SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   


View Topics  >  Underlying OS  >  Linux (Immunix)

Feb 14 2004   (Immunix Issues Fix) XFree86 Font Information File Buffer Overflow Lets Local Users Gain Root Privileges
Feb 14 2004   (Immunix Issues Fix) XFree86 Font Information File CopyISOLatin1Lowered() Buffer Overflow Lets Local Users Gain Root Privileges
Feb 14 2004   (Immunix Issues Fix) XFree86 Additional Font Information File Buffer Overflows Let Local Users Gain Root Privileges
Dec 14 2003   (Immunix Issues Fix) LFTP Buffer Overflow in Processing HTTP Responses May Allow Remote Code Execution
Nov 27 2003   (Immunix Issues Fix) BIND 8 Negative Cache Poisoning May Cause Denial of Service Conditions
Oct 30 2003   (Immunix Issues Fix) Apache mod_rewrite Contains a Buffer Overflow
Oct 30 2003   (Immunix Issues Fix) Apache mod_alias Contains a Buffer Overflow
Oct 21 2003   (Immunix Issues Fix) Fetchmail Buffer Overflow in Processing Addresses Lets Remote Users Execute Arbitrary Code on the System
Oct 21 2003   (Immunix Issues Fix) Fetchmail Can Be Crashed By Remote Users Sending a Specially Crafted E-mail Message
Oct 1 2003   (Immunix Issues Fix) OpenSSL ASN.1 Parsing Flaws Lets Remote User Crash Applications or Execute Arbitrary Code
Sep 18 2003   (Immunix Issues Fix) Sendmail Prescan Flaw May Let Remote Users Execute Arbitrary Code With Root Privileges
Sep 18 2003   (Immunix Issues Fix) Sendmail Ruleset Buffer Overflow Has Unspecified Impact
Sep 17 2003   (Immunix Issues Revised Fix) OpenSSH buffer_append_space() Error May Let Remote Users Execute Arbitrary Code
Sep 16 2003   (Immunix Issues Fix) OpenSSH buffer_append_space() Error May Let Remote Users Execute Arbitrary Code
Jul 16 2003   (Immunix Issues Fix) 'nfs-utils' Buffer Overflow May Let Remote Users Execute Arbitrary Code
Apr 9 2003   (Immunix Issues Fix) Concurrent Versions System (CVS) Double-Free Bug Lets Remote Users Execute Arbitrary Code on the System
Apr 7 2003   (Immunix Issues Fix) Samba Buffer Overflow in call_trans2open() Function Lets Remote Users Execute Arbitrary Code With Root Privileges
Jan 18 2002   (Immunix Issues Fix) Sudo System Administration Utility May Allow Local Users to Obtain Root Privileges on the Host By Executing Code Via Sendmail
Dec 20 2001   (Immunix Issues Fix) GNU C Library (glibc) Contains Buffer Overflow in Glob() Function That May Be Exploitable By Other Programs
Nov 30 2001   (Immunix Issues Fix) WU-FTPD File Globbing Character Bug Allows Remote Users to Obtain Root-Level Privileges on the Server
Nov 29 2001   (Immunix Issues Fix) WU-FTPD File Globbing Character Bug Allows Remote Users to Obtain Root-Level Privileges on the Server
Oct 20 2001   (Immunix Issues Fix) Re: Linux Kernel Ptrace Flaw Lets Local Users Obtain Root Level Privileges on the Host
Oct 20 2001   (Immunix Issues Fix) Re: Linux Kernel Nested Symlink Dereferencing Flaw Lets Local Users Deny Service to Other Processes on the Host
Oct 18 2001   (Immunix Issues Fix) OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
Oct 18 2001   (Immunix Issues Fix) OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
Oct 18 2001   (Immunix Issues Fix) OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
Sep 6 2001   (Immunix Issues Fix) Re: Multiple Vulnerabilities in Xinetd, Including One that May Allow Remote Users to Execute Arbitrary Code with Root Level Privileges
Aug 27 2001   (Immunix Issues Fix) Sendmail Command Line Debugging Validation Flaw Lets Local Users Execute Arbitrary Code and Gain Root Privileges
Jul 19 2001   (Immunix Issues Fix) Re: Squid Proxy Caching Server Lets Remote Users Conduct Portscans Against Other Hosts Via the Squid Server in Certain Configurations
Jul 5 2001   (Immunix Issues Fix) LPRng Print Spooler Can Give Local Users Access to Certain Groups on the Host
Jun 30 2001   (Immunix Issues Supplementary Fix) RedHat's Xinetd Networking Daemon Package May Allow Remote Users to Execute Arbitrary Code as Root and Allow Local Users to Modify System Files
Jun 28 2001   (Immunix Issues Fix) Rxvt X-Windows Terminal Emulator Lets Local Users Obtain utmp Group Privileges
Jun 27 2001   (Immunix Issues Fix) Samba Common Internet File System (CIFS) Lets Remote Users Obtain Root Level Access
Jun 22 2001   (Immunix Issues a Fix) Re: ispell Spell Checker Package Allows Local Users to Overwrite Files on the System
Jun 13 2001   (Immunix Has Released a Fix) Re: RedHat's Xinetd Networking Daemon Package May Allow Remote Users to Execute Arbitrary Code as Root and Allow Local Users to Modify System Files
Jun 2 2001   (Immunix Releases Fix) Re: MIT's FTP Server Distributed With Kerberos 5 Allows Remote Users to Gain Root Level Access to the Server
Jun 2 2001   (Immunix Releases Fix) Re: GnuPG Public Key Encryption Program Can Execute Remotely Supplied Arbitrary Code During File Decryption
Jun 2 2001   (Immunix Releases Fix) Re: Red Hat's Man Utility Allows Local Users to Obtain Additional Group Privileges
May 18 2001   (Immunix Releases Fix) Re: Minicom Communications Program for Unix/Linux May Allow Local Users to Shutdown the System or Obtain Root Level Access
May 8 2001   (Immunix Releases a Fix) Re: GNU Privacy Guard (GnuPG) Encryption Software Is Vulnerable to Obscure Attack on the DSA and RSA Algorithms That Could Allow An Attacker to Decode the User's Secret Key
Apr 28 2001   (Immunix Releases Fix) Re: gFTP Client May Allow Remote FTP Servers to Cause the FTP Client to Execute Arbitrary Code on the User's Host
Apr 18 2001   (Immunix Releases Fix) Re: Samba SMB Networking Software Allows Local Users to Destroy Data on Local Devices
Apr 17 2001   (Immunix Releases Fix) Re: Netscape 4.76 Browser May Execute Arbitrary Javascript Code that Could Disclose Recently Visited Web URLs
Apr 7 2001   (Immunix Patch Available) Re: The Network Time Protocol Daemon (ntpd) Allows Remote Users to Execute Arbitrary Code on the Server - Typically to Gain Root Privileges on the Server







Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC