exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files

CSSA-2002-041.0.txt
Posted Oct 30, 2002
Site stage.caldera.com

Caldera security advisory CSSA-2002-041.0 - Versions of the pam_ldap module prior to 144 include a remote exploitable format string bug in the logging function. Caldera released fixed packages for OpenLinux 3.1.1 and 3.1 configurations.

tags | remote
SHA-256 | c98cc4086624aa5d7ab9ed4caeeb7af1bae87e9ae7f7e2603f11c0243e0a66b1

Related Files

CSSA-2003-SCO.27
Posted Nov 4, 2003
Site sco.com

SCO Security Advisory CSSA-2003-SCO.27 - OpenServer 5.0.5 insecurely creates files in /tmp which can lead to a system compromise.

tags | advisory
advisories | CVE-2003-0872
SHA-256 | 725b4ca1608142e558c4a0f6e0af7773a4026376e70cfc6b6c4619a5460d1ad4
CSSA-2002-040.0.txt
Posted Oct 30, 2002
Site stage.caldera.com

Caldera security advisory CSSA-2002-040.0 - The uudecode utility created output files without checking to see if it was about to write to a symlink or a pipe. If a user uses uudecode to extract data into open shared directories, such as /tmp, this vulnerability could be used by a local attacker to overwrite files.

tags | local
SHA-256 | 17b624f9cfffccb177e0b88e25c290f97b79a5ad62cb2697c7da6dbe12278fd9
CSSA-2002-SCO.35.txt
Posted Jul 24, 2002
Authored by Caldera | Site caldera.com

Caldera security advisory CSSA-2002-SCO.35 - A format string vulnerability found in the crontab utility can allow local users to gain root level privileges. This issue affects Caldera OpenServer 5.0.5 and OpenServer 5.0.6 .

tags | local, root
SHA-256 | 4b6d1da615ec1c788d6aa26337d81d1fef020b841d6c3833d41e806acfb24350
CSSA-2002-SCO.23
Posted Jun 3, 2002
Authored by Caldera | Site stage.caldera.com

Caldera Security Advisory CSSA-2002-SCO.23 - A vulnerability found in the Open UNIX and UnixWare FTP daemon can allow remote attackers to hijack passive FTP data connections.

tags | remote
systems | unix, unixware
SHA-256 | 2ba86861d069c9bc17521caaefcb7ca1c5ad9ae7377ab0c78f4293019c0c4363
CSSA-2002-SCO.17.txt
Posted May 7, 2002
Authored by Kevin Finisterre, Caldera | Site stage.caldera.com

Caldera Security Advisory CSSA-2002-SCO.17 - A buffer overflow found in how the sar can be used to execute shellcode with elevated privileges on Caldera OpenServer 5.0.5 systems.

tags | overflow, shellcode
SHA-256 | b2227264615ef07d201eb3e93c99b69dd64badf1fc46ac112f0c1c6cc2510596
CSSA-2000-033.0.txt
Posted Sep 27, 2000

Caldera Advisory - There is a format bug in the LPRng printer daemon that could possibly be exploited to obtain root privilege. This problem is particulary severe because it can be exercised remotely.

tags | root
SHA-256 | ce5a6fb6fa064fe5353a6cbce23cc3f20fc3c1a670d00d8478d93f4ce3f4b9ec
caldera.setuid.txt
Posted Jun 9, 2000

Caldera Security Advisory - There is a serious vulnerability in Linux kernel 2.2.x that allows local users to obtain root privilege by exploiting certain setuid root applications.

tags | kernel, local, root
systems | linux
SHA-256 | 50bf47ab9f6222903d0dab17ef1fd0dcebe194c6bc4c9195b6080a9b053ece5d
CSSA-1999-036.0.txt
Posted Nov 23, 1999

Caldera Advisory - Versions of pine prior to 4.21 had a security problem when viewing URLs. Sending an email with a specially formatted URL embedded in it, an attacker could cause arbitrary shell code to be executed under the account of the victim user.

tags | arbitrary, shell
SHA-256 | 236cb5d6ada3c83705571621e9792293e6fe09111cd3332b8b9f8247f4b27cdb
CSSA-1999-035.0.txt
Posted Nov 23, 1999

Caldera Advisory - On Linux, most services do not log informational or error messages to their own files, but use the system log daemon, syslogd, for this. Unfortunately, the current syslogd has a problem by which any user on the local host can mount a denial of service attack that effectively stops all logging. Since all programs that want to send logging information to syslogd block until they're able to establish a connection to syslogd, this will make programs such as login, su, sendmail, telnetd, etc hang indefinitely.

tags | denial of service, local
systems | linux
SHA-256 | 75929757a539f9c77ec0d45380c414e5e913c577a894aafb8b777163e277b75b
CSSA-1999-029.0.txt
Posted Sep 23, 1999

Caldera advisory on IDENT daemon denial of service

tags | denial of service
SHA-256 | c1a4c6e643464ff966a91daec1ec0aa9c2198cccc0d1ebd5716a4a965ded2ca0
CSSA-1999-029.1.txt
Posted Sep 23, 1999

Caldera advisory on IDENT daemon denial of service

tags | denial of service
SHA-256 | e040ce3d2bd53ae3b2919a91a6a234b7aceb8b72986647f7adfffb2af9574b02
CSSA-1999-031.0.txt
Posted Sep 23, 1999

Caldera Advisory - A buffer overflow has been discovered in the way mutt handles MIME messages of type text/enriched. Sending a specially composed mail message to some user, an attacker can execute commands under the account of the user reading the mail message.

tags | overflow
SHA-256 | cff3beec6259144384d2bdc0be7866f24fdb7c8364138a054390fea1d017caaa
CSSA-1999-032.0.txt
Posted Sep 23, 1999

Caldera Advisory - The Linux kernel as shipped with Caldera OpenLinux 2.3 has two definitive security problems, and one possible problem. TCP Spoofing Problem, Packet Injection Problem, and Possible Argument Vector Corruption.

tags | kernel, spoof, tcp
systems | linux
SHA-256 | 350d1bc9f32ecb9593c8a39cf20b41e45414c1e95730304b12f7f95f068e0610
CSSA-1999-033.0.txt
Posted Sep 23, 1999

Caldera Advisory - A buffer overflow was discovered in the Linux user space NFS daemon that allows an attacker to obtain root privilege on the NFS server host. In order to exploit the bug, the attacker must have access to a file systems exported read/write by the server machine.

tags | overflow, root
systems | linux
SHA-256 | 6b4ad7a11ae1fbac1d36179c6e8f5c7ac6f7d3948f8bd9e21f75fb9a9a4516b5
CSSA-1999-034.0.txt
Posted Sep 23, 1999

Caldera Advisory - Several vulnerabilities have been discovered in BIND, the DNS name server implementation maintained by the Internet Consortium, and shipped with OpenLinux. At least one of them, the so-called "NXT bug," involves a buffer overflow that can possibly be used by a skilled attacker to execute arbitrary code with the privilege of the name server process. Five other bugs could be exploited by remote and local users to crash the name server.

tags | remote, overflow, arbitrary, local, vulnerability
SHA-256 | 086d79dde8d74f83c4d957877417e087ae75be0eeff44c6541e3e5f6e87b0bd7
cssa-1999.019.xmonisdn
Posted Sep 23, 1999

cssa-1999.019.xmonisdn

SHA-256 | a77e6cd012cc277c753c877a06427126b967fbfc3d976a9ca5de9d28359a01ed
cssa-1999.020.termcap
Posted Sep 23, 1999

cssa-1999.020.termcap

SHA-256 | 6073986702f4cc168bb9cc9b2b63f41ab772b8f5f1a0eaa72eb7841adc50d0c3
cssa-1999.021.kdm
Posted Sep 23, 1999

cssa-1999.021.kdm

SHA-256 | 700a413b91f6451fc2bee08bbb71c3969f5e1aa9a53b093555e172baa3d8b8ec
cssa-1999.022.telnetd
Posted Sep 23, 1999

cssa-1999.022.telnetd

SHA-256 | 1c7c7d8a01d0126dc5774e2c8c370db2766fabd45386ff23393aad55751dc198
cssa-1999.023.cron
Posted Sep 23, 1999

cssa-1999.023.cron

SHA-256 | 3f702d85cf8877a64bbd16f008762cda98e4f0f1e73dd2e0562d0a98e0823437
cssa-1999.024.amd
Posted Sep 23, 1999

cssa-1999.024.amd

SHA-256 | e112a5b2f0c9edd1d5390c2f901939b2ddd22e6d1cbe8ff57c3af04622621789
cssa-1999.025.man
Posted Sep 23, 1999

cssa-1999.025.man

SHA-256 | ec30892da126e6e1d4db80c7ba1779a1a049dcad33fe411924ac292be83e54ba
cssa-1999.026.inews
Posted Sep 23, 1999

cssa-1999.026.inews

SHA-256 | d894564d34b7b64fcaf19be5316f595de4064645a4da7dd0a754dcf576a7d928
cssa-1999.028.wuftpd
Posted Sep 23, 1999

cssa-1999.028.wuftpd

SHA-256 | 23e470c0caa1f4e16873fc2e07cd05fea294cdf231fc7e16b3e2ad2b18f22bdc
Page 1 of 1
Back1Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    37 Files
  • 27
    Feb 27th
    34 Files
  • 28
    Feb 28th
    27 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close