.org/index.php?menu=download. I picked the latest version using CVS. Things went fine until I cd zaptel ; make clean ; make install. I then get an error when compiling zaptel.c /usr/src/linux/include/linux/kernel.h:75: error: parse error before "size_t" This happens very early on and I suspect that it is actually an issue with the
2012 Dec 04
3
Print properties are not saved
Hi, I'm struggling to get a laser color printer working correctly. At first I wasn't able to save print properties with Ubuntu 10.04. As I read of a bug [1] that affected samba 3.4 up to 3.5.8 I upgraded to ubuntu 12.04 and samba 3.6.3. Now I'm not even able to upload drivers in the way I always did as described in [2] and [3] (Italian). My conf:: [printers] comment = All
1997 Jan 18
0
write(1) leak
Some versions (the util-linux version, but not the netwrite or netkit versions) of /usr/bin/write have a buffer overrun problem that is almost certainly exploitable. Note that this gives access to the tty group, but not (directly) root. The fix is to change the two sprintfs to snprintfs. Patches have been mailed to the maintainer. -- - David A. Holland | VINO project home page: