Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2076 Secunia advisories
7783 Vulnerabilities

Monitor Product Receive alerts for this product





142 Secunia Advisories in 2003

Secunia has issued a total of 142 Secunia advisories in 2003 for Gentoo Linux. Currently, 0% (0 out of 142) are marked as unpatched.

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Gentoo update for CVS
Vendor Patch. Secunia Advisory 1 of 142 in 2003. 8,781 views.
Release Date:
2003-12-29
Secunia Advisory ID:
SA10503
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for CVS. These fix a vulnerability, which can be exploited by malicious users to gain escalated privileges on a vulnerable system. [Read More]


Gentoo update for net-ftp/lftp
Vendor Patch. Secunia Advisory 2 of 142 in 2003. 8,604 views.
Release Date:
2003-12-18
Secunia Advisory ID:
SA10459
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an updated package for net-ftp/lftp. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for gnupg
Vendor Patch. Secunia Advisory 3 of 142 in 2003. 8,836 views.
Release Date:
2003-12-12
Secunia Advisory ID:
SA10418
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for gnupg. These fix two vulnerabilities, which may expose the private key when using El-Gamal type 20 keys and allow malicious people to compromise systems using the experimental HKP interface. [Read More]


Gentoo update for cvs
Vendor Patch. Secunia Advisory 4 of 142 in 2003. 8,780 views.
Release Date:
2003-12-11
Secunia Advisory ID:
SA10407
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued updated packages for cvs. These fix a vulnerability, which can be exploited by malicious users to create arbitrary folders and possibly files in the root of the host's file system. [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 5 of 142 in 2003. 8,969 views.
Release Date:
2003-12-05
Secunia Advisory ID:
SA10366
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for the kernel. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges. [Read More]


Gentoo update for rsync
Vendor Patch. Secunia Advisory 6 of 142 in 2003. 11,681 views.
Release Date:
2003-12-04
Secunia Advisory ID:
SA10358
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for net-dialup/freeradius
Vendor Patch. Secunia Advisory 7 of 142 in 2003. 10,175 views.
Release Date:
2003-11-26
Secunia Advisory ID:
SA10296
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an updated version of net-dialup/freeradius. This fixes two vulnerabilities, which can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for libnids
Vendor Patch. Secunia Advisory 8 of 142 in 2003. 9,309 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10291
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updated packages for libnids. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for phpSysInfo
Vendor Patch. Secunia Advisory 9 of 142 in 2003. 8,630 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10290
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
[Read More]


Gentoo update for ethereal
Vendor Patch. Secunia Advisory 10 of 142 in 2003. 8,615 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10293
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for Ethereal. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system running Ethereal. [Read More]


Gentoo update for Opera
Vendor Patch. Secunia Advisory 11 of 142 in 2003. 7,821 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10266
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued packages for opera. These fix a vulnerability, which can be exploited by malicious web sites and emails to crash the browser. [Read More]


Gentoo update for hylafax
Vendor Patch. Secunia Advisory 12 of 142 in 2003. 8,265 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10265
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for hylafax. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 13 of 142 in 2003. 10,846 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10260
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued updated packages for apache. These fix some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or escalate privileges. [Read More]


Gentoo update for kdebase
Vendor Patch. Secunia Advisory 14 of 142 in 2003. 6,527 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10259
Solution Status:
Vendor Patch
Criticality:
Impact:
Brute force
Privilege escalation
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for kdebase. These fix two vulnerabilities, which can be exploited by malicious users to escalate their privileges or by malicious people to brute force the session cookie. [Read More]


Gentoo update for apache2
Vendor Patch. Secunia Advisory 15 of 142 in 2003. 11,634 views.
Release Date:
2003-10-31
Secunia Advisory ID:
SA10114
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for apache2. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or escalate privileges. [Read More]


Gentoo update for Cfengine
Vendor Patch. Secunia Advisory 16 of 142 in 2003. 7,038 views.
Release Date:
2003-10-06
Secunia Advisory ID:
SA9942
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for Cfengine. This fixes a vulnerability, which potentially could lead to execution of arbitrary code. [Read More]


