Section:  .. / 0412-advisories  /

Page 11 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 250 - 253 of 253
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: FreeBSD-SA-04:17.procfs.txt
Description:
FreeBSD Security Advisory FreeBSD-SA-04:17.procfs - The implementation of the /proc/curproc/cmdline pseudofile in the procfs(5) file system on FreeBSD 4.x and 5.x, and of the /proc/self/cmdline pseudofile in the linprocfs(5) file system on FreeBSD 5.x reads a process' argument vector from the process address space. During this operation, a pointer was dereferenced directly without the necessary validation steps being performed.
Homepage:http://www.freebsd.org/security/
File Size:5923
Related CVE(s):CAN-2004-1066
Last Modified:Dec 12 01:07:55 2004
MD5 Checksum:4d1821253f3b6964d3307c7b0dcd122d

 ///  File Name: mercury_adv.txt
Description:
Multiple buffer overflows exist in Mercury/32, version 4.01a, Dec 8 2003. There are 14 vulnerable commands that can be used to cause buffer overflows to occur. After a successful login to the mail server, if any of these commands are used with an overly long argument the application closes resulting in a denial of service.
Author:Reed Arvin
Related Exploit:ex_MERCURY.c"
File Size:2195
Last Modified:Dec 12 01:03:17 2004
MD5 Checksum:ac1ce8217842af8d95151fefd0ddf700

 ///  File Name: 57675.html
Description:
Sun Security Advisory - There is a potential buffer overflow in ping which could result in a local unprivileged user gaining elevated privileges.
Homepage:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57675-1
File Size:8066
Last Modified:Dec 12 00:49:52 2004
MD5 Checksum:32263036558f0cc0737498f95ca3d352