navigation bar left navigation bar right

navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2105 Secunia advisories
8207 Vulnerabilities

Monitor Product Receive alerts for this product





142 Secunia Advisories in 2003

Secunia has issued a total of 142 Secunia advisories in 2003 for Gentoo Linux. Currently, 0% (0 out of 142) are marked as unpatched.

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Gentoo update for CVS
Vendor Patch. Secunia Advisory 1 of 142 in 2003. 8,818 views.
Release Date:
2003-12-29
Secunia Advisory ID:
SA10503
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for CVS. These fix a vulnerability, which can be exploited by malicious users to gain escalated privileges on a vulnerable system. [Read More]


patched Gentoo update for net-ftp/lftp
Vendor Patch. Secunia Advisory 2 of 142 in 2003. 8,647 views.
Release Date:
2003-12-18
Secunia Advisory ID:
SA10459
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an updated package for net-ftp/lftp. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 3 of 142 in 2003. 8,867 views.
Release Date:
2003-12-12
Secunia Advisory ID:
SA10418
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for gnupg. These fix two vulnerabilities, which may expose the private key when using El-Gamal type 20 keys and allow malicious people to compromise systems using the experimental HKP interface. [Read More]


patched Gentoo update for cvs
Vendor Patch. Secunia Advisory 4 of 142 in 2003. 8,909 views.
Release Date:
2003-12-11
Secunia Advisory ID:
SA10407
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued updated packages for cvs. These fix a vulnerability, which can be exploited by malicious users to create arbitrary folders and possibly files in the root of the host's file system. [Read More]


patched Gentoo update for kernel
Vendor Patch. Secunia Advisory 5 of 142 in 2003. 8,997 views.
Release Date:
2003-12-05
Secunia Advisory ID:
SA10366
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for the kernel. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges. [Read More]


patched Gentoo update for rsync
Vendor Patch. Secunia Advisory 6 of 142 in 2003. 11,777 views.
Release Date:
2003-12-04
Secunia Advisory ID:
SA10358
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for rsync. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for net-dialup/freeradius
Vendor Patch. Secunia Advisory 7 of 142 in 2003. 10,223 views.
Release Date:
2003-11-26
Secunia Advisory ID:
SA10296
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an updated version of net-dialup/freeradius. This fixes two vulnerabilities, which can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for phpSysInfo
Vendor Patch. Secunia Advisory 8 of 142 in 2003. 8,660 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10290
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
[Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 9 of 142 in 2003. 8,644 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10293
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for Ethereal. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system running Ethereal. [Read More]


patched Gentoo update for libnids
Vendor Patch. Secunia Advisory 10 of 142 in 2003. 9,334 views.
Release Date:
2003-11-25
Secunia Advisory ID:
SA10291
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updated packages for libnids. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for Opera
Vendor Patch. Secunia Advisory 11 of 142 in 2003. 7,848 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10266
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued packages for opera. These fix a vulnerability, which can be exploited by malicious web sites and emails to crash the browser. [Read More]


patched Gentoo update for hylafax
Vendor Patch. Secunia Advisory 12 of 142 in 2003. 8,294 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10265
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for hylafax. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for apache
Vendor Patch. Secunia Advisory 13 of 142 in 2003. 10,925 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10260
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued updated packages for apache. These fix some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or escalate privileges. [Read More]


patched Gentoo update for kdebase
Vendor Patch. Secunia Advisory 14 of 142 in 2003. 6,551 views.
Release Date:
2003-11-20
Secunia Advisory ID:
SA10259
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Brute force
Privilege escalation
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for kdebase. These fix two vulnerabilities, which can be exploited by malicious users to escalate their privileges or by malicious people to brute force the session cookie. [Read More]


patched Gentoo update for apache2
Vendor Patch. Secunia Advisory 15 of 142 in 2003. 11,758 views.
Release Date:
2003-10-31
Secunia Advisory ID:
SA10114
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for apache2. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or escalate privileges. [Read More]


patched Gentoo update for Cfengine
Vendor Patch. Secunia Advisory 16 of 142 in 2003. 7,062 views.
Release Date:
2003-10-06
Secunia Advisory ID:
SA9942
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for Cfengine. This fixes a vulnerability, which potentially could lead to execution of arbitrary code. [Read More]


patched Gentoo update for vpopmail
Vendor Patch. Secunia Advisory 17 of 142 in 2003. 8,109 views.
Release Date:
2003-10-04
Secunia Advisory ID:
SA9929
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for vpopmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


patched Gentoo update for OpenSSL
Vendor Patch. Secunia Advisory 18 of 142 in 2003. 7,365 views.
Release Date:
2003-10-02
Secunia Advisory ID:
SA9910
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updated packages for OpenSSL. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for TeaPOP
Vendor Patch. Secunia Advisory 19 of 142 in 2003. 7,037 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9899
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for TeaPOP. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks against a vulnerable mail server. [Read More]


patched Gentoo update for mpg123
Vendor Patch. Secunia Advisory 20 of 142 in 2003. 8,150 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9898
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg123. This fixes an older vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mplayer
Vendor Patch. Secunia Advisory 21 of 142 in 2003. 6,868 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9880
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for proftpd
Vendor Patch. Secunia Advisory 22 of 142 in 2003. 7,792 views.
Release Date:
2003-09-30
Secunia Advisory ID:
SA9881
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ProFTPD. This fixes a vulnerability, which can be exploited by some malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 23 of 142 in 2003. 7,902 views.
Release Date:
2003-09-24
Secunia Advisory ID:
SA9826
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for OpenSSH. This fixes a vulnerability in the PAM implementation, which could lead to system compromise. [Read More]


patched Gentoo update for sendmail
Vendor Patch. Secunia Advisory 24 of 142 in 2003. 6,944 views.
Release Date:
2003-09-18
Secunia Advisory ID:
SA9766
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for sendmail. These fixes a vulnerability which possibly could allow malicious people to gain system access. [Read More]


patched Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 25 of 142 in 2003. 7,096 views.
Release Date:
2003-09-17
Secunia Advisory ID:
SA9749
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ssh. These fix a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for Pine
Vendor Patch. Secunia Advisory 26 of 142 in 2003. 7,215 views.
Release Date:
2003-09-16
Secunia Advisory ID:
SA9737
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Pine. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for Exim
Vendor Patch. Secunia Advisory 27 of 142 in 2003. 8,131 views.
Release Date:
2003-09-15
Secunia Advisory ID:
SA9733
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for exim. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or compromise it. [Read More]


patched Gentoo update for MySQL
Vendor Patch. Secunia Advisory 28 of 142 in 2003. 8,029 views.
Release Date:
2003-09-15
Secunia Advisory ID:
SA9730
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for MySQL. These fix a vulnerability, which can be exploited by malicious users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for horde
Vendor Patch. Secunia Advisory 29 of 142 in 2003. 8,567 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9649
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes a vulnerability, which potentially can be exploited by malicious people to gain unauthorised access to an account. [Read More]


patched Gentoo update for atari800
Vendor Patch. Secunia Advisory 30 of 142 in 2003. 9,903 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9657
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for atari800. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for gallery
Vendor Patch. Secunia Advisory 31 of 142 in 2003. 8,064 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9656
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for Gallery. This fixes a vulnerability, which can be exploited by malicious people to conduct Cross Site Scripting attacks against other users. [Read More]


patched Gentoo update for eroaster
Vendor Patch. Secunia Advisory 32 of 142 in 2003. 8,733 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9655
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for eroaster. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for mindi
Vendor Patch. Secunia Advisory 33 of 142 in 2003. 7,741 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9654
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mindi. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 34 of 142 in 2003. 7,689 views.
Release Date:
2003-09-02
Secunia Advisory ID:
SA9653
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an updated version of phpwebsite. This fixes some vulnerabilities, which can be exploited by malicious people to conduct Cross Site Scripting and SQL injection attacks. [Read More]


