Displaying 20 results from an estimated 8000 matches similar to: "[RHSA-1999:055-01] Denial of service attack in syslogd"
1999 Nov 18
2
md5,des etc..
Hoping that this is not OT..
Hi
I want to write a simple perl script to see if my system supports des or md5
as the password encryption scheme..what is the easiest way..
one of course is to look at the /etc/shadow file and then parsing the passwd
field, any better way..??
Thx,
Arni
2005 Jan 14
3
Bug#290511: logcheck: syslogd restart in cron.daily/sysklogd causes a log message
Package: logcheck
Version: 1.2.32
Severity: wishlist
/etc/cron.daily/sysklogd restarts syslogd at the end of the script.
This causes a daily log message, currently missed by logcheck:
Jan 14 06:55:22 pyloric syslogd 1.4.1#16: restart (remote reception).
I'm currently using this regex in ignore.server.d/local-syslogd:
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ syslogd 1\.4\.1#16: restart \(remote
1999 Nov 23
0
DoS with sysklogd, glibc (Caldera) (fwd)
Hi,
This advisory has a bit more than the Red Hat one....
Roger.
----- Forwarded message from Alfred Huger -----
>>From owner-bugtraq@SECURITYFOCUS.COM Mon Nov 22 18:49:41 1999
Approved-By: aleph1@SECURITYFOCUS.COM
Message-ID: <Pine.GSO.4.10.9911220906250.11753-100000@www.securityfocus.com>
Date: Mon, 22 Nov 1999 09:08:08 -0800
X-Reply-To: Alfred Huger
1999 Aug 19
1
[RHSA-1999:029-01] Denial of service attack in in.telnetd
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Denial of service attack in in.telnetd
Advisory ID: RHSA-1999:029-01
Issue date: 1999-08-19
Updated on:
Keywords: telnet telnetd
Cross references:
---------------------------------------------------------------------
1. Topic:
A denial of service attack has been fixed in
1999 Mar 31
0
Forw: SECURITY: various packages updated (pine, mutt, sysklogd, zgv)
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
2000 Jul 06
0
[RHSA-2000:042-01] BitchX denial of service vulnerability
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: BitchX denial of service vulnerability
Advisory ID: RHSA-2000:042-01
Issue date: 2000-07-06
Updated on: 2000-07-06
Product: Red Hat Powertools
Keywords: DoS
Cross references: N/A
2010 Nov 26
1
rsyslog as default syslog daemon?
Hi all!
Is anybody here using rsyslog? I am looking for the right solution how
to use rsyslog in CentOS 5 as the default logging daemon. We use it
because of filtering using regular expressions.
I switched from sysklogd to rsyslog simply using
chkconfig --del syslog
chkconfig --add rsyslog
chkconfig rsyslog on
service syslog stop
service rsyslog start
but this seems not to be
2006 Nov 17
1
Problem with SeLinux and syslogd
Hello!
on my centos 4.4 i have enable selinux, but after this change syslogd
can't no more run:
# /etc/init.d/syslog restart
Shutting down kernel logger: [ OK ]
Shutting down system logger: [FAILED]
Starting system logger: syslogd: error while loading shared libraries:
libc.so.6: cannot open shared object file: No such file or
2003 Apr 11
1
Syslogd / rc
Just updated our syslog server to 4.8-STABLE #0: Mon Apr 7 09:39:27 EDT 2003
In my rc.conf I have:
# fgrep syslog /etc/rc.conf
syslogd_program="/usr/local/sbin/syslog-ng"
syslogd_flags=""
Syslog-ng starts up appropriately; but syslogd also tries to start now. Since
the port's already in use, rc hangs during boot until I ctrl-c at that point.
Perhaps something's not
2004 Jun 04
3
syslogd(8) Dropping Privs
I made a quick change to syslogd(8) so that it can drop root
privileges immediately after starting up. It opens up the log
sockets (UNIX and network domains) and writes the PID files
before dropping privs. It drops privs before openning log
files and writing to users. Therefore, you would need to
modify your log file permissions appropriately. As for writing
to users, ttys generally are writeable
1999 Jul 22
0
[RHSA-1999:022-01] New Samba packages available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Samba packages for Red Hat Linux 4.2, 5.2, 6.0
Advisory ID: RHSA-1999:022-01
Issue date: 1999-07-22
Updated on:
Keywords: samba smbd nmbd security
Cross references:
---------------------------------------------------------------------
1. Topic:
Samba 2.0.5a has
1999 Jul 23
0
[RHSA-1999:022-02] New Samba pacakges available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New samba packages for Red Hat Linux 4.2, 5.2, 6.0
Advisory ID: RHSA-1999:022-02
Issue date: 1999-07-22
Updated on: 1999-07-23
Keywords: samba smbd nmbd security
Cross references:
---------------------------------------------------------------------
Revision History:
2003 Jun 12
1
Serial Ports and syslogd
Hello,
It's a bit off topic, but I'm hoping someone has seen this before. I'm running a couple of headless boxes, one is 4.7 release, the other is 4.8 release. Both have the same issue with newsyslog when I've got the serial port enabled for console management. (-h in boot.conf and a getty running on cuaa0 after the boot process)
Logrotate tries to send an HUP to syslogd, but
1999 Jul 29
0
[RHSA-1999:022-03] New Samba pacakges available (updated)
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New samba packages for Red Hat Linux 4.2, 5.2, 6.0
Advisory ID: RHSA-1999:022-02
Issue date: 1999-07-22
Updated on: 1999-07-29
Keywords: samba smbd nmbd security
Cross references:
---------------------------------------------------------------------
Revision History:
2006 Aug 25
1
SELinux targeted - named, portmap and syslogd errors
Yesterday I activated SELinux in targeted mode, then I rebooted and started
receiving some error messages in the system services initialization:
======================================================================
audit(1156518721.252:2): avc: denied { read } for pid=2223 comm="syslogd"
name="libc-2.3.4.so" dev=dm-0 ino=50441 scontext=user_u:system_r:syslogd_t
2019 Oct 01
1
Re: [NBDKIT SECURITY] Denial of Service / Amplification Attack in nbdkit
On 9/20/19 8:58 AM, Eric Blake wrote:
> On 9/12/19 12:41 PM, Richard W.M. Jones wrote:
>> We have discovered a potential Denial of Service / Amplification Attack
>> in nbdkit.
>
> Unfortunately, our fix for this issue cause another potential Denial of
> Service attack:
>
>>
>> Lifecycle
>> ---------
>>
>> Reported: 2019-09-11 Fixed:
2003 Feb 22
1
simlinks and options
Greetings.
I wrote a script that make remote backups with rsync. I have 2 main
problems with it
1) I want that the destination directory (on the repository machine)
recreate the backed up file path and it permission (I use -R here )
2) Is there a way to "follow" all the links using -R and -a parameters..??
Currently I am using something like this.
rsync -al --delete
1999 Aug 26
2
[RHSA-1999:030-01] Buffer overflow in cron daemon
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in cron daemon
Advisory ID: RHSA-1999:030-01
Issue date: 1999-08-25
Updated on:
Keywords: vixie-cron crond MAILTO
Cross references:
---------------------------------------------------------------------
1. Topic:
A buffer overflow exists in crond, the cron
2013 May 30
0
Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0
On Tue, May 28, Richard W.M. Jones wrote:
>
> There's a denial of service attack possible from guests on any program
> that does inspection (eg. virt-inspector, many other virt-* tools,
> virt-v2v, OpenStack).
>
> The attack causes the host process to crash because of a double free.
> It's probably not exploitable (definitely not on Fedora because of the
>
2013 May 31
1
Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0
On Fri, May 31, 2013 at 01:03:24AM +0200, Olaf Hering wrote:
> #2 0x00007ffff7b7936c in guestfs___safe_strdup (g=0x65da50, str=0x0) at alloc.c:96
> #3 0x00007ffff7b8b65e in parse_suse_release (filename=<optimized out>, fs=<optimized out>, g=<optimized out>) at inspect-fs-unix.c:343
This is a different problem:
lines = guestfs_head_n (g, 10, filename);
if (lines ==