Gentoo update for vpopmail
Vendor Patch. Secunia Advisory 17 of 142 in 2003. 8,078 views.
Release Date:
2003-10-04
Secunia Advisory ID:
SA9929
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for vpopmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Gentoo update for OpenSSL
Vendor Patch. Secunia Advisory 18 of 142 in 2003. 7,333 views.
Release Date:
2003-10-02
Secunia Advisory ID:
SA9910
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updated packages for OpenSSL. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for TeaPOP
Vendor Patch. Secunia Advisory 19 of 142 in 2003. 7,001 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9899
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for TeaPOP. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks against a vulnerable mail server. [Read More]


Gentoo update for mpg123
Vendor Patch. Secunia Advisory 20 of 142 in 2003. 8,114 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9898
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg123. This fixes an older vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 21 of 142 in 2003. 6,830 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9880
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for proftpd
Vendor Patch. Secunia Advisory 22 of 142 in 2003. 7,759 views.
Release Date:
2003-09-30
Secunia Advisory ID:
SA9881
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ProFTPD. This fixes a vulnerability, which can be exploited by some malicious users to compromise a vulnerable system. [Read More]


Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 23 of 142 in 2003. 7,865 views.
Release Date:
2003-09-24
Secunia Advisory ID:
SA9826
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for OpenSSH. This fixes a vulnerability in the PAM implementation, which could lead to system compromise. [Read More]


Gentoo update for sendmail
Vendor Patch. Secunia Advisory 24 of 142 in 2003. 6,910 views.
Release Date:
2003-09-18
Secunia Advisory ID:
SA9766
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for sendmail. These fixes a vulnerability which possibly could allow malicious people to gain system access. [Read More]


Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 25 of 142 in 2003. 7,063 views.
Release Date:
2003-09-17
Secunia Advisory ID:
SA9749
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ssh. These fix a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for Pine
Vendor Patch. Secunia Advisory 26 of 142 in 2003. 7,175 views.
Release Date:
2003-09-16
Secunia Advisory ID:
SA9737
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Pine. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for Exim
Vendor Patch. Secunia Advisory 27 of 142 in 2003. 8,101 views.
Release Date:
2003-09-15
Secunia Advisory ID:
SA9733
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for exim. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or compromise it. [Read More]


Gentoo update for MySQL
Vendor Patch. Secunia Advisory 28 of 142 in 2003. 7,997 views.
Release Date:
2003-09-15
Secunia Advisory ID:
SA9730
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for MySQL. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 29 of 142 in 2003. 7,657 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9653
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an updated version of phpwebsite. This fixes some vulnerabilities, which can be exploited by malicious people to conduct Cross Site Scripting and SQL injection attacks. [Read More]


Gentoo update for horde
Vendor Patch. Secunia Advisory 30 of 142 in 2003. 8,535 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9649
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes a vulnerability, which potentially can be exploited by malicious people to gain unauthorised access to an account. [Read More]


Gentoo update for atari800
Vendor Patch. Secunia Advisory 31 of 142 in 2003. 9,868 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9657
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for atari800. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for gallery
Vendor Patch. Secunia Advisory 32 of 142 in 2003. 8,033 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9656
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for Gallery. This fixes a vulnerability, which can be exploited by malicious people to conduct Cross Site Scripting attacks against other users. [Read More]


Gentoo update for eroaster
Vendor Patch. Secunia Advisory 33 of 142 in 2003. 8,697 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9655
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for eroaster. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for mindi
Vendor Patch. Secunia Advisory 34 of 142 in 2003. 7,713 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9654
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mindi. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for pam_smb
Vendor Patch. Secunia Advisory 35 of 142 in 2003. 7,704 views.
Release Date:
2003-09-01
Secunia Advisory ID:
SA9644
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for pam_smb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for vmware-workstation
Vendor Patch. Secunia Advisory 36 of 142 in 2003. 10,997 views.
Release Date:
2003-08-26
Secunia Advisory ID:
SA9606
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an updated version of vmware-workstation. This fixes some vulnerabilities, which can be exploited by malicious, local users to escalate their privileges. [Read More]


