navigation bar left navigation bar right

navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2129 Secunia advisories
8545 Vulnerabilities

Monitor Product Receive alerts for this product





142 Secunia Advisories in 2003

Secunia has issued a total of 142 Secunia advisories in 2003 for Gentoo Linux. Currently, 0% (0 out of 142) are marked as unpatched.

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Gentoo update for CVS
Vendor Patch. Secunia Advisory 1 of 142 in 2003. 8,832 views.
Release Date:
2003-12-29
Secunia Advisory ID:
SA10503
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for CVS. These fix a vulnerability, which can be exploited by malicious users to gain escalated privileges on a vulnerable system. [Read More]


patched Gentoo update for net-ftp/lftp
Vendor Patch. Secunia Advisory 2 of 142 in 2003. 8,663 views.
Release Date:
2003-12-18
Secunia Advisory ID:
SA10459
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an updated package for net-ftp/lftp. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 3 of 142 in 2003. 8,888 views.
Release Date:
2003-12-12
Secunia Advisory ID:
SA10418
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for gnupg. These fix two vulnerabilities, which may expose the private key when using El-Gamal type 20 keys and allow malicious people to compromise systems using the experimental HKP interface. [Read More]


patched Gentoo update for cvs
Vendor Patch. Secunia Advisory 4 of 142 in 2003. 8,949 views.
Release Date:
2003-12-11
Secunia Advisory ID:
SA10407
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued updated packages for cvs. These fix a vulnerability, which can be exploited by malicious users to create arbitrary folders and possibly files in the root of the host's file system. [Read More]


patched Gentoo update for kernel
Vendor Patch. Secunia Advisory 5 of 142 in 2003. 9,011 views.
Release Date:
2003-12-05
Secunia Advisory ID:
SA10366
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for the kernel. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges. [Read More]


patched Gentoo update for rsync
Vendor Patch. Secunia Advisory 6 of 142 in 2003. 11,811 views.
Release Date:
2003-12-04
Secunia Advisory ID:
SA10358
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for net-dialup/freeradius
Vendor Patch. Secunia Advisory 7 of 142 in 2003. 10,241 views.
Release Date:
2003-11-26
Secunia Advisory ID:
SA10296
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an updated version of net-dialup/freeradius. This fixes two vulnerabilities, which can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 8 of 142 in 2003. 8,665 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10293
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for Ethereal. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system running Ethereal. [Read More]


patched Gentoo update for libnids
Vendor Patch. Secunia Advisory 9 of 142 in 2003. 9,350 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10291
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updated packages for libnids. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for phpSysInfo
Vendor Patch. Secunia Advisory 10 of 142 in 2003. 8,671 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10290
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
[Read More]


patched Gentoo update for Opera
Vendor Patch. Secunia Advisory 11 of 142 in 2003. 7,871 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10266
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued packages for opera. These fix a vulnerability, which can be exploited by malicious web sites and emails to crash the browser. [Read More]


patched Gentoo update for hylafax
Vendor Patch. Secunia Advisory 12 of 142 in 2003. 8,307 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10265
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for hylafax. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for apache
Vendor Patch. Secunia Advisory 13 of 142 in 2003. 10,963 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10260
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued updated packages for apache. These fix some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or escalate privileges. [Read More]


patched Gentoo update for kdebase
Vendor Patch. Secunia Advisory 14 of 142 in 2003. 6,561 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10259
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Brute force
Privilege escalation
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for kdebase. These fix two vulnerabilities, which can be exploited by malicious users to escalate their privileges or by malicious people to brute force the session cookie. [Read More]


patched Gentoo update for apache2
Vendor Patch. Secunia Advisory 15 of 142 in 2003. 11,787 views.
Release Date:
2003-10-31
Secunia Advisory ID:
SA10114
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for apache2. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or escalate privileges. [Read More]


patched Gentoo update for Cfengine
Vendor Patch. Secunia Advisory 16 of 142 in 2003. 7,079 views.
Release Date:
2003-10-06
Secunia Advisory ID:
SA9942
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for Cfengine. This fixes a vulnerability, which potentially could lead to execution of arbitrary code. [Read More]


patched Gentoo update for vpopmail
Vendor Patch. Secunia Advisory 17 of 142 in 2003. 8,117 views.
Release Date:
2003-10-04
Secunia Advisory ID:
SA9929
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for vpopmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


patched Gentoo update for OpenSSL
Vendor Patch. Secunia Advisory 18 of 142 in 2003. 7,384 views.
Release Date:
2003-10-02
Secunia Advisory ID:
SA9910
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updated packages for OpenSSL. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for TeaPOP
Vendor Patch. Secunia Advisory 19 of 142 in 2003. 7,053 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9899
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for TeaPOP. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks against a vulnerable mail server. [Read More]


patched Gentoo update for mpg123
Vendor Patch. Secunia Advisory 20 of 142 in 2003. 8,165 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9898
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg123. This fixes an older vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mplayer
Vendor Patch. Secunia Advisory 21 of 142 in 2003. 6,880 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9880
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for proftpd
Vendor Patch. Secunia Advisory 22 of 142 in 2003. 7,809 views.
Release Date:
2003-09-30
Secunia Advisory ID:
SA9881
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ProFTPD. This fixes a vulnerability, which can be exploited by some malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 23 of 142 in 2003. 7,922 views.
Release Date:
2003-09-24
Secunia Advisory ID:
SA9826
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for OpenSSH. This fixes a vulnerability in the PAM implementation, which could lead to system compromise. [Read More]


patched Gentoo update for sendmail
Vendor Patch. Secunia Advisory 24 of 142 in 2003. 6,961 views.
Release Date:
2003-09-18
Secunia Advisory ID:
SA9766
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for sendmail. These fixes a vulnerability which possibly could allow malicious people to gain system access. [Read More]


patched Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 25 of 142 in 2003. 7,109 views.
Release Date:
2003-09-17
Secunia Advisory ID:
SA9749
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ssh. These fix a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for Pine
Vendor Patch. Secunia Advisory 26 of 142 in 2003. 7,231 views.
Release Date:
2003-09-16
Secunia Advisory ID:
SA9737
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Pine. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for Exim
Vendor Patch. Secunia Advisory 27 of 142 in 2003. 8,150 views.
Release Date:
2003-09-15
Secunia Advisory ID:
SA9733
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for exim. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or compromise it. [Read More]


patched Gentoo update for MySQL
Vendor Patch. Secunia Advisory 28 of 142 in 2003. 8,043 views.
Release Date:
2003-09-15
Secunia Advisory ID:
SA9730
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for MySQL. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for eroaster
Vendor Patch. Secunia Advisory 29 of 142 in 2003. 8,749 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9655
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for eroaster. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for mindi
Vendor Patch. Secunia Advisory 30 of 142 in 2003. 7,753 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9654
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mindi. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 31 of 142 in 2003. 7,701 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9653
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an updated version of phpwebsite. This fixes some vulnerabilities, which can be exploited by malicious people to conduct Cross Site Scripting and SQL injection attacks. [Read More]


patched Gentoo update for horde
Vendor Patch. Secunia Advisory 32 of 142 in 2003. 8,582 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9649
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes a vulnerability, which potentially can be exploited by malicious people to gain unauthorised access to an account. [Read More]


patched Gentoo update for atari800
Vendor Patch. Secunia Advisory 33 of 142 in 2003. 9,919 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9657
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for atari800. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for gallery
Vendor Patch. Secunia Advisory 34 of 142 in 2003. 8,074 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9656
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for Gallery. This fixes a vulnerability, which can be exploited by malicious people to conduct Cross Site Scripting attacks against other users. [Read More]


patched Gentoo update for pam_smb
Vendor Patch. Secunia Advisory 35 of 142 in 2003. 7,750 views.
Release Date:
2003-09-01
Secunia Advisory ID:
SA9644
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for pam_smb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for vmware-workstation
Vendor Patch. Secunia Advisory 36 of 142 in 2003. 11,039 views.
Release Date:
2003-08-26
Secunia Advisory ID:
SA9606
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an updated version of vmware-workstation. This fixes some vulnerabilities, which can be exploited by malicious, local users to escalate their privileges. [Read More]


