Displaying 20 results from an estimated 40000 matches similar to: "Re: RedHat 5.X Security Book"
1998 Jul 14
3
Qpop CERT advisory?
Hello,
Anyone have information on whether RedHat-5.0+ is affected by the
recent (today's) CERT advisory regarding QPOP?
thanks,
-bp
--
B. James Phillippe <bryan@terran.org>
Linux Software Engineer, WGT Inc.
http://earth.terran.org/~bryan
1998 Jul 01
4
Serious Linux 2.0.34 security problem (fwd)
---------- Forwarded message ----------
Date: Tue, 30 Jun 1998 15:10:47 +0800
From: David Luyer <luyer@UCS.UWA.EDU.AU>
To: BUGTRAQ@NETSPACE.ORG
Subject: Serious Linux 2.0.34 security problem
I just saw this mentioned on linux-kernel and confirmed it;
#include <fcntl.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
int main(int
1998 Jun 06
21
Named update for RH 4.2 exploitable?
Someone I was speaking with this evening claimed they have installed the
latest named rpms yet they are still getting exploited daily and being
hacked. Do the latest rpm''s for the named 4.9.x stuff fix all the root
exploits or is this person just an idiot who probably has holes elsewhere in
the system?
2005 Jul 21
7
FW: Adding OpenBSD sudo to the FreeBSD base system?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I really do not agree with adding it to the base system.
Just because you guys use sudo does not mean other people do.
In fact many people do not have a use for sudo at all.
Not every one gives out root accounts. You are only adding another utility
In that can possibly be used to escalate privileges.
Every time I secure a system I spend some time
1998 Aug 25
1
Named Overflow Concern - SUMMARY (fwd)
George Brown sent this to my private Email address instead of to the
list. Because I forwarded it, my addres is in the header.
Roger.
----- Forwarded message from root -----
>From root@bull.bullnet.co.uk Mon Aug 24 16:20:29 1998
Received: from dutepp0.et.tudelft.nl
by rosie.BitWizard.nl (fetchmail-4.2.9 POP3 run by wolff)
for <wolff@localhost> (single-drop); Mon Aug 24
2012 Jan 01
11
an actual hacked machine, in a preserved state
(Sorry, third time -- last one, promise, just giving it a subject line!)
OK, a second machine hosted at the same hosting company has also apparently
been hacked. Since 2 of out of 3 machines hosted at that company have now
been hacked, but this hasn't happened to any of the other 37 dedicated
servers that I've got hosted at other hosting companies (also CentOS, same
version or almost),
2004 Aug 06
2
quelques questions à propos d'icecast et autres outils associés...
bonjour, hello, buenas dias,
ça ne fait pas longtemps que je suis sur cette mailing list, J'éspére que
quelqu'un parle le français car techniquement je suis pas doué ni en anglais
ni en d'autres langues...
it isn't a long time i 'm on the mailing list, i hope someone is speaking
french, because i don't write very well others languages about technical
probléms...
no
2006 Jun 27
2
Mauchly and Levene
Hallo!
I just started working with R to do the statistical analyses for my diploma thesis.
I got two sets of data.
Both contain repeated measures.
One has only one within-subject factor with four levels.
The other has one within-subject factor with two levels and one between-factor with two levels.
I want to compute a Mauchly test for both sets and a Levene test for the second set.
I
2004 Feb 19
2
traffic normalizer for ipfw?
Hi there,
Is there some way to configure ipfw to do traffic
normalizing ("scrubbing", as in ipf for OpenBSD)? Is
there any tool to do it for FreeBSD firewalling?
I've heard that ipf was ported on current, anything
else?
TIA,
/Dorin.
__________________________________
Do you Yahoo!?
Yahoo! Mail SpamGuard - Read only the mail you want.
http://antispam.yahoo.com/tools
1999 Mar 26
2
Re: [Security - intern] *ALERT*: ADM Worm. Worm for Linux x86 found in wild.
On Fri, 26 Mar 1999, Thomas Biege wrote:
> Date: Fri, 26 Mar 1999 09:34:10 +0100 (MET)
> From: Thomas Biege <thomas@suse.de>
> To: Jan-Philip Velders <jpv@jvelders.tn.tudelft.nl>
> Cc: linux-security@redhat.com
> Subject: Re: [Security - intern] [linux-security] *ALERT*: ADM Worm. Worm for
Linux x86 found in wild.
