unsubscribe
-
Hot Mobiil - helinad, logod ja piltsõnumid!
http://portal.hot.ee
Seems like again somebody is willing to pay the "donation" to debian?
List-admin ... go ahead :-)
Hi,
this is not exactly a reply to your question, just a general pointer:
whatever you do, don't rely solely on chkrootkit. One woody-box I know
of just recently got cracked, and had the viceroy rootkit installed. It
was a very poorly done rootkit to boot (ls, ps, netstat etc were all
dynamically l
Hi,
Noticed on vil.mcafee.com that a proof of concept exploit for Snort to
exploit the vuln. found in v1.8 through to 1.9.1.
Packet Storm Security have this proof of concept on their site (local
exploit at the moment).
It uses a call-back technique to spawn a shell on the attackers machine,
via a
David Ramsden wrote:
Hi,
Noticed on vil.mcafee.com that a proof of concept exploit for Snort to
exploit the vuln. found in v1.8 through to 1.9.1.
Packet Storm Security have this proof of concept on their site (local
exploit at the moment).
It uses a call-back technique to spawn a shell on the
Il ven, 2003-04-25 alle 11:19, David Ramsden ha scritto:
> Noticed on vil.mcafee.com that a proof of concept exploit for Snort to
> exploit the vuln. found in v1.8 through to 1.9.1.
up to 2.0rc1 as reported by cert
> What's the status of a patch from Debian Security? No DSA yet either.
> I know
On Fri, Apr 25, 2003 at 12:13:38PM +0200, Marcel Weber wrote:
> David Ramsden wrote:
>
[snip]
>
> Following the advice from heise.de [1] it should be enough to comment
> out the line:
>
> preprocessor stream4_reassemble
>
> in your /etc/snort/snort.conf
>
> as the vulnerability is in this mod
- Forwarded message from Marcel Weber <[EMAIL PROTECTED]> -
From: Marcel Weber <[EMAIL PROTECTED]>
To: David Ramsden <[EMAIL PROTECTED]>
Cc: debian-security@lists.debian.org
Subject: Re: Snort exploit in wild.
X-Virus-Scanned: by AMaViS and OpenAntivirus ScannerDaemon
X-Spam-Status: No, hi
Hello Rich,
Am 10:42 2003-04-14 -0500 hat Rich Puhek geschrieben:
>Well, no. If you look carefully, you have managed to leak that address
>to the list before. On March 17, 2003, for instance (Message-Id:
><[EMAIL PROTECTED]>) you posted a
>reply to a question. Although you set your From addre
Hi all!
Regularily, security updates for Debian Woody are beeing anounced and
recomended for installation. The update packages, as I understand, are
available from network for installation with apt under
deb http://security.debian.org/ woody/updates main contrib non-free.
But what about CD Imag
On Thu, Apr 24, 2003 at 08:52:10PM +0200, Jose Luis Domingo Lopez wrote:
8< syslog-ng --> named pipe --> perl script --> ssh tunnel --> SQL DB
> destination d_logpipe { pipe("/tmp/pipe" owner("someone") template("\(
> '$HOST', '$ISODATE', '$FACILITY', +'$PRIORITY', '$MESSAGE' \)\n") ); };
you
For those that missed it on Debian-devel, there's a patched version of
fakeroot that does chroot too. You can read about it and better/worse
alternatives in the thread at:
http://lists.debian.org/debian-devel/2003/debian-devel-200304/msg00747.html
Drew Daniels
Hi,
There are a large number of security issues discussed in the BTS.
http://qa.debian.org/bts-security.html lists almost all of them. I'm
looking at them and trying to create patches for some and bring them to
the attention of the appropriate parties. Any help would be appreciated.
The security t
On Fri, Apr 18, 2003 at 07:54:32PM -0400, Noah Meyerhans wrote:
> On Fri, Apr 18, 2003 at 11:09:14PM +0200, Martin Hermanowski wrote:
> > am I missing an update of pptpd? Today an exploit has been posted to
> > bugtraq.
>
> The update has not yet been released.
What is the problem with this secur
Matthias Faulstich <[EMAIL PROTECTED]> wrote:
> Does this jigdo - file load the latest security updates or are there any
> other
> places to download / create CD-Images?
AFAIK no. I think you'll have to apt-get update && apt-get upgrade
immediately after the installation because CDs can never b
On Thu, Apr 24, 2003 at 06:46:11PM +0200, Adam ENDRODI wrote:
> Comments, corrections and enhancements are always welcome.
Please add a proper license in the file. GPL?
http://www.gnu.org/licenses/gpl-howto.html
Regards
Javi
pgp7fRNrY2gL1.pgp
Description: PGP signature
Hi!
As I described in a mail to debian-devel [1], it seems that with library
updates programs using the libraries are generally not restarted.
Nevertheless, for programs/services to use the updated libraries a
restart would be necessary.
Especially with security-updates for such central libraries
Woody CD updates afaik are only done when stable releases are done.
See http://people.debian.org/~joey/stable.html for details. There are
nightly builds of CD's for Sarge and Sid, but I don't think I've seen any
such thing for stable or oldstable that includes security updates. The
nightly builds c
On Fri, 25 Apr 2003 10:19:59 +0100, David Ramsden wrote:
>Noticed on vil.mcafee.com that a proof of concept exploit for Snort to
>exploit the vuln. found in v1.8 through to 1.9.1.
[...]
>What's the status of a patch from Debian Security? No DSA yet either.
>I know this has been brought up a few ti
On Fri, Apr 25, 2003 at 10:44:49PM +0100, Nick Boyce wrote:
> The general consensus of opinion (including the Debian packager) was
> that *nobody* should even consider using the V1.8.4 Snort package in
> Woody - it's much too old, and has a number of security issues.
It's not really that it has a
Hi all,
I experienced a very strange apache responce today in our production
environment at work. A user in a discussion room a posting containing
the following characters:
,,''
This gave the result that several pages could not longer be displayed.
I also tried this on search engine http
Can anynone enlighten me why my rule didn't catch this message?
:0
* ^X-Mailing-List:[EMAIL PROTECTED]
* ^Subject: .{0,2}sub.{1,5}ibe
/dev/null
I would appreciate it...Thanks.
On Fri, 25 Apr 2003 at 08:20:27AM +0300, Andres wrote:
> unsubscribe
>
> -
> H
22 matches
Mail list logo