Home Search

ccd - search results

If you're not happy with the results, please do another search

SuSE Linux announcement: sudo

SuSE: "Sudo contains a heap overflow in its prompt assembling function. The input used to create the password prompt ...

Mandrake Linux security advisory: sudo

Mandrake: "A problem was discovered by fc, with further research by Global InterSec, in the sudo program with the password prompt parameter (-p). ...

Trustix: ‘zlib’ Denial of Service vulnerability

Trustix: "zlib version 1.1.3 and lower contains a vulnerability which, in a worst case scenario, might allow an attacker to execute arbitrary code. This...

Mandrake: ‘cups’ Remote buffer overflow vulnerability

Author: JT Smith Mandrake: "There is a potential buffer overflow vulnerability in CUPS when reading the names of attributes. This bug affects all versions...

Mandrake: ‘groff’ Buffer overflow

Author: JT Smith Mandrake: "zen-parse discovered an exploitable buffer overflow in groff's preprocessor. If groff is invoked using the LPRng printing system, an attacker...

Mandrake: ‘gzip’ vulnerability

Author: JT Smith Mandrake: "There are two problems with the gzip archiving program; the first is a crash when an input file name is over...

Mandrake: ‘at’ Heap corruption vulnerability

Author: JT Smith Mandrake: "en-parse discovered a problem in the at command containing an extra call to free() which can lead to a segfault with...

Mandrake: mutt buffer overflow

Author: JT Smith Mandrake: "Joost Pol reported a remotely exploitable buffer overflow in the mutt email client. It is recommended that all mutt users...

Mandrake: Security update to bind

Author: JT Smith Mandrake: "There are some insecure permissions on configuration files and executables with the bind 9.x packages shipped with Mandrake Linux 8.0 and 8.1....

Security update to namazu

Author: JT Smith Red Hat: "Updated namazu packages are available for Red Hat Linux 7.0J. These packages fix cross-site scripting vulnerability."From: bugzilla@redhat.com To: redhat-watch-list@redhat.com Subject: Updated...