• Skip to main content
  • Skip to footer

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

NetBSD P_SUGID Flag ptrace() Check Bypass

Network Security News – Monday, November 14, 2005 Events

NetBSD P_SUGID Flag ptrace() Check Bypass

NetBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when a malicious attacker uses exec() to spawn a replacement process that can defeat ptrace()'s check on P_SUGID. This flaw will allow debugger attachment to the replacement process, leading to a loss of integrity.. Read more at osvdb.org/20759

NetBSD SO_LINGER Socket Option Negative Value Local DoS

NetBSD contains a flaw that may allow a local denial of service. The issue is triggered when a malicious user passes a negative value for linger time through the SO_LINGER socket option, and will result in loss of availability for the platform.. Read more at osvdb.org/20758

PHPKIT Guestbook Homepage Field XSS

PHPKIT contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "Homepage" variable upon submission to the guestbook scripts. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/20559

WU-FTPD Unspecified Security Issue

WU-FTPD contains an unspecified flaw that may allow a remote attacker to execute arbitrary code. No further details have been provided.. Read more at osvdb.org/13998

WU-FTPD glob Function Error Handling Arbitrary Code Execution

WU-FTPD contains a flaw that may allow a remote attacker to execute arbitrary code. The issue is triggered when when the 'ftpglob()' function fails to properly set the 'globerr' variable when the malformed string '~{' is inserted after a valid command by a valid user. This causes the heap to become corrupt and potentially allow a remote attacker to place and point to arbitrary commands on the heap. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.. Read more at osvdb.org/686

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

Miscellaneous

  • Free Address Finder
  • HTML Encoder Decoder
  • Website Monitoring
  • Whats My IP Address?
  • Yes or No

Copyright © 2001-2024 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About
  • Acronyms
  • DLL Files
  • Ports
  • Computer Security News
  • Email Scams & Spam
  • Internet Safety
  • Free Software