This advisory describes a vulnerability in BSD-based lpr printing software. Vendor information and a pointer to a wrapper are included.
70ab0527c16307f041dcf368402c025c0f74357fd8cf6b19899977b750ba665b
This advisory addresses a buffer overflow condition in some versions of the at(1) program. Patch information and a workaround are provided.
f4b253b397e5502319ae217319741cf715b3264f8b2654ff8dd6a8e2ec6941f5
This advisory addresses a buffer overflow condition in suidperl (sperl) built from Perl 4.n and Perl 5.n distributions on UNIX systems. It suggests several solutions and includes vendor information and a patch for Perl version 5.003.
daff19032b3954d4b4685a8166b3187e6127c792d1fdd5bcd7926ddf300013e2
This advisory describes a vulnerability in some versions of ftpd distributed and installed under various Unix platforms. Includes vendor information.
6cd5dcd12ed3e5c400173c61d2897088faac50d6c61ebaf73f24724034ef5f1d
This advisory describes a vulnerability in the SGI login program when the LOCKOUT parameter is set to a number greater than zero. The vulnerability is present in IRIX 5.3 and 6.2, and perhaps other
d2c6db2d376653840c625017a5427471d239965bb0e417c978479424dcf23966
This advisory reports a vulnerability in metamail, a package that implements MIME. All versions of metamail through 2.7 are vulnerable.
31bda1220c9b6ffbe84df8530b77cfa1a720589e1ce9c40e9aac2d84a1f65b8b
This advisory reports a buffer overflow problem in some versions of xlock. This problem makes it possible for local users to execute arbitrary programs as a privileged user. Patch information and a workaround are included.
6842354f9cdff125dafab1486eb536fa262f921798f681935da8c4260f18c7cc
This advisory reports a vulnerability in the webdist.cgi-bin program, part of the IRIX Mindshare Out Box package, available with IRIX 5.x and 6.x. When exploiting this vulnerability, both local and remote users may be able to execute arbitrary commands with the privileges of the httpd daemon. A workaround is included.
c9926191ee769112046a977f04b676c47268e7100f13113682f3e542cb6b97c3
This advisory reports a buffer overflow vulnerability in the Xt library of the X Windowing System. Vendor vulnerability and patch information are included.
eaef6842385be6f1e47d47ebd49fdac894ceee57c35a35eed2b749f49b677b4b
This advisory reports a buffer overflow condition that affects some libraries using the Natural Language Service (NLS). Vendor vulnerability and patch information are included.
dc0ae0ae9b5b93f218e6984b5691c64397a7095fa1dfff8fadb17d30cfb9f3e3
This advisory reports a vulnerability in some versions of the Internet Message Access Protocol (IMAP) and Post Office Protocol (POP) implementations (imapd, ipop2d, and ipop3d). Vendor and upgrade information are included.
722525a5804ff5253a9bd029a7c2fd0091cde49848d39e0918a46966edc4ee98
Originally issued Topic 2 issued This advisory describes two vulnerabilities in INN (the InterNetNews server). One affects versions 1.5 and earlier; the other affects 1.5.1 and earlier. The advisory includes pointers to version 1.5.1 and earlier. Updated information on the second vulnerability was added as "Topic 2." Pointers to all relevant patches are included, along with information from vendors.
bb9563cb44fc95fb6f5c329b1dd97d03b121da9b329978989945023e2faa421a
This advisory points out a vulnerability in the nph-test-cgi script included with some http daemons. Readers are urged to disable the script. Vendor information is included.
ac8453daecca468be7ffbf880e93324aff98db217343e78f9d5d60d383e8a515
This advisory reports a vulnerability in many implementations of the rlogin program, including eklogin and klogin. Vendor information and a workaround are included.
0dddb1585e96eebab804c1ee91d512f0c63a6177a491ab9b0c25a16f0363f4a9
This advisory addresses a MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4. The advisory includes vendor information, pointers to the latest version of sendmail, a workaround, and general precautions to take when using sendmail.
1d15abf51d54c3d791085fc04430612abe988a9ca1fd7b272e64d4a7af3a9f2a
A vulnerability in talkd(8) program used by talk(1) makes it possible to provide corrupt DNS information to a host and to remotely execute arbitrary commands with root privileges. The advisory includes information on how to solve the general problem as well as the specific one.
2a739733ef6b9a6ada53275ce1043809377375e1ab44ba2b0ea11fc870acac65
A vulnerability in the csetup program under IRIX versions 5.x, 6.0, 6.0.1, 6.1, and 6.2 allows local users to create or overwrite arbitrary files on the system and ultimately gain root privileges. A workaround is provided.
416f58f59d17dbd153e723dbab1d8e7ed23d3fe6e91a316877ce82acaaaed8ab
This advisory describes a vulnerability in the newgrp(1) program under HP-UX 9.x and 10.x that may allow users to gain root privileges. A workaround is provided.
5e23811c401391354315ef07e32153495b75e26e076a1e2333a51d006b48daad
This advisory describes multi-platform UNIX FLEXlm vulnerabilities. These problems may allow local users to create arbitrary files on the system and execute arbitrary programs using the privileges of the user running the FLEXlm daemons.
3308dd35b3d002907a4cb2eddbcd82dfc8f3bf4cbf0aa8945f00a06596c28f65
This advisory describes a vulnerability in Hewlett-Packard SD-UX that may allow local users to gain root privileges. A workaround is included.
8a13584b0d292e2494d996405f637189d0d3c03ed35e1da049d970f56e49e047
This advisory describes a denial-of-service attack using large ICMP datagrams issued via the ping command. Vendor information is included.
d025402e54c73c44e122ef8e5c134c8f1715ed3aba5d0b9648d971115675c918
The advisory describes a security problem affecting sendmail version 8 relating to group-writable files. Vendor patches and a workaround are included.
05d4837bb351e9e334362ef1bc4a9a7af1f7ff807eb158821ab94dbb7b70aa2c
It describes a security problem relating to the daemon mode in sendmail 8.7 through 8.8.2. The advisory also includes a note about two vulnerabilities in versions 8.8.0 and 8.8.1; these have been fixed as well.
03fe06ac457c8675cda9272f8525fb5814983f47921c0728fd9c929760a29204
This advisory describes a vulnerability in the WorkMan compact disc-playing program that affects UNIX System V Release 4.0 and derivatives and Linux systems.
b4c5d03a34cbaec6f4ac3c43e39d96a68320afca0c409259cd5a0db71fe779d9
This advisory addresses two problems with the GNU Project's Bourne Again SHell (bash): one in yy_string_get() and one in yy_readline_get().
87c353e83b18e871ce66d828a99956188bf7d31f869e557067fd339a40a93cab