patched Gentoo update for pam_smb
Vendor Patch. Secunia Advisory 35 of 142 in 2003. 7,735 views.
Release Date:
2003-09-01
Secunia Advisory ID:
SA9644
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for pam_smb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for vmware-workstation
Vendor Patch. Secunia Advisory 36 of 142 in 2003. 11,023 views.
Release Date:
2003-08-26
Secunia Advisory ID:
SA9606
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an updated version of vmware-workstation. This fixes some vulnerabilities, which can be exploited by malicious, local users to escalate their privileges. [Read More]


patched Gentoo update for Semi
Vendor Patch. Secunia Advisory 37 of 142 in 2003. 8,842 views.
Release Date:
2003-08-15
Secunia Advisory ID:
SA9537
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for semi, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for gentoo-sources
Vendor Patch. Secunia Advisory 38 of 142 in 2003. 9,872 views.
Release Date:
2003-08-14
Secunia Advisory ID:
SA9533
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Privilege escalation
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for gentoo-sources fixing three vulnerabilities. [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 39 of 142 in 2003. 8,402 views.
Release Date:
2003-07-23
Secunia Advisory ID:
SA9328
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Where:
Local system
Short Description:
Gentoo has issued an update for gnupg to fix a vulnerability allowing local users to overwrite certain files. [Read More]


patched Linux Kernel 2.4 Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 40 of 142 in 2003. 20,983 views.
Release Date:
2003-07-22
Secunia Advisory ID:
SA9316
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities has been identified in the Linux Kernel. [Read More]


patched Gentoo update for nfs-utils
Vendor Patch. Secunia Advisory 41 of 142 in 2003. 9,227 views.
Release Date:
2003-07-21
Secunia Advisory ID:
SA9309
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued updated packages for nfs-utils. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched nfs-utils "xlog()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 42 of 142 in 2003. 16,922 views.
Release Date:
2003-07-14
Secunia Advisory ID:
SA9259
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in nfs-utils, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for cistronradius
Vendor Patch. Secunia Advisory 43 of 142 in 2003. 8,021 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9241
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cistronradius. This fixes a vulnerability, which can be exploited by malicious people to crash a server and potentially compromise it. [Read More]


patched Gentoo update for ypserv
Vendor Patch. Secunia Advisory 44 of 142 in 2003. 7,409 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9240
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for ypserv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable NIS server. [Read More]


patched Gentoo update for gtksee
Vendor Patch. Secunia Advisory 45 of 142 in 2003. 8,173 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9239
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gtksee. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for unzip
Vendor Patch. Secunia Advisory 46 of 142 in 2003. 8,622 views.
Release Date:
2003-07-11
Secunia Advisory ID:
SA9238
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by overwriting arbitrary files on it. [Read More]


patched Gentoo update for mikmod
Vendor Patch. Secunia Advisory 47 of 142 in 2003. 8,391 views.
Release Date:
2003-07-03
Secunia Advisory ID:
SA9174
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mikmod. This fixes a vulnerability, which potentially could be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for gnocatan
Vendor Patch. Secunia Advisory 48 of 142 in 2003. 7,427 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9144
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gnocatan. This fixes several vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


patched Gentoo update for phpBB
Vendor Patch. Secunia Advisory 49 of 142 in 2003. 9,226 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9148
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpBB. This fixes a vulnerability, which allows malicious people to inject arbitrary SQL code. [Read More]


patched Gentoo update for noweb
Vendor Patch. Secunia Advisory 50 of 142 in 2003. 8,608 views.
Release Date:
2003-06-30
Secunia Advisory ID:
SA9145
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for noweb. This fixes a vulnerability, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 51 of 142 in 2003. 8,323 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9121
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for Ethereal. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a system running a vulnerable version of Ethereal. [Read More]


patched Gentoo update for proftpd
Vendor Patch. Secunia Advisory 52 of 142 in 2003. 8,022 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9120
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for proftpd. This fixes a vulnerability, which allows malicious people to inject arbitrary SQL code. [Read More]


patched Gentoo update for xpdf
Vendor Patch. Secunia Advisory 53 of 142 in 2003. 7,729 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9119
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Xpdf. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by luring the user into viewing a specially crafted PDF document. [Read More]


patched Gentoo update for acroread
Vendor Patch. Secunia Advisory 54 of 142 in 2003. 7,647 views.
Release Date:
2003-06-26
Secunia Advisory ID:
SA9118
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system by luring the user into viewing a specially crafted PDF document. [Read More]


patched Linux-PAM User Name Spoofing Vulnerability
Vendor Patch. Secunia Advisory 55 of 142 in 2003. 16,209 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9057
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in Linux-PAM, which allows malicious, local users to escalate their privileges. [Read More]


patched Gentoo update for gzip
Vendor Patch. Secunia Advisory 56 of 142 in 2003. 7,555 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9032
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for gzip. This fixes two vulnerabilities, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for LPRng
Vendor Patch. Secunia Advisory 57 of 142 in 2003. 8,282 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9031
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for LPRng. This fixes a vulnerability in "psbanner", which can be exploited by malicious, local users to overwrite certain files on the system. [Read More]


patched Gentoo update for Ghostscript
Vendor Patch. Secunia Advisory 58 of 142 in 2003. 8,362 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9029
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious, local users to overwrite certain files on a vulnerable system. [Read More]


patched Gentoo update for CUPS
Vendor Patch. Secunia Advisory 59 of 142 in 2003. 8,795 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9039
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes a vulnerability, which can be exploited by a malicious user to cause a DoS (Denial of Service) on a print server. [Read More]


patched Gentoo update for kon2
Vendor Patch. Secunia Advisory 60 of 142 in 2003. 9,108 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9033
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for kon2. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for atftp
Vendor Patch. Secunia Advisory 61 of 142 in 2003. 9,056 views.
Release Date:
2003-06-09
Secunia Advisory ID:
SA8969
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for atftp. This closes a buffer overflow vulnerability in the handling of long filenames allowing a malicious server to execute arbitrary code on the client. [Read More]


patched Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 62 of 142 in 2003. 15,388 views.
Release Date:
2003-06-03
Secunia Advisory ID:
SA8936
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Three vulnerabilities have been identified in the Linux Kernel 2.4 branch. One can be exploited to cause a Denial of Service by a malicious person and is very similar to the recent Linux Kernel Denial of Service. The others are local Denial of Service vulnerabilities. [Read More]


patched Gentoo update for uw-imapd
Vendor Patch. Secunia Advisory 63 of 142 in 2003. 7,841 views.
Release Date:
2003-06-03
Secunia Advisory ID:
SA8923
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for uw-imapd. This fixes a vulnerability in the imap client allowing malicious servers to gain system access on the client. [Read More]


patched Gentoo update for tomcat
Vendor Patch. Secunia Advisory 64 of 142 in 2003. 8,396 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8912
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for tomcat. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


patched Gentoo update for maelstrom
Vendor Patch. Secunia Advisory 65 of 142 in 2003. 7,988 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8918
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for maelstrom. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Gentoo update for Apache
Vendor Patch. Secunia Advisory 66 of 142 in 2003. 8,599 views.
Release Date:
2003-06-02
Secunia Advisory ID:
SA8916
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes two Apache vulnerabilities, which can be exploited to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


patched Gentoo update for heimdal
Vendor Patch. Secunia Advisory 67 of 142 in 2003. 8,740 views.
Release Date:
2003-05-27
Secunia Advisory ID:
SA8866
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Spoofing
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for heimdal, which fix multiple vulnerabilities in the Kerberos v4 protocol. [Read More]


patched Gentoo update for Nessus
Vendor Patch. Secunia Advisory 68 of 142 in 2003. 7,807 views.
Release Date:
2003-05-27
Secunia Advisory ID:
SA8865
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for nessus. This fixes some vulnerabilities, which can potentially allow malicious users to escalate privileges or malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for OpenSSH
Vendor Patch. Secunia Advisory 69 of 142 in 2003. 6,935 views.
Release Date:
2003-05-02
Secunia Advisory ID:
SA8721
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to identify valid users on a vulnerable system. [Read More]


patched Gentoo update for balsa
Vendor Patch. Secunia Advisory 70 of 142 in 2003. 6,761 views.
Release Date:
2003-04-30
Secunia Advisory ID:
SA8704
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for balsa. This fixes a vulnerabillity in the handling of IMAP folders, which might allow malicious servers to execute arbitrary code on the client system. [Read More]


patched Gentoo update for pptpd
Vendor Patch. Secunia Advisory 71 of 142 in 2003. 7,354 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8675
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pptpd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mgetty
Vendor Patch. Secunia Advisory 72 of 142 in 2003. 7,981 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8674
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mgetty. This fixes two vulnerabilities, which can be exploited to compromise a vulnerable system or escalate privileges. [Read More]


patched Gentoo update for monkeyd
Vendor Patch. Secunia Advisory 73 of 142 in 2003. 6,184 views.
Release Date:
2003-04-28
Secunia Advisory ID:
SA8673
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for monkeyd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Xinetd Connection Reject Memory Leak
Vendor Patch. Secunia Advisory 74 of 142 in 2003. 13,100 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8632
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Xinetd, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. [Read More]


patched Gentoo update for Snort
Vendor Patch. Secunia Advisory 75 of 142 in 2003. 8,025 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8629
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Snort. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a system running Snort. [Read More]


patched Snort TCP reassembly heap overflow
Vendor Patch. Secunia Advisory 76 of 142 in 2003. 13,281 views.
Release Date:
2003-04-16
Secunia Advisory ID:
SA8605
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability was reported in Snort, which could be exploited by a malicious person to execute arbitrary code on the system running Snort. [Read More]


patched Gentoo update for kdegraphics
Vendor Patch. Secunia Advisory 77 of 142 in 2003. 6,671 views.
Release Date:
2003-04-15
Secunia Advisory ID:
SA8596
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdegraphics. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for KDE 2.x
Vendor Patch. Secunia Advisory 78 of 142 in 2003. 6,471 views.
Release Date:
2003-04-11
Secunia Advisory ID:
SA8577
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for KDE 2.x. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for KDE 3.x
Vendor Patch. Secunia Advisory 79 of 142 in 2003. 6,950 views.
Release Date:
2003-04-11
Secunia Advisory ID:
SA8569
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for KDE 3.x. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for Apache
Vendor Patch. Secunia Advisory 80 of 142 in 2003. 6,911 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8554
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable webserver. [Read More]


patched Gentoo update for setiathome
Vendor Patch. Secunia Advisory 81 of 142 in 2003. 7,609 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8556
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for setiathome. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for samba
Vendor Patch. Secunia Advisory 82 of 142 in 2003. 7,109 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8555
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by anonymous users to gain root privileges on a vulnerable system. [Read More]


patched Samba exploitable buffer overflow
Vendor Patch. Secunia Advisory 83 of 142 in 2003. 17,918 views.
Release Date:
2003-04-07
Secunia Advisory ID:
SA8533
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From local network
Short Description:
Samba is vulnerable to a buffer overflow, which can be exploited by anonymous users. [Read More]


patched Gentoo update for openafs
Vendor Patch. Secunia Advisory 84 of 142 in 2003. 6,687 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8451
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of system information
Spoofing
Security Bypass
Where:
From remote
Short Description:
Gentoo has an update for openafs to address a cryptographic weakness. [Read More]


patched Gentoo update for sendmail
Vendor Patch. Secunia Advisory 85 of 142 in 2003. 6,238 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8455
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for sendmail. This fixes a vulnerability in the address parsing, which potentially can be exploited to compromise a vulnerable mail server. [Read More]


patched Gentoo update for krb5 and mit-krb5
Vendor Patch. Secunia Advisory 86 of 142 in 2003. 5,515 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8457
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has released updated packages for krb5 and mit-krb5, which fix multiple vulnerabilities in Kerberos. [Read More]


patched Gentoo update for dietlibc
Vendor Patch. Secunia Advisory 87 of 142 in 2003. 5,750 views.
Release Date:
2003-03-31
Secunia Advisory ID:
SA8459
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for dietlibc. A vulnerability has been discovered allowing malicious users to cause an integer overflow. This could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


patched Sendmail Address Parsing Buffer Overflow
Vendor Patch. Secunia Advisory 88 of 142 in 2003. 20,960 views.
Release Date:
2003-03-30
Secunia Advisory ID:
SA8446
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Sendmail, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for stunnel
Vendor Patch. Secunia Advisory 89 of 142 in 2003. 7,343 views.
Release Date:
2003-03-26
Secunia Advisory ID:
SA8416
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an update for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


patched Gentoo updates for mod_ssl
Vendor Patch. Secunia Advisory 90 of 142 in 2003. 6,446 views.
Release Date:
2003-03-25
Secunia Advisory ID:
SA8404
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released updates for mod_ssl. These eliminate an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


patched Gentoo updates for glibc
Vendor Workaround. Secunia Advisory 91 of 142 in 2003. 6,920 views.
Release Date:
2003-03-25
Secunia Advisory ID:
SA8403
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for RPC XDR. A vulnerability has been discovered allowing malicious users to cause an integer overflow, this could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


patched Gentoo updates for evolution
Vendor Patch. Secunia Advisory 92 of 142 in 2003. 6,246 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8378
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued updates for Evolution. Three vulnerabilities has been identified in Evolution, the worst could lead to system access. [Read More]


patched Gentoo update for openssl
Vendor Patch. Secunia Advisory 93 of 142 in 2003. 6,407 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8394
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes a vulnerability, which allows malicious people to retrieve the premaster-secret. [Read More]


patched Gentoo update for bitchx
Vendor Patch. Secunia Advisory 94 of 142 in 2003. 6,164 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8393
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has released an update for bitchx. This eliminates multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo updates for mutt
Vendor Patch. Secunia Advisory 95 of 142 in 2003. 6,430 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8380
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mutt. A vulnerabillity has been identified in the handling of IMAP folders which might allow malicious servers to execute arbitrary code on the client system. [Read More]


patched Gentoo updates for the kernel
Vendor Patch. Secunia Advisory 96 of 142 in 2003. 6,791 views.
Release Date:
2003-03-21
Secunia Advisory ID:
SA8375
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
[Read More]


patched Multiple Vendor RPC XDR Library Integer Overflow
Vendor Patch. Secunia Advisory 97 of 142 in 2003. 15,809 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8347
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability identified in multiple *NIX operating systems and software can be exploited by malicious people to conduct a DoS attack (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


patched Gentoo update for rxvt
Vendor Patch. Secunia Advisory 98 of 142 in 2003. 6,380 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8354
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for rxvt. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


patched Gentoo update for OpenSSL
Vendor Patch. Secunia Advisory 99 of 142 in 2003. 6,804 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8351
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an update for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of the RSA secret. [Read More]


patched Gentoo update for qpopper
Vendor Patch. Secunia Advisory 100 of 142 in 2003. 5,976 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8304
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for qpopper. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable server. [Read More]


patched Gentoo updates for samba
Vendor Patch. Secunia Advisory 101 of 142 in 2003. 7,573 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8303
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable samba server. [Read More]


patched Samba Packet Fragment Re-assembly Buffer Overflow
Vendor Patch. Secunia Advisory 102 of 142 in 2003. 18,048 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8299
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Samba, which can be exploited by a malicious person to compromise a vulnerable server. [Read More]


patched Gentoo updates for file
Vendor Patch. Secunia Advisory 103 of 142 in 2003. 6,123 views.
Release Date:
2003-03-11
Secunia Advisory ID:
SA8264
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has released updates for the utility "file". These fix a vulnerability exploitable by malicious, local users to escalate their privileges. [Read More]


patched Gentoo updates for netscape and flash
Vendor Patch. Secunia Advisory 104 of 142 in 2003. 6,163 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8248
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for netscape to fix the vulnerabilities in flash player prior to 6.0.79 [Read More]


patched Gentoo updates for ethereal
Vendor Patch. Secunia Advisory 105 of 142 in 2003. 6,547 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8253
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for Ethereal. Two vulnerabilities has been discovered, a format string vulnerability in the handling of certain socks packets and a heap overflow in the handling of NTLMSSP. [Read More]


patched Gentoo updates for mysqlcc
Vendor Patch. Secunia Advisory 106 of 142 in 2003. 6,924 views.
Release Date:
2003-03-10
Secunia Advisory ID:
SA8251
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Exposure of system information
Where:
Local system
Short Description:
Gentoo has issued updates for mysqlcc. mysqlcc left all configuration and connection files world readable. [Read More]


patched Gentoo update for snort
Vendor Patch. Secunia Advisory 107 of 142 in 2003. 6,139 views.
Release Date:
2003-03-06
Secunia Advisory ID:
SA8232
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has released an update for snort. This fixes a vulnerability, which can be exploited by a malicious person to compromise a system running snort. [Read More]


patched File utility possible privilege escalation
Vendor Patch. Secunia Advisory 108 of 142 in 2003. 9,668 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8224
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A boundary error identified in the utility "file" included in many *nix distributions can potentially be exploited by malicious users to escalate their privileges. [Read More]


patched Gentoo updates for tcpdump
Vendor Patch. Secunia Advisory 109 of 142 in 2003. 6,344 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8218
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates for sendmail
Vendor Patch. Secunia Advisory 110 of 142 in 2003. 5,695 views.
Release Date:
2003-03-04
Secunia Advisory ID:
SA8207
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sendmail. Sendmail has been found vulnerable to an issue that could lead to remote root compromise. The problem is with parsing of certain headers. [Read More]


patched Gentoo updates for eterm
Vendor Patch. Secunia Advisory 111 of 142 in 2003. 6,761 views.
Release Date:
2003-03-03
Secunia Advisory ID:
SA8189
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for eterm. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


patched Gentoo updates for vte
Vendor Patch. Secunia Advisory 112 of 142 in 2003. 7,169 views.
Release Date:
2003-03-03
Secunia Advisory ID:
SA8188
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for vte. These eliminate a vulnerability allowing malicious people to manipulate actions taken by the system administrator and other users on a system. [Read More]


patched Gentoo update for VNC
Vendor Patch. Secunia Advisory 113 of 142 in 2003. 7,053 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8131
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for VNC. This fixes a vulnerability allowing attackers to perform a replay attack. [Read More]


patched Gentoo updates for usermin
Vendor Patch. Secunia Advisory 114 of 142 in 2003. 6,728 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8127
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates for apcupsd
Vendor Patch. Secunia Advisory 115 of 142 in 2003. 6,743 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8126
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for apcupsd. A vulnerability in apcupsd can be exploited by malicious users to compromise a slave device. [Read More]


patched Gentoo updates for webmin
Vendor Patch. Secunia Advisory 116 of 142 in 2003. 6,962 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8116
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for webmin. The author of Webmin recommends everybody to upgrade to version 1.070, due to an unspecified vulnerability in all previous versions. [Read More]


patched Gentoo update for tightvnc
Vendor Patch. Secunia Advisory 117 of 142 in 2003. 8,430 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8132
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for TightVNC. This fixes a vulnerability allowing attackers to perform a replay attack. [Read More]


patched Gentoo updates for bitchx
Vendor Patch. Secunia Advisory 118 of 142 in 2003. 6,198 views.
Release Date:
2003-02-21
Secunia Advisory ID:
SA8108
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates to fix a vulnerability in the BitchX IRC client, which can be exploited by a malicious IRC server to cause a DoS (Denial of Service). [Read More]


patched Gentoo updates for openssl
Vendor Patch. Secunia Advisory 119 of 142 in 2003. 5,798 views.
Release Date:
2003-02-21
Secunia Advisory ID:
SA8105
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has released an updated package for openssl. This eliminates an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of a used plaintext block in a SSL/TLS session. [Read More]


patched Gentoo updates for php and mod_php
Vendor Patch. Secunia Advisory 120 of 142 in 2003. 8,160 views.
Release Date:
2003-02-19
Secunia Advisory ID:
SA8094
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updates for php and mod_php. A vulnerability has been discovered, which could be exploited if PHP 4.3.0 is configured to use "/cgi-bin/php". [Read More]


