Displaying 20 results from an estimated 700 matches similar to: "[MOD] About "Security concern""
1997 Jul 31
0
Re: Attack feeling ??
Your message dated: Thu, 31 Jul 97 17:34:01 +0200
> * Drop source routes pakets
Drop packets that have a source route flag set. This stops simpliest
redirection attacks and should be always set to yes.
> * always defragment
Reassemble packet from fragments first and only after that apply firewalling
rulesets. Unless you have a really good reason not to do this ( and I am yet
to hear
1997 Sep 16
8
Re: Security Concern..
[Mod: This message is a reason *why* linux-security is moderated list. This
is also a reason why Rogier, myself, Alan Cox and others really do not want
to have completely open lists that deal with security related aspects of
running a system as way too many people just jump to conclusions and give
suggestions without doing any reasearch on a subject. -- alex (co-moderator
of
1997 May 29
1
Vulnerability of suid/sgid programs using libXt
-----BEGIN PGP SIGNED MESSAGE-----
Buffer overflow in the resource handling code of the libXt (X11R6)
Thu May 29, 1997
Distribution of this document is unlimited
Copyright (C) Alexander O. Yuriev (alex@yuriev.com)
Net Access
Abstract
A buffer overflow was found in the resource handling
1997 Sep 16
0
Re: Re: Security Concern..
In message <199709161652.MAA31468@ding.mailhub.com>, "Alexander O. Yuriev" writ
es:
>
> [Mod: This message is a reason *why* linux-security is moderated list. This
> is also a reason why Rogier, myself, Alan Cox and others really do not want
> to have completely open lists that deal with security related aspects of
> running a system as way too many people just jump
1997 Feb 24
0
ADMIN: Change of address
-----BEGIN PGP SIGNED MESSAGE-----
As I am sure you noticed from my messages to linux-{security|alert}, I have
changed my primary email address from alex@bach.cis.temple.edu to
alex@yuriev.com. Linux Security WWW will be moved from bach.cis.temple.edu
in the nearest future and while I will continue to mirror pages to make them
accessible at http://bach.cis.temple.edu/linux/linux-security/, please
1998 Apr 11
0
Linux libc5.4.33 dumbness w/ mk[s]temp()
Linux libc5.4.33''s mk[s]temp() functions require 6 X''s at the end of
a filename (the BSD versions I''ve seen are a bit more flexible). This alone
is enough to break any claims to real BSD compatability, but wait, there''s
more:
Only 1 of those 6 X''s are really unique. The rest are simply pid.
So you can create exactly 62 temp files using mk[s]temp()
1998 May 09
4
Apparent SNMP remote-root vulnerability.
I just had a remote root break-in on my machine (x86 running Red Hat Linux
5.0 with all the updates except for kernel-2.0.32-3) this morning at
06:03:28 EDT. From what I''ve been able to gather, it appears to have been
through snmpd, which I missed when I was weeding out unused daemons.
Sorry for the feeble message, but all I know (or at least strongly
suspect) is that there''s a
1997 Mar 24
1
More sendmail problems... Partition your disks!
This is yet-another reason to _partition_ your disks. Of course hard links
do not work accross filesystems. Even thought it is a pain in the neck to do
when installing your operating system, think about separating critical
system files from non-critical and non-system files from system files. I
would say that the following layout is a good place to start:
/
/usr (nosuid,nodev,ro)
/usr/local
1996 Nov 22
0
LSF Update#14: Vulnerability of the lpr program.
-----BEGIN PGP SIGNED MESSAGE-----
$Id: lpr-vulnerability-0.6-linux,v 1.1 1996/11/22 21:42:46 alex Exp $
Linux Security FAQ Update
lpr Vulnerability
Thu Nov 21 22:24:12 EST 1996
Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu)
CIS Laboratories
1996 Nov 21
2
Re: BOUNCE: Re: Chattr +i and securelevel
Alexander O. Yuriev wrote:
>
> Your message dated: Wed, 20 Nov 1996 18:04:39 EST
> > >has anyone played with the securelevel variable in the kernel and the
> > >immutable flags in the ext2 file system?
> >
> > Yes, and its actualy quite nice.
> >
> > >The sysctrl code seems to allow the setting of the flag
> > >only by init (PID=1)
1999 Dec 13
0
SUMMARY: IMAP security across the net
Since the number of responses to my query was large, Roger has asked
me to summarise the information.
The summary is listed below
Thanks to all the people who bothered to help me out:
Alan Mead <adm@ipat.com>
Beattie, Jay <JBeattie@accdir.com>
Bruce Elrick <bruce.elrick@saltus.ab.ca>
Christian Hammers <ch@lathspell.westend.com>
David J. M. Karlsen
1997 May 26
1
FYI: Possible information disclosure in cfingerd.
Hi,
This is FYI. Lets not start discussion on a topic of "my fingerd is
better than yours".
Alex
------- Forwarded Message
Return-Path: owner-bugtraq@NETSPACE.ORG
Message-ID: <199705240145.WAA11413@morcego.linkway.com.br>
Date: Fri, 23 May 1997 22:45:04 -0300
Reply-To: Rodrigo Barbosa <rodrigob@MORCEGO.LINKWAY.COM.BR>
Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
1997 Mar 23
0
ADMIN: undeliverable email
Hi,
This is just a pre-warning. I am in a process of implementing a
filter that would automatically unsubscribe email addresses that cause
permanent delivery errors, mostly user-unknown.
Addresses that return "host unknown" and similiar will be placed
into removal queue for 1 week from which they would be removed upon
successful delivery. Otherwise, if after 1 week the error does not
1997 Mar 24
0
Re: [linux-alert] More sendmail problems... Partition your disks!
[Mod: redirected to linux-security --alex]
On Mon, 24 Mar 1997, Alexander O. Yuriev wrote:
>This is yet-another reason to _partition_ your disks. Of course hard links
>do not work accross filesystems. Even thought it is a pain in the neck to do
>when installing your operating system, think about separating critical
>system files from non-critical and non-system files from system
1996 Nov 18
0
New moderator, linux-alert lists'' consolidation.
-----BEGIN PGP SIGNED MESSAGE-----
The linux-alert-digest list has now been consolidated with the
linux-alert list.
There wasn''t nearly enough traffic on the linux-alert list to justify
its having a separate digest list; subscribers to linux-alert-digest
tended to receive the same number of e-mail messages as subscribers to
linux-alert, only with an additional time lag of up to a
1996 Nov 25
0
LSF Update#14 v1.2 "lpr vulnerability"
-----BEGIN PGP SIGNED MESSAGE-----
$Id: lpr-vulnerability-0.6-linux,v 1.2 1996/11/25 22:39:20 alex Exp $
Linux Security FAQ Update
lpr Vulnerability
Mon Nov 25 16:56:59 EST 1996
Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu)
CIS Laboratories
1999 Jun 04
0
Forw: 2.2.x kernel vulnerability
below.
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1997 Dec 17
0
userv - how to make cron (et al) not setuid
[Mod: chat removed -- alex]
From: userv-maint@chiark.greenend.org.uk (Ian Jackson)
Approved: alex@yuriev.com
To: linux-security@redhat.com
Subject: userv - how to make cron (et al) not setuid
0. Introduction
Some time ago I posted on linux-security to say that I was working on
a client/server pair which would allow you to invoke a privileged
service in a more secure manner. I''ve now
1998 Jan 07
0
FYI: Apache security advisory
[Mod: headers removed -- alex]
------- Forwarded Message
Reply-To: Marc Slemko <marcs@ZNEP.COM>
Sender: alan@cymru.net
From: Marc Slemko <marcs@ZNEP.COM>
Approved: alex@yuriev.com
Subject: Apache security advisory
X-To: apache-announce@apache.org
To: BUGTRAQ@NETSPACE.ORG
[ Copies of this are being sent to BUGTRAQ, apache-announce,
comp.infosystems.www.servers.unix, and
2016 Apr 19
0
multiboot.mod and module.mod missing in grub-efi-arm64
Hallo,
I am currently installing XEN on an ARM64 EFI machine. (Debian
Testing), Therefore, I installed the following packages:
__________________________________________________________________
root at armbox:/etc# dpkg -l "xen*" | awk '/^ii/ {print $2 "\t\t" $3}'
xen-hypervisor-4.6-arm64 4.6.0-1+nmu2
xenstore-utils 4.6.0-1+nmu2
root at