Secunia Security Advisory - SCO has issued an update for UnixWare. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) on an active TCP session.
b83b72088a738c39fa2c6fa52148b4999c66a8ce1513dbdac22be778283fdba1
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
UnixWare ICMP Message Handling Denial of Service
SECUNIA ADVISORY ID:
SA16701
VERIFY ADVISORY:
http://secunia.com/advisories/16701/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
UnixWare 7.x.x
http://secunia.com/product/136/
DESCRIPTION:
SCO has issued an update for UnixWare. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) on an active TCP session.
For more information:
SA14904
SOLUTION:
Apply updated packages.
UnixWare 7.1.3:
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.36/erg712758.uw713.pkg.Z
84c7d2f7e133f39ec15fceed717f080b
UnixWare 7.1.4:
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.36/erg712758.uw714.pkg.Z
85e314659d3ca5a2e887a91ebd71f4cc
ORIGINAL ADVISORY:
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.36/SCOSA-2005.36.txt
OTHER REFERENCES:
SA14904:
http://secunia.com/advisories/14904/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------