Security Basics mailing list archives

Re: rz vulnerabilities


From: Daniel Nyström <exce () netwinder nu>
Date: Fri, 13 Jun 2003 08:53:44 +0200

www.Google.com and www.Securityfocus.com/bid is your friend.

Go search.


Daniel Nyström
Independent Security Researcher
----------------------------------
exce () netwinder nu
http://www.telhack.tk
http://exce.ath.cx

----- Original Message ----- 
From: "Hasnain Mujtaba" <hmujtaba () forumsys com>
To: <security-basics () lists securityfocus com>
Sent: Thursday, June 12, 2003 11:32 PM
Subject: rz vulnerabilities



Hi all,
 
I was wondering if there are any security holes in Red Hat Linux rz and
rs commands.  I have seen a lot of information on the web about a couple
of security holes but that information looks outdated. Have the known
vulnerabilities been fixed in the new versions of Red Hat? And if not,
what exactly are those vulnerabilities and are there any workarounds?
 
Regards
Hasnain.
 

---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.
     
Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
          
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------


---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.

Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.

Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------


Current thread: