(Jun 1) Open source programs and solutions offer many advantages over proprietary alternatives including better quality, higher levels of security, superior flexibility, lower costs and a thriving community surrounding open source development. …
(May 9) In this interview, Dave Wreski discusses Guardian Digital’s highly effective email security solutions and the myriad advantages of investing in these solutions to secure your email. …
(Jun 8) Jailed processes can manipulate host routing tables.
(May 27) In some situations, a user with read access to a file may be able to prevent changes to that file from being committed to disk.
(May 19) Malformed data can cause a heap buffer to overflow, allowing the client to overwrite arbitrary portions of the server’s memory.
(May 10) A remote attacker may send a specially formatted message to k5admind, causing it to crash or possibly resulting in arbitrary code execution.
(May 10) It is possible for the Key Distribution Center (KDC) of a realm to forge part or all of the `transited’ field to fake zone trustedness.
(Sep 20) A number of vulnerabilities were discovered in CVS by Stefan Esser, Sebastian Krahmer, and Derek Price.
(Jul 2) It may be possible for a local attacker to read and/or overwrite portions of kernel memory, resulting in disclosure of sensitive information or potential privilege escalation.
(Dec 2) The implementation of the /proc/curproc/cmdline pseudofile in the procfs(5) file system on FreeBSD 4.x and 5.x, and of the /proc/self/cmdline pseudofile in the linprocfs(5) file system on FreeBSD 5.x reads a process’ argument vector from the process address space. During this operation, a pointer was dereferenced directly without the necessary validation steps being performed.