Gentoo update for Semi
Vendor Patch. Secunia Advisory 37 of 142 in 2003. 8,809 views.
Release Date:
2003-08-15
Secunia Advisory ID:
SA9537
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for semi, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for gentoo-sources
Vendor Patch. Secunia Advisory 38 of 142 in 2003. 9,842 views.
Release Date:
2003-08-14
Secunia Advisory ID:
SA9533
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for gentoo-sources fixing three vulnerabilities. [Read More]


Gentoo update for gnupg
Vendor Patch. Secunia Advisory 39 of 142 in 2003. 8,363 views.
Release Date:
2003-07-23
Secunia Advisory ID:
SA9328
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Gentoo has issued an update for gnupg to fix a vulnerability allowing local users to overwrite certain files. [Read More]


Linux Kernel 2.4 Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 40 of 142 in 2003. 20,929 views.
Release Date:
2003-07-22
Secunia Advisory ID:
SA9316
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities has been identified in the Linux Kernel. [Read More]


Gentoo update for nfs-utils
Vendor Patch. Secunia Advisory 41 of 142 in 2003. 9,195 views.
Release Date:
2003-07-21
Secunia Advisory ID:
SA9309
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for nfs-utils. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


nfs-utils "xlog()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 42 of 142 in 2003. 16,819 views.
Release Date:
2003-07-14
Secunia Advisory ID:
SA9259
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in nfs-utils, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for cistronradius
Vendor Patch. Secunia Advisory 43 of 142 in 2003. 7,985 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9241
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cistronradius. This fixes a vulnerability, which can be exploited by malicious people to crash a server and potentially compromise it. [Read More]


Gentoo update for ypserv
Vendor Patch. Secunia Advisory 44 of 142 in 2003. 7,377 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9240
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for ypserv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable NIS server. [Read More]


Gentoo update for gtksee
Vendor Patch. Secunia Advisory 45 of 142 in 2003. 8,135 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9239
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gtksee. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for unzip
Vendor Patch. Secunia Advisory 46 of 142 in 2003. 8,581 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9238
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by overwriting arbitrary files on it. [Read More]


Gentoo update for mikmod
Vendor Patch. Secunia Advisory 47 of 142 in 2003. 8,372 views.
Release Date:
2003-07-03
Secunia Advisory ID:
SA9174
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mikmod. This fixes a vulnerability, which potentially could be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for noweb
Vendor Patch. Secunia Advisory 48 of 142 in 2003. 8,574 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9145
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for noweb. This fixes a vulnerability, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


Gentoo update for gnocatan
Vendor Patch. Secunia Advisory 49 of 142 in 2003. 7,391 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9144
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gnocatan. This fixes several vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


Gentoo update for phpBB
Vendor Patch. Secunia Advisory 50 of 142 in 2003. 9,190 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9148
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpBB. This fixes a vulnerability, which allows malicious people to inject arbitrary SQL code. [Read More]


Gentoo update for ethereal
Vendor Patch. Secunia Advisory 51 of 142 in 2003. 8,286 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9121
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for Ethereal. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a system running a vulnerable version of Ethereal. [Read More]


Gentoo update for proftpd
Vendor Patch. Secunia Advisory 52 of 142 in 2003. 7,999 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9120
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for proftpd. This fixes a vulnerability, which allows malicious people to inject arbitrary SQL code. [Read More]


Gentoo update for xpdf
Vendor Patch. Secunia Advisory 53 of 142 in 2003. 7,697 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9119
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Xpdf. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by luring the user into viewing a specially crafted PDF document. [Read More]


Gentoo update for acroread
Vendor Patch. Secunia Advisory 54 of 142 in 2003. 7,610 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9118
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by luring the user into viewing a specially crafted PDF document. [Read More]


Linux-PAM User Name Spoofing Vulnerability
Vendor Patch. Secunia Advisory 55 of 142 in 2003. 16,177 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9057
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in Linux-PAM, which allows malicious, local users to escalate their privileges. [Read More]


Gentoo update for kon2
Vendor Patch. Secunia Advisory 56 of 142 in 2003. 9,073 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9033
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for kon2. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for gzip
Vendor Patch. Secunia Advisory 57 of 142 in 2003. 7,518 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9032
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for gzip. This fixes two vulnerabilities, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for LPRng
Vendor Patch. Secunia Advisory 58 of 142 in 2003. 8,237 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9031
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for LPRng. This fixes a vulnerability in "psbanner", which can be exploited by malicious, local users to overwrite certain files on the system. [Read More]