> The worm just exploits old security holes, so
1998 Jun 14
3
What are some programs to use to trace spoofers?
ALL,
Our Primary DNS has been broken into twice in the last week. The first
time it happened I noticed the hacker used named for means of gaining
entry. This guy was good at hiding his/her tracks so we reinstalled the OS
and left a minimum install to see if it was done again. We logged all
goings on from a secure remote machine. We got the hacker''s IP address and
even some of what
2003 Jul 31
5
Wu-ftpd FTP server contains remotely exploitable off-by-one bug
Hello,
I see in BugTraq that there's yet another problem with Wu-ftpd, but I see
no mention of it in the freebsd-security mailing list archives...I have
searched the indexes from all of June and July.
Wu is pretty widely used, so I'm surprised that nobody seems to have
mentioned this problem in this forum.
The notice on BugTraq mentioned only Linux, not FreeBSD, but that's no
1999 Dec 04
2
confusion over RSAref vul w/OpenSS[HL]
Howdy,
The string of notices on BugTraq about RSAref being vulnerable to
overflows has me concerned. After trying to sort through all the
messages, I can't figure out whether I need to update OpenSSL (a
check of their website indicates no new patches), OpenSSH, both, or
neither. I am aware there is no known exploit for it yet.
I could be a bad boy and just run all
1998 Jun 21
3
Question.
For someone that wants to begin securing his or her network. What would be
the starting point ? I guess in sort of a check list format. I mean as of
now Im not administering a network. But in the old company I used to work
for. Security was a big problem there were no polices in place. And in what
ways can one reduce the amount of work it take to keep up with securing and
monitoring a diversed
1998 Jul 15
0
Re: RedHat 5.X Security Book
I think it depends on wat you are using the book for..I myself have been
trying for a long time to find a document that describes basic RedHat and
Linux security, what to look for, inherent dangers etc etc.
So I was overjoyed when I found this book. No, I am not depending on it as
a sole source of information, but the basicis that it covers simply do not
get repeatadly posted to the lists you
1998 Jul 19
4
IMAPD fix for RH
You probably know this already, but the following notice appeared to bugtraq.
As a side note the protocol on bugtraq seems to be designed to make a fix
available before the announcement by providing one yourself or giving the
maintainer a week's advance warning (M$ gets a lot longer warning and *still*
fails to fix the bugs before bugtraq knows).
Having said that M$ insists on allowing me
2005 Mar 19
3
[Fwd: IceCast up to v2.20 multiple vulnerabilities]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hey all,
did you happen to see this recent post to bugtraq? If so, I apologize.
I haven't been keeping up with the archives since everything has been
running so smoothly. ;)
- --Stauf
- -------- Original Message --------
Subject: IceCast up to v2.20 multiple vulnerabilities
Date: 18 Mar 2005 22:31:14 -0000
From: Patrick
2003 Sep 16
9
OpenSSH heads-up
OK, an official OpenSSH advisory was released, see here:
<URL: http://www.mindrot.org/pipermail/openssh-unix-announce/2003-September/000063.html >
The fix is currently in FreeBSD -CURRENT and -STABLE. It will be
applied to the security branches as well today. Attached are patches:
buffer46.patch -- For FreeBSD 4.6-RELEASE and later
buffer45.patch -- For FreeBSD 4.5-RELEASE and
1999 Nov 12
1
[RHSA-1999:054-01] Security problems in bind (fwd)
Woops... this didn't show up here but it did on BugTraq. Questions answered!
--
Chuck Mead, CTO, MoonGroup Consulting, Inc. <http://moongroup.com>
Mail problems? Send "s-u-b-s-c-r-i-b-e mailhelp" (no quotes and no
hyphens) in the body of a message to mailhelp-request@moongroup.com.
Public key available at: wwwkeys.us.pgp.net
----------
1999 Mar 26
3
*ALERT*: ADM Worm. Worm for Linux x86 found in wild.
-=> To moderator:
I don't know whether it's wise to release the FTP-location
I would recommend everyone to just look over their daemons, and run
something like nessus against theirselves...
Greetings,
Jan-Philip Velders
---------- Forwarded message ----------
Date: Thu, 25 Mar 1999 16:26:59 -0700
From: "Ben Cantrick (Macky Stingray)" <mackys@MACKY.RONIN.NET>
To: