similar to: FW: CERT Advisory CA-98.12 - mountd

Displaying 20 results from an estimated 3000 matches similar to: "FW: CERT Advisory CA-98.12 - mountd"

1998 Aug 11
0
Fwd: CERT Advisory CA-98.10 - mime_buffer_overflows
>Date: Tue, 11 Aug 1998 13:21:06 -0400 >From: CERT Advisory <cert-advisory@cert.org> >To: cert-advisory@coal.cert.org >Subject: CERT Advisory CA-98.10 - mime_buffer_overflows >Reply-To: cert-advisory-request@cert.org >Organization: CERT(sm) Coordination Center - +1 412-268-7090 > >-----BEGIN PGP SIGNED MESSAGE----- >
1998 Dec 22
0
CERT Advisory CA-98.13 - TCP/IP Denial of Service (fwd)
The following advisory was issued by CERT yesterday. Because it affects FreeBSD systems as well, we are forwarding it to the appropriate FreeBSD mailing lists. We would like to thanks CERT for cooperation with the FreeBSD security officer on this subject. -----BEGIN PGP SIGNED MESSAGE----- CERT Advisory CA-98-13-tcp-denial-of-service Original Issue Date: December 21, 1998 Last Revised
1999 Nov 11
0
CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND (fwd)
For those who are unaware... [mod: This whole bind affair has gone a bit out of hand. Elias from Bugtraq found "public" info indicating the problem. ISC/CERT were working on releasing the bugfix together with the fix. Now everybody is scurrying to get fixes out now that "the public" knows about this. As far as I know, Red Hat (& Caldera) made a new RPM, based on the most
2003 Aug 13
0
All "GNU" software potentially Trojaned
-----BEGIN PGP SIGNED MESSAGE----- CERT Advisory CA-2003-21 GNU Project FTP Server Compromise Original issue date: August 13, 2003 Last revised: -- Source: CERT/CC A complete revision history is at the end of this file. Overview The CERT/CC has received a report that the system housing the primary FTP servers for the GNU software project was compromised. I. Description
2003 Apr 17
1
[Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
I figured that someone reading this list might want to take a look at the proceeding, considering that the version of Snort in FreeBSD ports -is- affected. -----Forwarded Message----- > From: CERT Advisory <cert-advisory@cert.org> > To: cert-advisory@cert.org > Subject: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors > Date: 17 Apr 2003 11:30:47 -0400
2007 Jun 16
1
Binary packagers: BSD license issues
Adding this SHA256 code made me read the BSD license once again. It says: * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. Then there are a few files from Cyrus as well which contain: * 4. Redistributions of any form
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has gone out on linux-security..... -- REW] -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Has anyone been hit with the Bind Inverse Query Buffer Overrun on their Linux servers? We have had 3 servers attacked using this expoit and all of the machines had several binaries replaced with trojan
2006 Oct 31
0
6417056 nfssrv should use doors/xdr as its IPC mech to mountd(1m)
Author: rmesta Repository: /hg/zfs-crypto/gate Revision: 4af930f29a665f04c4cf91ef1fbc049fb427a304 Log message: 6417056 nfssrv should use doors/xdr as its IPC mech to mountd(1m) Files: create: deleted_files/usr/src/uts/common/rpcsvc/nfsauth_prot.x create: usr/src/cmd/fs.d/nfs/mountd/nfsauth_xdr.c create: usr/src/uts/common/fs/nfs/nfs_auth_xdr.c create: usr/src/uts/common/nfs/auth.h delete:
2002 Mar 13
3
zlib compression, the exploit, and OpenSSH
Attached is a zlib advisory and a debug dump of ssh with compression enabled. Most of the debug is superflous, so I have underlined the two points to look at. When creating an ssh connection, compression on the line is done *before* authentication -- This means an unauthorized attacker could, conceivable, leverage root access by connecting with to the ssh server requesting zlib compression and
1999 Mar 17
0
CIAC Bulletin J-035: Linux Blind TCP Spoofing
Enjoy.... ugh. Dan ____________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N Batavia, IL
2004 Mar 02
2
[PATCH] Force mountd(8) to a specified port.
Hi all, I have a requirement to run NFS read-only in an Internet-facing colocation environment. I am not happy with packet filters alone around rpcbind, call me paranoid, so I just spent the last few minutes cutting this patch. As you are aware, RPC applications can be forced to listen on a known port through the sin/sa argument to bindresvport[_sa](). Why several Linux distributions have this
1996 Sep 19
0
CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= CERT(sm) Advisory CA-96.21 Original issue date: September 19, 1996 Last revised: -- Topic: TCP SYN Flooding and IP Spoofing Attacks - ----------------------------------------------------------------------------- *** This advisory supersedes CA-95:01. *** Two
2003 Jul 18
1
Status of database integration / Willing to help
I a PhD student here at Carnegie Mellon. I have ten years of experience working in C in industry. I am working on a research project here at Carnegie Mellon that needs to integrate a database with mail clients. We are planning to use the IMAP protocol to communicate with the mail client. After I spent some time looking at the code of various IMAP server implementations, I got very interested in
1996 Dec 05
0
NFS/mountd minor bug
This is only a small one and not that serious because remote lusers shouldnt have access to your portmappers at all. However if they do then rpc.mountd gives out more info than is ideal. Viz mount testbox:/usr/lib /mnt mount testbox:/usr/lib failed, reason given by server: Permission denied mount testbox:/usr/libs /mnt mount: testbox:/usr/libs failed, reason given by server: No such file or
2006 Oct 31
0
6417056 nfssrv should use doors/xdr as its IPC mech to mountd(1m) (fix unref)
Author: rmesta Repository: /hg/zfs-crypto/gate Revision: 7413fc53072f4145c1b3ac0e2169234084b4c6ab Log message: 6417056 nfssrv should use doors/xdr as its IPC mech to mountd(1m) (fix unref) Files: create: deleted_files/usr/src/cmd/fs.d/nfs/mountd/svc_local.c delete: usr/src/cmd/fs.d/nfs/mountd/svc_local.c
2009 Dec 18
1
mountd and statd at specific ports - nfs firewall
Hi, I am configuring firewall for NFS. I see that statd and mountd start at random port. Is there any way to force it to start at specific port each time. The '-p ' option would work, but how do I configure it to start at specific port number each time. I mean where do statd and mountd look for default configuration options? Any clues? - CS.
1999 Mar 25
0
(Fwd) DoS for Linux 2.1.89 - 2.2.3: 0 length fragment bug
Pulled from Bugtraq. Dan ____________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N Batavia, IL
2008 Apr 25
2
force glm estimates to be nonnegative
Is there a way to force certain formula parameters to be nonnegative? What I want to do is to estimate student capacity over time, namely by > capacity ~ Student + Student:Day I add this formula to a glm call and obtain negative learning slope estimates (Student:Day) in some cases. However, I don't want to allow for that. In such a case, glm should solve > capacity ~ Student and
2006 Jan 20
1
smbd & rpc.mountd eating up all the cpu
Hello, Don't know what happened, but Samba stopped serving up shares. Top shows 'smbd' using 66% of the cpu and 'rpc.mountd' using 33%. The samba log on shows; [2006/01/19 16:34:54, 0] nmbd/nmbd.c:main(668) Netbios nameserver version 3.0.13-1.1-SUSE started. Copyright Andrew Tridgell and the Samba Team 1994-2004 [2006/01/19 16:40:03, 0]
2001 Apr 04
1
Samba on NT giving "the MOUNTD is not registered" error
Hi I have set up SAMBA on a Mandrake Linux box to share a CD collection to an NT domain. The box shows up in the network browser and the share shows up when you browse the box. But if you try and browse the share you get the error "the MOUNTD server isn't registered" any ideas on how I can rectify this? If I use the smbclient command on the Mandrake box I can log onto the share as