• Skip to main content

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

NetBSD P_SUGID Flag ptrace() Check Bypass

Network Security News – Monday, November 14, 2005 Events

NetBSD P_SUGID Flag ptrace() Check Bypass

NetBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when a malicious attacker uses exec() to spawn a replacement process that can defeat ptrace()'s check on P_SUGID. This flaw will allow debugger attachment to the replacement process, leading to a loss of integrity.. Read more at osvdb.org/20759

NetBSD SO_LINGER Socket Option Negative Value Local DoS

NetBSD contains a flaw that may allow a local denial of service. The issue is triggered when a malicious user passes a negative value for linger time through the SO_LINGER socket option, and will result in loss of availability for the platform.. Read more at osvdb.org/20758

PHPKIT Guestbook Homepage Field XSS

PHPKIT contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "Homepage" variable upon submission to the guestbook scripts. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/20559

WU-FTPD Unspecified Security Issue

WU-FTPD contains an unspecified flaw that may allow a remote attacker to execute arbitrary code. No further details have been provided.. Read more at osvdb.org/13998

WU-FTPD glob Function Error Handling Arbitrary Code Execution

WU-FTPD contains a flaw that may allow a remote attacker to execute arbitrary code. The issue is triggered when when the 'ftpglob()' function fails to properly set the 'globerr' variable when the malformed string '~{' is inserted after a valid command by a valid user. This causes the heap to become corrupt and potentially allow a remote attacker to place and point to arbitrary commands on the heap. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.. Read more at osvdb.org/686

Copyright © 2001-2024 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About