similar to: Qpop CERT advisory?

Displaying 20 results from an estimated 5000 matches similar to: "Qpop CERT advisory?"

1999 Apr 28
2
smbmount doesn't work
Hi, Thanks for answering my question on the new smbmount not working. I tried all variety of combinations on the commands you suggested, but they all simply do this: % smbmount -c //server/share 'mount /mnt/samba-share -n CLIENT -U user' Usage: smbmount service <password> [-p port] [-d debuglevel] [-l log] Version 2.0.3 -p port connect to the specified port
1998 Jun 19
16
WARNING: Break-in attempts
Greetings all, I''m forwarding a copy of an email I sent reporting attempted break-ins on my main server, earth.terran.org. I am forwarding this because I think it is relevant that folks watch for this kind of activity in their logs to catch people who "try doorknobs" in the middle of the night. After sending this email, I sent a talk request to the user, who was still logged
1999 Apr 28
4
Installation Help, Please !!!
I have been having some difficulty with the installation of samba V2.0.3 on an ultraSparc 3000 server. I was able to get it built, I have configured, defined an smb.conf file, created an smbpasswd file, and I still get errors when I work through the Diagnosing Samba checklist. BTW, I have checked the conf file using testparms and corrected the problem mentioned there! I am using the newest source
2008 Aug 13
1
migrating from specialized qpopper
I'm hoping to migrate to dovecot from qpopper, with the eventual goal of enabling IMAP. However, my qpopper installation is fairly specialized, so I thought I'd ask here to see if anyone could get me headed down the best path. Here's the situation. I'm running FreeBSD and have a virtual domains setup with an extremely hacked LDA to do delivery to mailboxes within hashed
1997 Apr 07
1
Is qpopper vulnerable?? Re: CERT Advisory CA-97.09 - Vulnerability in IMAP and POP
I''ve got qualcomm''s qpopper2.2, and am not sure if its vulnerable. The advisory mentions pop and imap servers, but only says: version of IMAP (Section B). If your POP server is based on the University of Washington IMAP server code, you should also upgrade to the latest version of IMAP. Until you can take one of these actions, I installed the new imapd about 3
1999 Apr 27
1
Failed Logins (ntang@rga.com)
Nicholas: Regarding your problem: "The SGI server is only serving files, no home directories, no printers (we have separate NT servers for each of those functions), and it is using "SERVER" level security. Encryption is on. Guest logins are disabled ... I'm confused greatly by this - one day, a user's login will work, another day, it'll suddenly stop working. "
1999 Sep 20
1
POP secure access??
Hi, I'm looking for a solution to access pop mails (sendmail in linux) securely. Most of the access would be from window clients (outlook express etc). Is there a way to encrypt the password (like ssh2) when authenticating with sendmail? Any info is greatly appereceiated. Thx. Regards, Wong.
1999 Mar 26
2
Re: [Security - intern] *ALERT*: ADM Worm. Worm for Linux x86 found in wild.
On Fri, 26 Mar 1999, Thomas Biege wrote: > Date: Fri, 26 Mar 1999 09:34:10 +0100 (MET) > From: Thomas Biege <thomas@suse.de> > To: Jan-Philip Velders <jpv@jvelders.tn.tudelft.nl> > Cc: linux-security@redhat.com > Subject: Re: [Security - intern] [linux-security] *ALERT*: ADM Worm. Worm for Linux x86 found in wild. > The worm just exploits old security holes, so
1999 Nov 30
0
serious Qpopper 3.0 vulnerability (fwd)
Recieved this email on BugTraq today. Take the necessary precautions. ---------- Forwarded message ---------- Date: Tue, 30 Nov 1999 01:53:11 +0100 From: Mixter <mixter@NEWYORKOFFICE.COM> To: BUGTRAQ@SECURITYFOCUS.COM Subject: serious Qpopper 3.0 vulnerability Greetings, There is a remote buffer overflow in the qpop 3.0 server code that can lead to remote root compromise. Exploit
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional CC to linux-security. By the time I got around to do another "moderation round" this one was the latest. Everyone is keeping good context, so I think you all will be able to follow the discussion. --REW] >>>>> <seifried@seifried.org> writes: >> The only thing I can see coming out
1999 Dec 04
2
confusion over RSAref vul w/OpenSS[HL]
Howdy, The string of notices on BugTraq about RSAref being vulnerable to overflows has me concerned. After trying to sort through all the messages, I can't figure out whether I need to update OpenSSL (a check of their website indicates no new patches), OpenSSH, both, or neither. I am aware there is no known exploit for it yet. I could be a bad boy and just run all
2003 Jul 31
5
Wu-ftpd FTP server contains remotely exploitable off-by-one bug
Hello, I see in BugTraq that there's yet another problem with Wu-ftpd, but I see no mention of it in the freebsd-security mailing list archives...I have searched the indexes from all of June and July. Wu is pretty widely used, so I'm surprised that nobody seems to have mentioned this problem in this forum. The notice on BugTraq mentioned only Linux, not FreeBSD, but that's no
1999 Mar 26
3
*ALERT*: ADM Worm. Worm for Linux x86 found in wild.
-=> To moderator: I don't know whether it's wise to release the FTP-location I would recommend everyone to just look over their daemons, and run something like nessus against theirselves... Greetings, Jan-Philip Velders ---------- Forwarded message ---------- Date: Thu, 25 Mar 1999 16:26:59 -0700 From: "Ben Cantrick (Macky Stingray)" <mackys@MACKY.RONIN.NET> To:
2005 Mar 19
3
[Fwd: IceCast up to v2.20 multiple vulnerabilities]
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hey all, did you happen to see this recent post to bugtraq? If so, I apologize. I haven't been keeping up with the archives since everything has been running so smoothly. ;) - --Stauf - -------- Original Message -------- Subject: IceCast up to v2.20 multiple vulnerabilities Date: 18 Mar 2005 22:31:14 -0000 From: Patrick
2012 Jan 01
11
an actual hacked machine, in a preserved state
(Sorry, third time -- last one, promise, just giving it a subject line!) OK, a second machine hosted at the same hosting company has also apparently been hacked. Since 2 of out of 3 machines hosted at that company have now been hacked, but this hasn't happened to any of the other 37 dedicated servers that I've got hosted at other hosting companies (also CentOS, same version or almost),
2000 Sep 05
7
NMBD Not Starting
I moved an entire RH 6.2 server from one CPU to a new one using a tape backup/restore. Everything from the old server is working on the new server, but when SysV starts up smb, the nmbd daemon (2.0.6) exits with an error: create_subnets: No local interfaces! eth0 has already started according to the logs and console. Any ideas? Thanks. ______________________ Greg Kelley, IT Director SSA, EAA,
2002 Jun 24
2
Upcoming OpenSSH vulnerability
On Mon, Jun 24, 2002 at 03:00:10PM -0600, Theo de Raadt wrote: > Date: Mon, 24 Jun 2002 15:00:10 -0600 > From: Theo de Raadt <deraadt at cvs.openbsd.org> > Subject: Upcoming OpenSSH vulnerability > To: bugtraq at securityfocus.com > Cc: announce at openbsd.org > Cc: dsi at iss.net > Cc: misc at openbsd.org > > There is an upcoming OpenSSH vulnerability that
2002 Jun 24
2
Upcoming OpenSSH vulnerability
On Mon, Jun 24, 2002 at 03:00:10PM -0600, Theo de Raadt wrote: > Date: Mon, 24 Jun 2002 15:00:10 -0600 > From: Theo de Raadt <deraadt at cvs.openbsd.org> > Subject: Upcoming OpenSSH vulnerability > To: bugtraq at securityfocus.com > Cc: announce at openbsd.org > Cc: dsi at iss.net > Cc: misc at openbsd.org > > There is an upcoming OpenSSH vulnerability that
2004 Aug 06
4
icecast security
hello, maybe an outdated question: there was a message on the securityfocus mailing list (bugtraq) today (and several month before) about a remote buffer overflow in icecast v1.3.10 (which seems to be a package in debian). does this affect 1.3.11 too or is the version at http://www.icecast.org/download.html fixed? thanks, uno <p>--- >8 ---- List archives: http://www.xiph.org/archives/
2004 Feb 06
2
Normality Test on several groups
Hi, I use ks.test or lillie.test to verify a normal distribution. It's performed for a group My users use SigmaStat software and a One Way ANOVA on several groups In the result page there is a probability value to determine if Normality test is failed or passed So, how can i retrieve this probability value on several groups? Is there another function in R to verify normality on several