patched Gentoo update for Semi
Vendor Patch. Secunia Advisory 37 of 142 in 2003. 8,858 views.
Release Date:
2003-08-15
Secunia Advisory ID:
SA9537
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for semi, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for gentoo-sources
Vendor Patch. Secunia Advisory 38 of 142 in 2003. 9,882 views.
Release Date:
2003-08-14
Secunia Advisory ID:
SA9533
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Privilege escalation
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for gentoo-sources fixing three vulnerabilities. [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 39 of 142 in 2003. 8,416 views.
Release Date:
2003-07-23
Secunia Advisory ID:
SA9328
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Where:
Local system
Short Description:
Gentoo has issued an update for gnupg to fix a vulnerability allowing local users to overwrite certain files. [Read More]


patched Linux Kernel 2.4 Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 40 of 142 in 2003. 21,007 views.
Release Date:
2003-07-22
Secunia Advisory ID:
SA9316
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities has been identified in the Linux Kernel. [Read More]


patched Gentoo update for nfs-utils
Vendor Patch. Secunia Advisory 41 of 142 in 2003. 9,241 views.
Release Date:
2003-07-21
Secunia Advisory ID:
SA9309
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for nfs-utils. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched nfs-utils "xlog()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 42 of 142 in 2003. 16,964 views.
Release Date:
2003-07-14
Secunia Advisory ID:
SA9259
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in nfs-utils, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for cistronradius
Vendor Patch. Secunia Advisory 43 of 142 in 2003. 8,034 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9241
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cistronradius. This fixes a vulnerability, which can be exploited by malicious people to crash a server and potentially compromise it. [Read More]


patched Gentoo update for ypserv
Vendor Patch. Secunia Advisory 44 of 142 in 2003. 7,422 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9240
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for ypserv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable NIS server. [Read More]


patched Gentoo update for gtksee
Vendor Patch. Secunia Advisory 45 of 142 in 2003. 8,192 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9239
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gtksee. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for unzip
Vendor Patch. Secunia Advisory 46 of 142 in 2003. 8,641 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9238
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by overwriting arbitrary files on it. [Read More]


patched Gentoo update for mikmod
Vendor Patch. Secunia Advisory 47 of 142 in 2003. 8,406 views.
Release Date:
2003-07-03
Secunia Advisory ID:
SA9174
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mikmod. This fixes a vulnerability, which potentially could be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for phpBB
Vendor Patch. Secunia Advisory 48 of 142 in 2003. 9,242 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9148
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpBB. This fixes a vulnerability, which allows malicious people to inject arbitrary SQL code. [Read More]


patched Gentoo update for noweb
Vendor Patch. Secunia Advisory 49 of 142 in 2003. 8,621 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9145
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for noweb. This fixes a vulnerability, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


patched Gentoo update for gnocatan
Vendor Patch. Secunia Advisory 50 of 142 in 2003. 7,444 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9144
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gnocatan. This fixes several vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 51 of 142 in 2003. 8,346 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9121
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for Ethereal. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a system running a vulnerable version of Ethereal. [Read More]


patched Gentoo update for proftpd
Vendor Patch. Secunia Advisory 52 of 142 in 2003. 8,032 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9120
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for proftpd. This fixes a vulnerability, which allows malicious people to inject arbitrary SQL code. [Read More]


patched Gentoo update for xpdf
Vendor Patch. Secunia Advisory 53 of 142 in 2003. 7,751 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9119
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Xpdf. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by luring the user into viewing a specially crafted PDF document. [Read More]


patched Gentoo update for acroread
Vendor Patch. Secunia Advisory 54 of 142 in 2003. 7,665 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9118
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by luring the user into viewing a specially crafted PDF document. [Read More]


patched Linux-PAM User Name Spoofing Vulnerability
Vendor Patch. Secunia Advisory 55 of 142 in 2003. 16,226 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9057
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in Linux-PAM, which allows malicious, local users to escalate their privileges. [Read More]


patched Gentoo update for CUPS
Vendor Patch. Secunia Advisory 56 of 142 in 2003. 8,822 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9039
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes a vulnerability, which can be exploited by a malicious user to cause a DoS (Denial of Service) on a print server. [Read More]


patched Gentoo update for kon2
Vendor Patch. Secunia Advisory 57 of 142 in 2003. 9,126 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9033
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for kon2. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for gzip
Vendor Patch. Secunia Advisory 58 of 142 in 2003. 7,573 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9032
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for gzip. This fixes two vulnerabilities, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for LPRng
Vendor Patch. Secunia Advisory 59 of 142 in 2003. 8,303 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9031
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for LPRng. This fixes a vulnerability in "psbanner", which can be exploited by malicious, local users to overwrite certain files on the system. [Read More]


patched Gentoo update for Ghostscript
Vendor Patch. Secunia Advisory 60 of 142 in 2003. 8,379 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9029
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious, local users to overwrite certain files on a vulnerable system. [Read More]


patched Gentoo update for atftp
Vendor Patch. Secunia Advisory 61 of 142 in 2003. 9,074 views.
Release Date:
2003-06-09
Secunia Advisory ID:
SA8969
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for atftp. This closes a buffer overflow vulnerability in the handling of long filenames allowing a malicious server to execute arbitrary code on the client. [Read More]


patched Gentoo update for uw-imapd
Vendor Patch. Secunia Advisory 62 of 142 in 2003. 7,874 views.
Release Date:
2003-06-03
Secunia Advisory ID:
SA8923
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for uw-imapd. This fixes a vulnerability in the imap client allowing malicious servers to gain system access on the client. [Read More]


patched Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 63 of 142 in 2003. 15,402 views.
Release Date:
2003-06-03
Secunia Advisory ID:
SA8936
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Three vulnerabilities have been identified in the Linux Kernel 2.4 branch. One can be exploited to cause a Denial of Service by a malicious person and is very similar to the recent Linux Kernel Denial of Service. The others are local Denial of Service vulnerabilities. [Read More]


patched Gentoo update for maelstrom
Vendor Patch. Secunia Advisory 64 of 142 in 2003. 8,008 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8918
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for maelstrom. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for Apache
Vendor Patch. Secunia Advisory 65 of 142 in 2003. 8,631 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8916
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes two Apache vulnerabilities, which can be exploited to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


patched Gentoo update for tomcat
Vendor Patch. Secunia Advisory 66 of 142 in 2003. 8,411 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8912
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for tomcat. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


patched Gentoo update for heimdal
Vendor Patch. Secunia Advisory 67 of 142 in 2003. 8,757 views.
Release Date:
2003-05-27
Secunia Advisory ID:
SA8866
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Spoofing
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for heimdal, which fix multiple vulnerabilities in the Kerberos v4 protocol. [Read More]


patched Gentoo update for Nessus
Vendor Patch. Secunia Advisory 68 of 142 in 2003. 7,822 views.
Release Date:
2003-05-27
Secunia Advisory ID:
SA8865
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for nessus. This fixes some vulnerabilities, which can potentially allow malicious users to escalate privileges or malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 69 of 142 in 2003. 6,950 views.
Release Date:
2003-05-02
Secunia Advisory ID:
SA8721
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to identify valid users on a vulnerable system. [Read More]


patched Gentoo update for balsa
Vendor Patch. Secunia Advisory 70 of 142 in 2003. 6,779 views.
Release Date:
2003-04-30
Secunia Advisory ID:
SA8704
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for balsa. This fixes a vulnerabillity in the handling of IMAP folders, which might allow malicious servers to execute arbitrary code on the client system. [Read More]


patched Gentoo update for pptpd
Vendor Patch. Secunia Advisory 71 of 142 in 2003. 7,374 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8675
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pptpd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mgetty
Vendor Patch. Secunia Advisory 72 of 142 in 2003. 7,998 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8674
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mgetty. This fixes two vulnerabilities, which can be exploited to compromise a vulnerable system or escalate privileges. [Read More]


patched Gentoo update for monkeyd
Vendor Patch. Secunia Advisory 73 of 142 in 2003. 6,198 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8673
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for monkeyd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Xinetd Connection Reject Memory Leak
Vendor Patch. Secunia Advisory 74 of 142 in 2003. 13,116 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8632
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Xinetd, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. [Read More]


patched Gentoo update for Snort
Vendor Patch. Secunia Advisory 75 of 142 in 2003. 8,043 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8629
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Snort. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a system running Snort. [Read More]


patched Snort TCP reassembly heap overflow
Vendor Patch. Secunia Advisory 76 of 142 in 2003. 13,303 views.
Release Date:
2003-04-16
Secunia Advisory ID:
SA8605
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability was reported in Snort, which could be exploited by a malicious person to execute arbitrary code on the system running Snort. [Read More]


patched Gentoo update for kdegraphics
Vendor Patch. Secunia Advisory 77 of 142 in 2003. 6,691 views.
Release Date:
2003-04-15
Secunia Advisory ID:
SA8596
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdegraphics. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for KDE 3.x
Vendor Patch. Secunia Advisory 78 of 142 in 2003. 6,962 views.
Release Date:
2003-04-11
Secunia Advisory ID:
SA8569
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for KDE 3.x. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for KDE 2.x
Vendor Patch. Secunia Advisory 79 of 142 in 2003. 6,485 views.
Release Date:
2003-04-11
Secunia Advisory ID:
SA8577
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for KDE 2.x. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for setiathome
Vendor Patch. Secunia Advisory 80 of 142 in 2003. 7,625 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8556
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for setiathome. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for samba
Vendor Patch. Secunia Advisory 81 of 142 in 2003. 7,124 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8555
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by anonymous users to gain root privileges on a vulnerable system. [Read More]


patched Gentoo update for Apache
Vendor Patch. Secunia Advisory 82 of 142 in 2003. 6,927 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8554
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable webserver. [Read More]


patched Samba exploitable buffer overflow
Vendor Patch. Secunia Advisory 83 of 142 in 2003. 17,942 views.
Release Date:
2003-04-07
Secunia Advisory ID:
SA8533
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From local network
Short Description:
Samba is vulnerable to a buffer overflow, which can be exploited by anonymous users. [Read More]


patched Gentoo update for krb5 and mit-krb5
Vendor Patch. Secunia Advisory 84 of 142 in 2003. 5,532 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8457
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has released updated packages for krb5 and mit-krb5, which fix multiple vulnerabilities in Kerberos. [Read More]


patched Gentoo update for dietlibc
Vendor Patch. Secunia Advisory 85 of 142 in 2003. 5,765 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8459
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for dietlibc. A vulnerability has been discovered allowing malicious users to cause an integer overflow. This could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


patched Gentoo update for openafs
Vendor Patch. Secunia Advisory 86 of 142 in 2003. 6,702 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8451
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of system information
Spoofing
Security Bypass
Where:
From remote
Short Description:
Gentoo has an update for openafs to address a cryptographic weakness. [Read More]


patched Gentoo update for sendmail
Vendor Patch. Secunia Advisory 87 of 142 in 2003. 6,256 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8455
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for sendmail. This fixes a vulnerability in the address parsing, which potentially can be exploited to compromise a vulnerable mail server. [Read More]


patched Sendmail Address Parsing Buffer Overflow
Vendor Patch. Secunia Advisory 88 of 142 in 2003. 20,973 views.
Release Date:
2003-03-30
Secunia Advisory ID:
SA8446
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Sendmail, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for stunnel
Vendor Patch. Secunia Advisory 89 of 142 in 2003. 7,359 views.
Release Date:
2003-03-26
Secunia Advisory ID:
SA8416
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an update for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


patched Gentoo updates for mod_ssl
Vendor Patch. Secunia Advisory 90 of 142 in 2003. 6,466 views.
Release Date:
2003-03-25
Secunia Advisory ID:
SA8404
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released updates for mod_ssl. These eliminate an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


patched Gentoo updates for glibc
Vendor Workaround. Secunia Advisory 91 of 142 in 2003. 6,935 views.
Release Date:
2003-03-25
Secunia Advisory ID:
SA8403
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for RPC XDR. A vulnerability has been discovered allowing malicious users to cause an integer overflow, this could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


patched Gentoo updates for evolution
Vendor Patch. Secunia Advisory 92 of 142 in 2003. 6,258 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8378
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued updates for Evolution. Three vulnerabilities has been identified in Evolution, the worst could lead to system access. [Read More]


patched Gentoo update for openssl
Vendor Patch. Secunia Advisory 93 of 142 in 2003. 6,417 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8394
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes a vulnerability, which allows malicious people to retrieve the premaster-secret. [Read More]


patched Gentoo update for bitchx
Vendor Patch. Secunia Advisory 94 of 142 in 2003. 6,179 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8393
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has released an update for bitchx. This eliminates multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo updates for mutt
Vendor Patch. Secunia Advisory 95 of 142 in 2003. 6,442 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8380
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mutt. A vulnerabillity has been identified in the handling of IMAP folders which might allow malicious servers to execute arbitrary code on the client system. [Read More]


patched Gentoo updates for the kernel
Vendor Patch. Secunia Advisory 96 of 142 in 2003. 6,804 views.
Release Date:
2003-03-21
Secunia Advisory ID:
SA8375
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
[Read More]


patched Gentoo update for rxvt
Vendor Patch. Secunia Advisory 97 of 142 in 2003. 6,391 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8354
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for rxvt. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


patched Gentoo update for OpenSSL
Vendor Patch. Secunia Advisory 98 of 142 in 2003. 6,817 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8351
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an update for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


patched Multiple Vendor RPC XDR Library Integer Overflow
Vendor Patch. Secunia Advisory 99 of 142 in 2003. 15,822 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8347
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability identified in multiple *NIX operating systems and software can be exploited by malicious people to conduct a DoS attack (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


patched Gentoo update for qpopper
Vendor Patch. Secunia Advisory 100 of 142 in 2003. 5,988 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8304
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for qpopper. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable server. [Read More]


patched Gentoo updates for samba
Vendor Patch. Secunia Advisory 101 of 142 in 2003. 7,602 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8303
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable samba server. [Read More]


patched Samba Packet Fragment Re-assembly Buffer Overflow
Vendor Patch. Secunia Advisory 102 of 142 in 2003. 18,076 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8299
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Samba, which can be exploited by a malicious person to compromise a vulnerable server. [Read More]


patched Gentoo updates for file
Vendor Patch. Secunia Advisory 103 of 142 in 2003. 6,143 views.
Release Date:
2003-03-11
Secunia Advisory ID:
SA8264
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has released updates for the utility "file". These fix a vulnerability exploitable by malicious, local users to escalate their privileges. [Read More]


patched Gentoo updates for ethereal
Vendor Patch. Secunia Advisory 104 of 142 in 2003. 6,558 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8253
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for Ethereal. Two vulnerabilities has been discovered, a format string vulnerability in the handling of certain socks packets and a heap overflow in the handling of NTLMSSP. [Read More]


patched Gentoo updates for mysqlcc
Vendor Patch. Secunia Advisory 105 of 142 in 2003. 6,932 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8251
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Exposure of system information
Where:
Local system
Short Description:
Gentoo has issued updates for mysqlcc. mysqlcc left all configuration and connection files world readable. [Read More]


patched Gentoo updates for netscape and flash
Vendor Patch. Secunia Advisory 106 of 142 in 2003. 6,175 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8248
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for netscape to fix the vulnerabilities in flash player prior to 6.0.79 [Read More]


patched Gentoo update for snort
Vendor Patch. Secunia Advisory 107 of 142 in 2003. 6,152 views.
Release Date:
2003-03-06
Secunia Advisory ID:
SA8232
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has released an update for snort. This fixes a vulnerability, which can be exploited by a malicious person to compromise a system running snort. [Read More]


patched File utility possible privilege escalation
Vendor Patch. Secunia Advisory 108 of 142 in 2003. 9,686 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8224
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A boundary error identified in the utility "file" included in many *nix distributions can potentially be exploited by malicious users to escalate their privileges. [Read More]


patched Gentoo updates for tcpdump
Vendor Patch. Secunia Advisory 109 of 142 in 2003. 6,352 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8218
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates for sendmail
Vendor Patch. Secunia Advisory 110 of 142 in 2003. 5,705 views.
Release Date:
2003-03-04
Secunia Advisory ID:
SA8207
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sendmail. Sendmail has been found vulnerable to an issue that could lead to remote root compromise. The problem is with parsing of certain headers. [Read More]


patched Gentoo updates for eterm
Vendor Patch. Secunia Advisory 111 of 142 in 2003. 6,771 views.
Release Date:
2003-03-03
Secunia Advisory ID:
SA8189
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for eterm. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


patched Gentoo updates for vte
Vendor Patch. Secunia Advisory 112 of 142 in 2003. 7,182 views.
Release Date:
2003-03-03
Secunia Advisory ID:
SA8188
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for vte. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


patched Gentoo update for tightvnc
Vendor Patch. Secunia Advisory 113 of 142 in 2003. 8,445 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8132
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for TightVNC. This fixes a vulnerability allowing attackers to perform a replay attack. [Read More]


patched Gentoo update for VNC
Vendor Patch. Secunia Advisory 114 of 142 in 2003. 7,075 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8131
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for VNC. This fixes a vulnerability allowing attackers to perform a replay attack. [Read More]


patched Gentoo updates for usermin
Vendor Patch. Secunia Advisory 115 of 142 in 2003. 6,747 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8127
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates for apcupsd
Vendor Patch. Secunia Advisory 116 of 142 in 2003. 6,754 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8126
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for apcupsd. A vulnerability in apcupsd can be exploited by malicious users to compromise a slave device. [Read More]


patched Gentoo updates for webmin
Vendor Patch. Secunia Advisory 117 of 142 in 2003. 6,975 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8116
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for webmin. The author of Webmin recommends everybody to upgrade to version 1.070, due to an unspecified vulnerability in all previous versions. [Read More]


patched Gentoo updates for openssl
Vendor Patch. Secunia Advisory 118 of 142 in 2003. 5,810 views.
Release Date:
2003-02-21
Secunia Advisory ID:
SA8105
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an updated package for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of a used plaintext block in a SSL/TLS session. [Read More]


patched Gentoo updates for bitchx
Vendor Patch. Secunia Advisory 119 of 142 in 2003. 6,208 views.
Release Date:
2003-02-21
Secunia Advisory ID:
SA8108
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates to fix a vulnerability in the BitchX IRC client, which can be exploited by a malicious IRC server to cause a DoS (Denial of Service). [Read More]


patched Gentoo updates for php and mod_php
Vendor Patch. Secunia Advisory 120 of 142 in 2003. 8,180 views.
Release Date:
2003-02-19
Secunia Advisory ID:
SA8094
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updates for php and mod_php. A vulnerability has been discovered, which could be exploited if PHP 4.3.0 is configured to use "/cgi-bin/php". [Read More]


patched Gentoo updates for nethack
Vendor Patch. Secunia Advisory 121 of 142 in 2003. 6,316 views.
Release Date:
2003-02-18
Secunia Advisory ID:
SA8082
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
[Read More]


patched Gentoo updates for syslinux
Vendor Patch. Secunia Advisory 122 of 142 in 2003. 7,363 views.
Release Date:
2003-02-18
Secunia Advisory ID:
SA8077
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for syslinux. Security flaws has been identified in syslinux, which could be exploited to gain privileges if syslinux is installed setuid root. [Read More]


patched Gentoo updates for w3m
Vendor Patch. Secunia Advisory 123 of 142 in 2003. 6,703 views.
Release Date:
2003-02-17
Secunia Advisory ID:
SA8074
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued updates for w3m to fix two Cross Site Scripting vulnerabilities. [Read More]


patched Gentoo updates for mailman
Vendor Patch. Secunia Advisory 124 of 142 in 2003. 6,720 views.
Release Date:
2003-02-17
Secunia Advisory ID:
SA8066
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued updates for mailman. These fix a vulnerability, which can be exploited by a malicious person to mount a XSS attack (Cross-Site Scripting) against a user. [Read More]


patched Gentoo updates to bladeenc
Vendor Patch. Secunia Advisory 125 of 142 in 2003. 6,613 views.
Release Date:
2003-02-05
Secunia Advisory ID:
SA8002
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update to bladeenc. This fixes a vulnerability, which can be exploited by a hacker to compromise a user's system if the user is lured into playing a malicious wave file. [Read More]


patched Gentoo updates to qt-dcgui
Vendor Patch. Secunia Advisory 126 of 142 in 2003. 6,816 views.
Release Date:
2003-02-05
Secunia Advisory ID:
SA7999
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
Exposure of sensitive information
Exposure of system information
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates to Mail-SpamAssasin
Vendor Patch. Secunia Advisory 127 of 142 in 2003. 9,040 views.
Release Date:
2003-02-03
Secunia Advisory ID:
SA7983
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to Mail-SpamAssasin. These fix a vulnerability, which can be exploited by hackers to compromise a vulnerable system. [Read More]