Gentoo update for Ghostscript
Vendor Patch. Secunia Advisory 59 of 142 in 2003. 8,329 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9029
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious, local users to overwrite certain files on a vulnerable system. [Read More]


Gentoo update for CUPS
Vendor Patch. Secunia Advisory 60 of 142 in 2003. 8,758 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9039
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes a vulnerability, which can be exploited by a malicious user to cause a DoS (Denial of Service) on a print server. [Read More]


Gentoo update for atftp
Vendor Patch. Secunia Advisory 61 of 142 in 2003. 9,023 views.
Release Date:
2003-06-09
Secunia Advisory ID:
SA8969
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for atftp. This closes a buffer overflow vulnerability in the handling of long filenames allowing a malicious server to execute arbitrary code on the client. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 62 of 142 in 2003. 15,347 views.
Release Date:
2003-06-03
Secunia Advisory ID:
SA8936
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Three vulnerabilities have been identified in the Linux Kernel 2.4 branch. One can be exploited to cause a Denial of Service by a malicious person and is very similar to the recent Linux Kernel Denial of Service. The others are local Denial of Service vulnerabilities. [Read More]


Gentoo update for uw-imapd
Vendor Patch. Secunia Advisory 63 of 142 in 2003. 7,807 views.
Release Date:
2003-06-03
Secunia Advisory ID:
SA8923
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for uw-imapd. This fixes a vulnerability in the imap client allowing malicious servers to gain system access on the client. [Read More]


Gentoo update for Apache
Vendor Patch. Secunia Advisory 64 of 142 in 2003. 8,570 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8916
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes two Apache vulnerabilities, which can be exploited to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


Gentoo update for tomcat
Vendor Patch. Secunia Advisory 65 of 142 in 2003. 8,366 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8912
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for tomcat. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Gentoo update for maelstrom
Vendor Patch. Secunia Advisory 66 of 142 in 2003. 7,963 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8918
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for maelstrom. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for heimdal
Vendor Patch. Secunia Advisory 67 of 142 in 2003. 8,701 views.
Release Date:
2003-05-27
Secunia Advisory ID:
SA8866
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for heimdal, which fix multiple vulnerabilities in the Kerberos v4 protocol. [Read More]


Gentoo update for Nessus
Vendor Patch. Secunia Advisory 68 of 142 in 2003. 7,765 views.
Release Date:
2003-05-27
Secunia Advisory ID:
SA8865
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for nessus. This fixes some vulnerabilities, which can potentially allow malicious users to escalate privileges or malicious people to compromise a vulnerable system. [Read More]


Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 69 of 142 in 2003. 6,906 views.
Release Date:
2003-05-02
Secunia Advisory ID:
SA8721
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to identify valid users on a vulnerable system. [Read More]


Gentoo update for balsa
Vendor Patch. Secunia Advisory 70 of 142 in 2003. 6,726 views.
Release Date:
2003-04-30
Secunia Advisory ID:
SA8704
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for balsa. This fixes a vulnerabillity in the handling of IMAP folders, which might allow malicious servers to execute arbitrary code on the client system. [Read More]


Gentoo update for monkeyd
Vendor Patch. Secunia Advisory 71 of 142 in 2003. 6,147 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8673
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for monkeyd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for pptpd
Vendor Patch. Secunia Advisory 72 of 142 in 2003. 7,319 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8675
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pptpd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for mgetty
Vendor Patch. Secunia Advisory 73 of 142 in 2003. 7,951 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8674
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mgetty. This fixes two vulnerabilities, which can be exploited to compromise a vulnerable system or escalate privileges. [Read More]


Xinetd Connection Reject Memory Leak
Vendor Patch. Secunia Advisory 74 of 142 in 2003. 13,056 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8632
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Xinetd, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. [Read More]


Gentoo update for Snort
Vendor Patch. Secunia Advisory 75 of 142 in 2003. 7,989 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8629
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Snort. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a system running Snort. [Read More]


Snort TCP reassembly heap overflow
Vendor Patch. Secunia Advisory 76 of 142 in 2003. 13,202 views.
Release Date:
2003-04-16
Secunia Advisory ID:
SA8605
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
A vulnerability was reported in Snort, which could be exploited by a malicious person to execute arbitrary code on the system running Snort. [Read More]


Gentoo update for kdegraphics
Vendor Patch. Secunia Advisory 77 of 142 in 2003. 6,620 views.
Release Date:
2003-04-15
Secunia Advisory ID:
SA8596
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdegraphics. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for KDE 2.x
Vendor Patch. Secunia Advisory 78 of 142 in 2003. 6,429 views.
Release Date:
2003-04-11
Secunia Advisory ID:
SA8577
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for KDE 2.x. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for KDE 3.x
Vendor Patch. Secunia Advisory 79 of 142 in 2003. 6,910 views.
Release Date:
2003-04-11
Secunia Advisory ID:
SA8569
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for KDE 3.x. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 80 of 142 in 2003. 7,069 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8555
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by anonymous users to gain root privileges on a vulnerable system. [Read More]


Gentoo update for Apache
Vendor Patch. Secunia Advisory 81 of 142 in 2003. 6,873 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8554
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable webserver. [Read More]


Gentoo update for setiathome
Vendor Patch. Secunia Advisory 82 of 142 in 2003. 7,566 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8556
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for setiathome. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Samba exploitable buffer overflow
Vendor Patch. Secunia Advisory 83 of 142 in 2003. 17,863 views.
Release Date:
2003-04-07
Secunia Advisory ID:
SA8533
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Samba is vulnerable to a buffer overflow, which can be exploited by anonymous users. [Read More]


Gentoo update for openafs
Vendor Patch. Secunia Advisory 84 of 142 in 2003. 6,654 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8451
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Spoofing
Security Bypass
Where:
From remote
Short Description:
Gentoo has an update for openafs to address a cryptographic weakness. [Read More]


Gentoo update for sendmail
Vendor Patch. Secunia Advisory 85 of 142 in 2003. 6,205 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8455
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for sendmail. This fixes a vulnerability in the address parsing, which potentially can be exploited to compromise a vulnerable mail server. [Read More]


Gentoo update for krb5 and mit-krb5
Vendor Patch. Secunia Advisory 86 of 142 in 2003. 5,481 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8457
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has released updated packages for krb5 and mit-krb5, which fix multiple vulnerabilities in Kerberos. [Read More]


Gentoo update for dietlibc
Vendor Patch. Secunia Advisory 87 of 142 in 2003. 5,719 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8459
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for dietlibc. A vulnerability has been discovered allowing malicious users to cause an integer overflow. This could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


Sendmail Address Parsing Buffer Overflow
Vendor Patch. Secunia Advisory 88 of 142 in 2003. 20,918 views.
Release Date:
2003-03-30
Secunia Advisory ID:
SA8446
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Sendmail, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for stunnel
Vendor Patch. Secunia Advisory 89 of 142 in 2003. 7,314 views.
Release Date:
2003-03-26
Secunia Advisory ID:
SA8416
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an update for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


Gentoo updates for mod_ssl
Vendor Patch. Secunia Advisory 90 of 142 in 2003. 6,413 views.
Release Date:
2003-03-25
Secunia Advisory ID:
SA8404
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released updates for mod_ssl. These eliminate an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


Gentoo updates for glibc
Vendor Workaround. Secunia Advisory 91 of 142 in 2003. 6,889 views.
Release Date:
2003-03-25
Secunia Advisory ID:
SA8403
Solution Status:
Vendor Workaround
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for RPC XDR. A vulnerability has been discovered allowing malicious users to cause an integer overflow, this could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


Gentoo updates for evolution
Vendor Patch. Secunia Advisory 92 of 142 in 2003. 6,222 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8378
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued updates for Evolution. Three vulnerabilities has been identified in Evolution, the worst could lead to system access. [Read More]


Gentoo update for openssl
Vendor Patch. Secunia Advisory 93 of 142 in 2003. 6,381 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8394
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes a vulnerability, which allows malicious people to retrieve the premaster-secret. [Read More]


Gentoo update for bitchx
Vendor Patch. Secunia Advisory 94 of 142 in 2003. 6,136 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8393
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has released an update for bitchx. This eliminates multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo updates for mutt
Vendor Patch. Secunia Advisory 95 of 142 in 2003. 6,408 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8380
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mutt. A vulnerabillity has been identified in the handling of IMAP folders which might allow malicious servers to execute arbitrary code on the client system. [Read More]


Gentoo updates for the kernel
Vendor Patch. Secunia Advisory 96 of 142 in 2003. 6,769 views.
Release Date:
2003-03-21
Secunia Advisory ID:
SA8375
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
[Read More]


Gentoo update for OpenSSL
Vendor Patch. Secunia Advisory 97 of 142 in 2003. 6,775 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8351
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an update for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


Multiple Vendor RPC XDR Library Integer Overflow
Vendor Patch. Secunia Advisory 98 of 142 in 2003. 15,784 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8347
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability identified in multiple *NIX operating systems and software can be exploited by malicious people to conduct a DoS attack (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


Gentoo update for rxvt
Vendor Patch. Secunia Advisory 99 of 142 in 2003. 6,351 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8354
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for rxvt. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


Gentoo update for qpopper
Vendor Patch. Secunia Advisory 100 of 142 in 2003. 5,952 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8304
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for qpopper. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable server. [Read More]


Gentoo updates for samba
Vendor Patch. Secunia Advisory 101 of 142 in 2003. 7,509 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8303
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable samba server. [Read More]


Samba Packet Fragment Re-assembly Buffer Overflow
Vendor Patch. Secunia Advisory 102 of 142 in 2003. 17,976 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8299
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Samba, which can be exploited by a malicious person to compromise a vulnerable server. [Read More]


Gentoo updates for file
Vendor Patch. Secunia Advisory 103 of 142 in 2003. 6,089 views.
Release Date:
2003-03-11
Secunia Advisory ID:
SA8264
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has released updates for the utility "file". These fix a vulnerability exploitable by malicious, local users to escalate their privileges. [Read More]


Gentoo updates for mysqlcc
Vendor Patch. Secunia Advisory 104 of 142 in 2003. 6,886 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8251
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Gentoo has issued updates for mysqlcc. mysqlcc left all configuration and connection files world readable. [Read More]


Gentoo updates for netscape and flash
Vendor Patch. Secunia Advisory 105 of 142 in 2003. 6,133 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8248
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for netscape to fix the vulnerabilities in flash player prior to 6.0.79 [Read More]


Gentoo updates for ethereal
Vendor Patch. Secunia Advisory 106 of 142 in 2003. 6,511 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8253
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for Ethereal. Two vulnerabilities has been discovered, a format string vulnerability in the handling of certain socks packets and a heap overflow in the handling of NTLMSSP. [Read More]


Gentoo update for snort
Vendor Patch. Secunia Advisory 107 of 142 in 2003. 6,115 views.
Release Date:
2003-03-06
Secunia Advisory ID:
SA8232
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has released an update for snort. This fixes a vulnerability, which can be exploited by a malicious person to compromise a system running snort. [Read More]


File utility possible privilege escalation
Vendor Patch. Secunia Advisory 108 of 142 in 2003. 9,637 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8224
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A boundary error identified in the utility "file" included in many *nix distributions can potentially be exploited by malicious users to escalate their privileges. [Read More]


Gentoo updates for tcpdump
Vendor Patch. Secunia Advisory 109 of 142 in 2003. 6,325 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8218
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
[Read More]


Gentoo updates for sendmail
Vendor Patch. Secunia Advisory 110 of 142 in 2003. 5,668 views.
Release Date:
2003-03-04
Secunia Advisory ID:
SA8207
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sendmail. Sendmail has been found vulnerable to an issue that could lead to remote root compromise. The problem is with parsing of certain headers. [Read More]


Gentoo updates for eterm
Vendor Patch. Secunia Advisory 111 of 142 in 2003. 6,738 views.
Release Date:
2003-03-03
Secunia Advisory ID:
SA8189
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for eterm. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


Gentoo updates for vte
Vendor Patch. Secunia Advisory 112 of 142 in 2003. 7,143 views.
Release Date:
2003-03-03
Secunia Advisory ID:
SA8188
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for vte. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


Gentoo update for tightvnc
Vendor Patch. Secunia Advisory 113 of 142 in 2003. 8,394 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8132
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for TightVNC. This fixes a vulnerability allowing attackers to perform a replay attack. [Read More]


Gentoo update for VNC
Vendor Patch. Secunia Advisory 114 of 142 in 2003. 7,027 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8131
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for VNC. This fixes a vulnerability allowing attackers to perform a replay attack. [Read More]


Gentoo updates for usermin
Vendor Patch. Secunia Advisory 115 of 142 in 2003. 6,702 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8127
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
[Read More]


Gentoo updates for apcupsd
Vendor Patch. Secunia Advisory 116 of 142 in 2003. 6,720 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8126
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for apcupsd. A vulnerability in apcupsd can be exploited by malicious users to compromise a slave device. [Read More]


Gentoo updates for webmin
Vendor Patch. Secunia Advisory 117 of 142 in 2003. 6,941 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8116
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for webmin. The author of Webmin recommends everybody to upgrade to version 1.070, due to an unspecified vulnerability in all previous versions. [Read More]


Gentoo updates for bitchx
Vendor Patch. Secunia Advisory 118 of 142 in 2003. 6,173 views.
Release Date:
2003-02-21
Secunia Advisory ID:
SA8108
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates to fix a vulnerability in the BitchX IRC client, which can be exploited by a malicious IRC server to cause a DoS (Denial of Service). [Read More]


Gentoo updates for openssl
Vendor Patch. Secunia Advisory 119 of 142 in 2003. 5,767 views.
Release Date:
2003-02-21
Secunia Advisory ID:
SA8105
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an updated package for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of a used plaintext block in a SSL/TLS session. [Read More]


Gentoo updates for php and mod_php
Vendor Patch. Secunia Advisory 120 of 142 in 2003. 8,135 views.
Release Date:
2003-02-19
Secunia Advisory ID:
SA8094
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updates for php and mod_php. A vulnerability has been discovered, which could be exploited if PHP 4.3.0 is configured to use "/cgi-bin/php". [Read More]


Gentoo updates for nethack
Vendor Patch. Secunia Advisory 121 of 142 in 2003. 6,278 views.
Release Date:
2003-02-18
Secunia Advisory ID:
SA8082
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
[Read More]


Gentoo updates for syslinux
Vendor Patch. Secunia Advisory 122 of 142 in 2003. 7,288 views.
Release Date:
2003-02-18
Secunia Advisory ID:
SA8077
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for syslinux. Security flaws has been identified in syslinux, which could be exploited to gain privileges if syslinux is installed setuid root. [Read More]


Gentoo updates for w3m
Vendor Patch. Secunia Advisory 123 of 142 in 2003. 6,665 views.
Release Date:
2003-02-17
Secunia Advisory ID:
SA8074
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued updates for w3m to fix two Cross Site Scripting vulnerabilities. [Read More]


Gentoo updates for mailman
Vendor Patch. Secunia Advisory 124 of 142 in 2003. 6,683 views.
Release Date:
2003-02-17
Secunia Advisory ID:
SA8066
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued updates for mailman. These fix a vulnerability, which can be exploited by a malicious person to mount a XSS attack (Cross-Site Scripting) against a user. [Read More]


Gentoo updates to bladeenc
Vendor Patch. Secunia Advisory 125 of 142 in 2003. 6,574 views.
Release Date:
2003-02-05
Secunia Advisory ID:
SA8002
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update to bladeenc. This fixes a vulnerability, which can be exploited by a hacker to compromise a user's system if the user is lured into playing a malicious wave file. [Read More]


Gentoo updates to qt-dcgui
Vendor Patch. Secunia Advisory 126 of 142 in 2003. 6,772 views.
Release Date:
2003-02-05
Secunia Advisory ID:
SA7999
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Exposure of sensitive information
Exposure of system information
Where:
From remote
Short Description:
[Read More]


Gentoo updates to Mail-SpamAssasin
Vendor Patch. Secunia Advisory 127 of 142 in 2003. 8,938 views.
Release Date:
2003-02-03
Secunia Advisory ID:
SA7983
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to Mail-SpamAssasin. These fix a vulnerability, which can be exploited by hackers to compromise a vulnerable system. [Read More]


Gentoo updates to slocate
Vendor Patch. Secunia Advisory 128 of 142 in 2003. 8,987 views.
Release Date:
2003-02-03
Secunia Advisory ID:
SA7982
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates to slocate. These eliminate a vulnerability, which can be exploited by malicious, local users to escalate their privileges. [Read More]


Gentoo updates to CVS
Vendor Patch. Secunia Advisory 129 of 142 in 2003. 5,855 views.
Release Date:
2003-01-21
Secunia Advisory ID:
SA7914
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to fix the double-free vulnerability in CVS, allowing anonymous remote users to execute arbitrary code. [Read More]


Gentoo updates to kde
Vendor Patch. Secunia Advisory 130 of 142 in 2003. 6,727 views.
Release Date:
2003-01-19
Secunia Advisory ID:
SA7897
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to KDE. KDE does not handle URLs properly, this can be exploited to run arbitrary commands. The problem is that URLs are not verified and quoted correctly. This allows malicious persons to include shell metacharacters. [Read More]


Gentoo update for dhcp
Vendor Patch. Secunia Advisory 131 of 142 in 2003. 7,023 views.
Release Date:
2003-01-17
Secunia Advisory ID:
SA7894
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dhcp. This fixes a stack overflow in the minires library. [Read More]


Gentoo update to fnord
Vendor Patch. Secunia Advisory 132 of 142 in 2003. 7,056 views.
Release Date:
2003-01-17
Secunia Advisory ID:
SA7893
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to fnord. fnord contains a buffer overflow in a cgi program it is not known if this is exploitable. [Read More]


Gentoo update to mod_php / php
Vendor Patch. Secunia Advisory 133 of 142 in 2003. 6,726 views.
Release Date:
2003-01-13
Secunia Advisory ID:
SA7855
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to mod_php / php. [Read More]


Gentoo update for libpng
Vendor Patch. Secunia Advisory 134 of 142 in 2003. 6,617 views.
Release Date:
2003-01-09
Secunia Advisory ID:
SA7836
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpng. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update to lcdproc
Vendor Patch. Secunia Advisory 135 of 142 in 2003. 7,358 views.
Release Date:
2003-01-08
Secunia Advisory ID:
SA7829
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to lcdproc. lcdproc suffers a buffer overflow allowing execution of arbitrary code. [Read More]


Gentoo updates to monopd
Vendor Patch. Secunia Advisory 136 of 142 in 2003. 7,103 views.
Release Date:
2003-01-07
Secunia Advisory ID:
SA7820
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to monopd. A buffer overflow exists in the monopd messaging framework which can be exploited to run arbitrary commands with the privileges of the user running monopd. [Read More]


Gentoo update to http-fetcher
Vendor Patch. Secunia Advisory 137 of 142 in 2003. 6,383 views.
Release Date:
2003-01-07
Secunia Advisory ID:
SA7823
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to the http-fetcher library. The problem is that certain input is treated correctly, this allows for trivial buffer overflows and execution of arbitrary code. [Read More]


Gentoo updates to libmcrypt
Vendor Patch. Secunia Advisory 138 of 142 in 2003. 6,022 views.
Release Date:
2003-01-06
Secunia Advisory ID:
SA7814
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
[Read More]


Gentoo updates to dhcpcd
Vendor Patch. Secunia Advisory 139 of 142 in 2003. 6,867 views.
Release Date:
2003-01-06
Secunia Advisory ID:
SA7813
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages to dhcpcd. [Read More]


Gentoo updates to leafnode
Vendor Patch. Secunia Advisory 140 of 142 in 2003. 8,534 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7801
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates to leafnode. leafnode does not handle cross posted newsgroup messages correct, when the group name of one group is also the prefix of the name of another group. [Read More]


Gentoo updates to xpdf
Vendor Patch. Secunia Advisory 141 of 142 in 2003. 5,704 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7800
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to xpdf to fix an integer overflow. [Read More]


Gentoo updates to CUPS
Vendor Patch. Secunia Advisory 142 of 142 in 2003. 6,879 views.
Release Date:
2003-01-01
Secunia Advisory ID:
SA7794
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to CUPS to fix multiple vulnerabilities. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability