Displaying 20 results from an estimated 8000 matches similar to: "[Linux UID/GID ''Feature'']"
1998 Jul 14
3
Qpop CERT advisory?
Hello,
Anyone have information on whether RedHat-5.0+ is affected by the
recent (today's) CERT advisory regarding QPOP?
thanks,
-bp
--
B. James Phillippe <bryan@terran.org>
Linux Software Engineer, WGT Inc.
http://earth.terran.org/~bryan
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional
CC to linux-security. By the time I got around to do another
"moderation round" this one was the latest. Everyone is keeping good
context, so I think you all will be able to follow the discussion. --REW]
>>>>> <seifried@seifried.org> writes:
>> The only thing I can see coming out
1997 Mar 31
5
UK Encryption ban legislation {from: [comp.risks] RISKS DIGEST 18.95}
I think this is an issue of serious interest to many of the subscribers
of these lists; it would effectively ban a lot of security-related tools
that many of use now find indispensable, e.g. ssh, pgp.
------- Start of forwarded message -------
Date: 21 Mar 1997 10:11:57 GMT
From: rja14@cl.cam.ac.uk (Ross Anderson)
Approved: R.E.Wolff@BitWizard.nl
Subject: DTI proposals on key escrow
The British
1998 May 12
25
Checking remote servers
I''d like to hear some suggestions about securely administering a
system remotely. Here''s the application: a project is going to
scatter some server machines around the US. The server machines will
be running Linux, with the only network servers being a custom
application.
Ignoring the separate question of physical security, how can I
remotely check the system''s
1998 Jul 19
4
IMAPD fix for RH
You probably know this already, but the following notice appeared to bugtraq.
As a side note the protocol on bugtraq seems to be designed to make a fix
available before the announcement by providing one yourself or giving the
maintainer a week's advance warning (M$ gets a lot longer warning and *still*
fails to fix the bugs before bugtraq knows).
Having said that M$ insists on allowing me
1999 Mar 26
3
*ALERT*: ADM Worm. Worm for Linux x86 found in wild.
-=> To moderator:
I don't know whether it's wise to release the FTP-location
I would recommend everyone to just look over their daemons, and run
something like nessus against theirselves...
Greetings,
Jan-Philip Velders
---------- Forwarded message ----------
Date: Thu, 25 Mar 1999 16:26:59 -0700
From: "Ben Cantrick (Macky Stingray)" <mackys@MACKY.RONIN.NET>
To:
1996 Nov 14
1
Security hole in Debian 1.1 dosemu package
In Debian 1.1, the optional DOSEMU package installs /usr/sbin/dos
setuid root. This is a serious security hole which can be exploited
to gain access to any file on the system.
Package: dosemu
Version: 0.64.0.2-9
------- start of cut text --------------
$ cat /etc/debian_version
1.1
$ id
uid=xxxx(quinlan) gid=xxxx(quinlan) groups=xxxx(quinlan),20(dialout),24(cdrom)
[quinlan:~]$ ls -al
1997 Apr 29
9
Yet Another DIP Exploit?
I seem to have stumbled across another vulnerability in DIP. It
appears to allow any user to gain control of arbitrary devices in /dev.
For instance, I have successfully stolen keystrokes from a root login as
follows... (I could also dump characters to the root console)
$ whoami
cesaro
$ cat < /dev/tty1 <------ root login here
bash: /dev/tty1: Permission denied
1998 Jul 14
2
Re: Chrooting bind 8.1.2 under debian 2.0
On Tue, 14 Jul 1998, cfb wrote:
> The main problem seems to be with the way that debian starts bind using
> the script /etc/init.d/bind. I thought it would be really neat to just
> change the #!/bin/sh at the top of the script to something like :
> #!/usr/sbin/chroot /chroot-dns/ /bin/sh
> or
> #!/usr/sbin/chroot /chroot-dns/ /chroot-dns/bin/sh
try changing
1998 Oct 13
5
compare / contrast of linux fw and others
Hi,
I was wondering how a linux box configured as a firewall stacked up
against some of the commercial products like checkpoint-1 and gauntlet.
Can someone direct me to a good book or online doc that compares linux
to some other firewall methods?
Mind you, I''m not talking about a firewall in the classical sense, ie
ip forwarding turned off and used as a proxy, but the typical Linux box
2000 Feb 29
4
ICMP
After the recent attacks on the major servers on the web my ISP has
decided to stop all ICMP messages from his ISP.
I have red the RFCs and it seems that he cant do that... As a result
pings and traceroutes will not work.
I need a friendly person out there to tell me a way to break the news to
him that he has to allow ICMP packets
through his network... any suggestions would be helpfull
[mod:
1998 Sep 01
5
/bin/login problem
I would be surprised if someone hasn''t encountered this already, but I
haven''t found any discussion of the nature of this problem. I run RehHat
5.0. If a user makes a mistake in the login process such as the
following:
login: mistake
password: xxx
Login incorrect!
login: username
password xxxx
bash$
a ps will show, among other things,
2333 /bin/login --mistake.
Since
1999 Jul 28
6
You got some 'splaininn to do Lucy ;-)
We just had a security application vendor come in. We asked about Linux
support and he said that putting a security application on top of an
insecure OS was useless. When I asked what he meant by insecure he replied
that Linux does not have a true Auditing capability - as opposed to HP-UX &
Solaris which they do support. Can anyone explain to me what he was talking
about?
Thanks,
Marty
2003 Jun 18
1
Oops more testing was required....
Oops. Missed one line in the last patch....
Roger.
--
** R.E.Wolff@BitWizard.nl ** http://www.BitWizard.nl/ ** +31-15-2600998 **
*-- BitWizard writes Linux device drivers for any device you may have! --*
* The Worlds Ecosystem is a stable system. Stable systems may experience *
* excursions from the stable situation. We are currently in such an *
* excursion: The stable situation does
1999 Jun 07
2
RedHat 6.0, /dev/pts permissions bug when using xterm (fwd)
[Mod: forwarded from BUGTRAQ -- alex]
---------- Forwarded message ----------
Date: Sun, 6 Jun 1999 19:15:05 +0000
From: noc-wage <wage@IDIRECT.CA>
To: BUGTRAQ@NETSPACE.ORG
Subject: RedHat 6.0, /dev/pts permissions bug when using xterm
Once again I''ve come up with another trivial Denial of Service flaw,
(wow,
I seem to be good at this Conseal Firewall, +++ath0, ppp byte-stuffing)
1999 Jun 04
0
Forw: 2.2.x kernel vulnerability
below.
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1998 Jun 30
1
Patched Qpopper2.5 release Notification. (fwd)
Hi,
well, swift response!
Qualcomm has a patched qpopper (2.5)
Greetings,
Jan-Philip Velders
<jpv@jvelders.tn.tudelft.nl>
---------- Forwarded message ----------
Date: Mon, 29 Jun 1998 21:43:18 -0700
From: Praveen Yaramada <pyaramad@QUALCOMM.COM>
To: BUGTRAQ@NETSPACE.ORG
Subject: Patched Qpopper2.5 release Notification.
Hello Folks,
As you are already aware that qpopper
1997 Mar 24
1
More sendmail problems... Partition your disks!
This is yet-another reason to _partition_ your disks. Of course hard links
do not work accross filesystems. Even thought it is a pain in the neck to do
when installing your operating system, think about separating critical
system files from non-critical and non-system files from system files. I
would say that the following layout is a good place to start:
/
/usr (nosuid,nodev,ro)
/usr/local
1998 Oct 22
0
[Fwd: SVGATextMode 1.8 /tmp race]
Just got this on bugtraq...
Balu
-------- Original Message --------
Subject: SVGATextMode 1.8 /tmp race
Date: Thu, 21 Oct 1999 23:01:34 +0300
From: Adrian Voinea <root@DEATH.GDS.RO>
Reply-To: Adrian Voinea <root@DEATH.GDS.RO>
To: BUGTRAQ@NETSPACE.ORG
Hello,
savetextmode, a utility that comes with SVGATextMode 1.8, saves the text
mode data in /tmp, in two files with the mode 644:
1997 Nov 14
0
Linux IP fragment overlap bug (fwd)
---------- Forwarded message ----------
Received: from brimstone.netspace.org (brimstone.netspace.org [128.148.157.143]) by blues.jpj.net (backatcha) with ESMTP id CAA13949; Fri, 14 Nov 1997 02:08:13 -0500 (EST)
Received: from unknown@netspace.org (port 25452 [128.148.157.6]) by brimstone.netspace.org with ESMTP id <818-20257>; Fri, 14 Nov 1997 01:41:22 -0500
Received: from NETSPACE.ORG by