patched Gentoo updates to slocate
Vendor Patch. Secunia Advisory 128 of 142 in 2003. 9,070 views.
Release Date:
2003-02-03
Secunia Advisory ID:
SA7982
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates to slocate. These eliminate a vulnerability, which can be exploited by malicious, local users to escalate their privileges. [Read More]


patched Gentoo updates to CVS
Vendor Patch. Secunia Advisory 129 of 142 in 2003. 5,899 views.
Release Date:
2003-01-21
Secunia Advisory ID:
SA7914
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to fix the double-free vulnerability in CVS, allowing anonymous remote users to execute arbitrary code. [Read More]


patched Gentoo updates to kde
Vendor Patch. Secunia Advisory 130 of 142 in 2003. 6,769 views.
Release Date:
2003-01-19
Secunia Advisory ID:
SA7897
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to KDE. KDE does not handle URLs properly, this can be exploited to run arbitrary commands. The problem is that URLs are not verified and quoted correctly. This allows malicious persons to include shell metacharacters. [Read More]


patched Gentoo update for dhcp
Vendor Patch. Secunia Advisory 131 of 142 in 2003. 7,066 views.
Release Date:
2003-01-17
Secunia Advisory ID:
SA7894
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dhcp. This fixes a stack overflow in the minires library. [Read More]


patched Gentoo update to fnord
Vendor Patch. Secunia Advisory 132 of 142 in 2003. 7,138 views.
Release Date:
2003-01-17
Secunia Advisory ID:
SA7893
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to fnord. fnord contains a buffer overflow in a cgi program it is not known if this is exploitable. [Read More]


patched Gentoo update to mod_php / php
Vendor Patch. Secunia Advisory 133 of 142 in 2003. 6,764 views.
Release Date:
2003-01-13
Secunia Advisory ID:
SA7855
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to mod_php / php. [Read More]


patched Gentoo update for libpng
Vendor Patch. Secunia Advisory 134 of 142 in 2003. 6,661 views.
Release Date:
2003-01-09
Secunia Advisory ID:
SA7836
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpng. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update to lcdproc
Vendor Patch. Secunia Advisory 135 of 142 in 2003. 7,473 views.
Release Date:
2003-01-08
Secunia Advisory ID:
SA7829
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to lcdproc. lcdproc suffers a buffer overflow allowing execution of arbitrary code. [Read More]


patched Gentoo update to http-fetcher
Vendor Patch. Secunia Advisory 136 of 142 in 2003. 6,465 views.
Release Date:
2003-01-07
Secunia Advisory ID:
SA7823
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to the http-fetcher library. The problem is that certain input is treated correctly, this allows for trivial buffer overflows and execution of arbitrary code. [Read More]


patched Gentoo updates to monopd
Vendor Patch. Secunia Advisory 137 of 142 in 2003. 7,141 views.
Release Date:
2003-01-07
Secunia Advisory ID:
SA7820
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to monopd. A buffer overflow exists in the monopd messaging framework which can be exploited to run arbitrary commands with the privileges of the user running monopd. [Read More]


patched Gentoo updates to libmcrypt
Vendor Patch. Secunia Advisory 138 of 142 in 2003. 6,060 views.
Release Date:
2003-01-06
Secunia Advisory ID:
SA7814
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates to dhcpcd
Vendor Patch. Secunia Advisory 139 of 142 in 2003. 6,902 views.
Release Date:
2003-01-06
Secunia Advisory ID:
SA7813
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages to dhcpcd. [Read More]


patched Gentoo updates to leafnode
Vendor Patch. Secunia Advisory 140 of 142 in 2003. 8,646 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7801
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates to leafnode. leafnode does not handle cross posted newsgroup messages correct, when the group name of one group is also the prefix of the name of another group. [Read More]


patched Gentoo updates to xpdf
Vendor Patch. Secunia Advisory 141 of 142 in 2003. 5,741 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7800
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to xpdf to fix an integer overflow. [Read More]


patched Gentoo updates to CUPS
Vendor Patch. Secunia Advisory 142 of 142 in 2003. 6,979 views.
Release Date:
2003-01-01
Secunia Advisory ID:
SA7794
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to CUPS to fix multiple vulnerabilities. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+