Showing headlines posted by dave
« Previous ( 1 ... 557 558 559 560 561 562 563 564 565 566 567 ... 595 ) Next »Red Hat alert: Updated mailman packages available
Updated mailman packages are now available for Red Hat Secure Web Server
3.2 (U.S.). These updates resolve a cross-site scripting vulnerability
present in versions of Mailman prior to
Red Hat alert: Updated secureweb packages fix chunked encoding issue
The Apache Web server contains a security vulnerability which can be used
to launch a denial of service attack, or in some cases, allow remote code
execution. Red Hat Secure Web server is based on the Apache Web server and
the secureweb package has been updated to fix this denial of service
vulnerability.
Slackware alert: New OpenSSH packages available
"While testing for Oracle vulnerabilities, Mark Litchfield discovered a
denial of service attack for Apache on Windows. Investigation by the
Apache Software Foundation showed that this issue has a wider scope, which
on some platforms results in a denial of service vulnerability, while on
some other platforms presents a potential a remote exploit vulnerability."
SuSE alert: More information on the OpenSSH vulnerability
ISS and the OpenSSH team just released advisories concerning the
OpenSSH vulnerability.
Debian alert: Unknown OpenSSH remote vulnerability
This advisory is an update to DSA-134-2: the changes mainly deal with
packaging issues; if you have already successfully installed an
openssh package from a previous DSA-134 advisory you may disregard
this message.
SuSE alert: OpenSSH
There's a new vulnerabilty in the OpenSSH daemon, of which we were notified yesterday.
Debian alert: Unknown OpenSSH remote vulnerability
This advisory is an update to DSA-134-1: some extra information is
provided on broken or changed functionality in this new release and
packages for Debian GNU/Linux 2.2/potato are now available.
SuSE alert: OpenSSH Vulnerability
There's a new vulnerabiltiy in the OpenSSH daemon. The OpenSSH/OpenBSD
team does not release any details concerning this issue, except:
Mandrake alert: openssh update
Details of an upcoming OpenSSH vulnerability will be published early next week. According to the OpenSSH team, this remote vulnerability cannot be exploited when sshd is running with privilege separation. The priv separation code is significantly improved in version 3.3 of OpenSSH which was released on June 21st. Unfortunately, there are some known problems with this release; compression does not work on all operating systems and the PAM support has not been completed. The OpenSSH team encourages everyone to upgrade to version 3.3 immediately and enable privilege separation.
Debian alert: OpenSSH remote vulnerability
Theo de Raadt announced that the OpenBSD team is working with ISS
on a remote exploit for OpenSSH (a free implementation of the
Secure SHell protocol). They are refusing to provide any details on
the vulnerability but instead are advising everyone to upgrade to
the latest release, version 3.3.
Mandrake alert: apache update (revised)
[ Please note that this advisory supersedes the previous MDKSA-2002:039 and MDKSA-2002:039-1 advisories. ] MandrakeSoft is urging all users of Mandrake Linux to update their Apache installations immediately. What was previously thought to have been a DoS-only condition has now been proven to be more than that; exploitable conditions have been discovered on both 32bit and 64bit platforms.
Mandrake alert: apache update
A Denial of Service attack was discovered by Mark Litchfield in the Apache webserver. As well, while investigating this problem, the Apache Software Foundation discovered that the code for handling invalid requests that use chunked encoding may also allow arbitrary code to be executed on 64bit architectures. All versions of Apache prior to 1.3.26 and 2.0.37 are vulnerable to this problem. This update provides patched versions of Apache for the remaining supported Mandrake Linux versions.
Debian alert: apache-perl chunk handling vulnerability
Mark Litchfield found a denial of service attack in the Apache
web-server. While investigating the problem the Apache Software
Foundation discovered that the code for handling invalid requests which
use chunked encoding also might allow arbitrary code execution.
Mandrake alert: apache update
A Denial of Service attack was discovered by Mark Litchfield in the Apache webserver. As well, while investigating this problem, the Apache Software Foundation discovered that the code for handling invalid requests that use chunked encoding may also allow arbitrary code to be executed on 64bit architectures. All versions of Apache prior to 1.3.26 and 2.0.37 are vulnerable to this problem. A patched version of Apache is currently available for Single Network Firewall 7.2, with patched versions of Apache soon to be available for the other supported Mandrake Linux versions.
Red Hat alert: Stronghold: Chunked encoding vulnerability in Apache
The Apache Web server contains a security vulnerability which can be used
to launch a denial of service attack, or in some cases, allow remote code
execution.
Red Hat alert: Updated Apache packages fix chunked encoding issue
The Apache Web server contains a security vulnerability which can be used
to launch a denial of service attack, or in some cases, allow remote code
execution.
SuSE alert: Apache
There is a bug in the way the Apache web server handles HTTP requests that use "chunked mode". Chunked mode is a HTTP 1.1 feature that allows a client to send data as a sequence of chunks rather than en bloc. This is useful if it doesn't know the overall length of the content at the time it starts transmitting.
Debian alert: apache-ssl chunk handling vulnerability
Mark Litchfield found a denial of service attack in the Apache
web-server. While investigating the problem the Apache Software
Foundation discovered that the code for handling invalid requests which
use chunked encoding also might allow arbitrary code execution on 64 bit
architectures.
Debian alert: Apache chunk handling vulnerability, update
The DSA-131-1 advisory for the Apache chunk handling vulnerability
contained an error and was missing some essential information:
Debian alert: Apache chunk handling vulnerability
Mark Litchfield found a denial of service attack in the Apache
web-server. While investigating the problem the Apache Software
Foundation discovered that the code for handling invalid requests which
use chunked encoding also might allow arbitrary code execution on 64
bit architectures.
« Previous ( 1 ... 557 558 559 560 561 562 563 564 565 566 567 ... 595 ) Next »