皆様、セキュリティホ ..
[
2ch
|
▼Menu
]
■コピペモード
□
スレを通常表示
□
オプションモード
□このスレッドのURL
■項目テキスト
121:login:Penguin 02/07/22 23:24 /iXwHkpN キタ━━━━━━(゚∀゚)━━━━━━ !!! PHP 4.2.0/4.2.1 に任意コード実行可能なセキュリティホール。 また IA32 じゃ任意コード実行は出来ないなんて言ってるよ。 ホントカナー??? 122:login:Penguin 02/07/26 10:13 GbcCcnsG Updated glibc packages fix vulnerabilities in resolver http://rhn.redhat.com/errata/RHSA-2002-139.html > A buffer overflow vulnerability has been found in the way the glibc > resolver handles the resolution of network names and addresses via DNS (as > per Internet RFC 1011). Version 2.2.5 of glibc and earlier versions are > affected. A system would be vulnerable to this issue if the > "networks" database in /etc/nsswitch.conf includes the "dns" entry. By > default, Red Hat Linux ships with "networks" set to "files" and > is therefore not vulnerable to this issue. (CAN-2002-0684) > > A second, related, issue is a bug in the glibc-compat packages, which > provide compatibility for applications compiled against glibc version > 2.0.x. Applications compiled against this version (such as those > distributed with early Red Hat Linux releases 5.0, 5.1, and 5.2) could also > be vulnerable to this issue. (CAN-2002-0651) > > These errata packages for Red Hat Linux 7.1 and 7.2 on the Itanium > architecture also include a fix for the strncpy implementation in some > boundary cases.
次ページ
最新レス表示
スレッドの検索
類似スレ一覧
話題のニュース
おまかせリスト
▼オプションを表示
レスジャンプ
mixiチェック!
Twitterに投稿
オプション
しおりを挟む
スレッドに書込
スレッドの一覧
暇つぶし2ch
5389日前に更新/137 KB
担当:undef