Bugzilla – Attachment 26777 Details for
Bug 63702
VUL-0: CVE-2004-1079: ncpfs: buffer overflow
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
IDP Log In
|
Forgot Password
patchinfo.ncpfs
patchinfo.ncpfs (text/plain), 669 bytes, created by
Thomas Biege
on 2004-12-06 20:44:33 UTC
(
hide
)
Description:
patchinfo.ncpfs
Filename:
MIME Type:
Creator:
Thomas Biege
Created:
2004-12-06 20:44:33 UTC
Size:
669 bytes
patch
obsolete
>DISTRIBUTION: sles8-ppc,sles8-s390,sles8-s390x,sles8-slec-i386,sles9-i386,sles9-ia64,sles9-ppc,sles9-s390,sles9-s390x,sles9-x86_64,ul1-i386,ul1-ia64,ul1-x86_64 >PACKAGE: ncpfs,ncpfs-devel >PACKAGER: olh@suse.de >BUGZILLA: 48702 >CATEGORY: security >INDICATIONS: Everyone using ncpfs should update. >CONTRAINDICATIONS: >CD-Produkt-Name: >CD-Produkt-Version: >REQUIRES: >SWAMPID: 569 >DESCRIPTION: >Security Update: >This update fixes a buffer overfow in ncplogin and ncpmap. Both applications >are installed setuid root on SUSE LINUX. Only users of group 'trusted' are >allowed to execute this binaries. If successfully exploited this >vulnerabilities can be used to gain root locally.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
Actions:
View
Attachments on
bug 63702
:
26776
| 26777 |
27033