[BACK]Return to security.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/security.html between version 1.125 and 1.126

version 1.125, 2000/05/25 07:39:27 version 1.126, 2000/05/25 16:44:37
Line 204 
Line 204 
   
 <p>  <p>
 <ul>  <ul>
 <li><a href=errata.html#procfs>May 25, 2000:  <li><a href=errata26.html#xlockmore>May 25, 2000:
         xlockmore has a bug which a localhost attacker can use to gain          xlockmore has a bug which a localhost attacker can use to gain
         access to the encrypted root password hash (which is normally          access to the encrypted root password hash (which is normally
         encoded using blowfish (see          encoded using blowfish (see
         <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypt&sektion=3">          <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypt&sektion=3">
         crypt(3)</a>)          crypt(3)</a>)
         (patch included).</a>          (patch included).</a>
 <li><a href=errata.html#procfs>Jan 20, 2000:  <li><a href=errata26.html#procfs>Jan 20, 2000:
         Systems running with procfs enabled and mounted are          Systems running with procfs enabled and mounted are
         vulnerable to a very tricky exploit.  procfs is not          vulnerable to a very tricky exploit.  procfs is not
         mounted by default.          mounted by default.
         (patch included).</a>          (patch included).</a>
 <li><a href=errata.html#ifmedia>Nov 9, 1999:  <li><a href=errata26.html#ifmedia>Nov 9, 1999:
         Any user could change interface media configurations, resulting in          Any user could change interface media configurations, resulting in
         a localhost denial of service attack.          a localhost denial of service attack.
         (patch included).</a>          (patch included).</a>
 <li><a href=errata.html#sslUSA>Dec 2, 1999:  <li><a href=errata26.html#sslUSA>Dec 2, 1999:
         A buffer overflow in the RSAREF code included in the          A buffer overflow in the RSAREF code included in the
         USA version of libssl, is possibly exploitable in          USA version of libssl, is possibly exploitable in
         httpd, ssh, or isakmpd, if SSL/RSA features are enabled.          httpd, ssh, or isakmpd, if SSL/RSA features are enabled.
         (patch included).<br></a>          (patch included).<br></a>
         <strong>Update:</strong> Turns out that this was not exploitable          <strong>Update:</strong> Turns out that this was not exploitable
         in any of the software included in OpenBSD 2.6.          in any of the software included in OpenBSD 2.6.
 <li><a href=errata.html#sendmail>Dec 4, 1999:  <li><a href=errata26.html#sendmail>Dec 4, 1999:
         Sendmail permitted any user to cause a aliases file wrap,          Sendmail permitted any user to cause a aliases file wrap,
         thus exposing the system to a race where the aliases file          thus exposing the system to a race where the aliases file
         did not exist.          did not exist.

Legend:
Removed from v.1.125  
changed lines
  Added in v.1.126