patched Gentoo updates for syslinux
Vendor Patch. Secunia Advisory 121 of 142 in 2003. 7,330 views.
Release Date:
2003-02-18
Secunia Advisory ID:
SA8077
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for syslinux. Security flaws has been identified in syslinux, which could be exploited to gain privileges if syslinux is installed setuid root. [Read More]


patched Gentoo updates for nethack
Vendor Patch. Secunia Advisory 122 of 142 in 2003. 6,305 views.
Release Date:
2003-02-18
Secunia Advisory ID:
SA8082
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
[Read More]


patched Gentoo updates for w3m
Vendor Patch. Secunia Advisory 123 of 142 in 2003. 6,690 views.
Release Date:
2003-02-17
Secunia Advisory ID:
SA8074
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued updates for w3m to fix two Cross Site Scripting vulnerabilities. [Read More]


patched Gentoo updates for mailman
Vendor Patch. Secunia Advisory 124 of 142 in 2003. 6,706 views.
Release Date:
2003-02-17
Secunia Advisory ID:
SA8066
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued updates for mailman. These fix a vulnerability, which can be exploited by a malicious person to mount a XSS attack (Cross-Site Scripting) against a user. [Read More]


patched Gentoo updates to bladeenc
Vendor Patch. Secunia Advisory 125 of 142 in 2003. 6,600 views.
Release Date:
2003-02-05
Secunia Advisory ID:
SA8002
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update to bladeenc. This fixes a vulnerability, which can be exploited by a hacker to compromise a user's system if the user is lured into playing a malicious wave file. [Read More]


patched Gentoo updates to qt-dcgui
Vendor Patch. Secunia Advisory 126 of 142 in 2003. 6,802 views.
Release Date:
2003-02-05
Secunia Advisory ID:
SA7999
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
Exposure of sensitive information
Exposure of system information
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates to Mail-SpamAssasin
Vendor Patch. Secunia Advisory 127 of 142 in 2003. 9,009 views.
Release Date:
2003-02-03
Secunia Advisory ID:
SA7983
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to Mail-SpamAssasin. These fix a vulnerability, which can be exploited by hackers to compromise a vulnerable system. [Read More]


patched Gentoo updates to slocate
Vendor Patch. Secunia Advisory 128 of 142 in 2003. 9,047 views.
Release Date:
2003-02-03
Secunia Advisory ID:
SA7982
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates to slocate. These eliminate a vulnerability, which can be exploited by malicious, local users to escalate their privileges. [Read More]


patched Gentoo updates to CVS
Vendor Patch. Secunia Advisory 129 of 142 in 2003. 5,882 views.
Release Date:
2003-01-21
Secunia Advisory ID:
SA7914
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to fix the double-free vulnerability in CVS, allowing anonymous remote users to execute arbitrary code. [Read More]


patched Gentoo updates to kde
Vendor Patch. Secunia Advisory 130 of 142 in 2003. 6,758 views.
Release Date:
2003-01-19
Secunia Advisory ID:
SA7897
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to KDE. KDE does not handle URLs properly, this can be exploited to run arbitrary commands. The problem is that URLs are not verified and quoted correctly. This allows malicious persons to include shell metacharacters. [Read More]


patched Gentoo update for dhcp
Vendor Patch. Secunia Advisory 131 of 142 in 2003. 7,050 views.
Release Date:
2003-01-17
Secunia Advisory ID:
SA7894
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dhcp. This fixes a stack overflow in the minires library. [Read More]


patched Gentoo update to fnord
Vendor Patch. Secunia Advisory 132 of 142 in 2003. 7,117 views.
Release Date:
2003-01-17
Secunia Advisory ID:
SA7893
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to fnord. fnord contains a buffer overflow in a cgi program it is not known if this is exploitable. [Read More]


patched Gentoo update to mod_php / php
Vendor Patch. Secunia Advisory 133 of 142 in 2003. 6,752 views.
Release Date:
2003-01-13
Secunia Advisory ID:
SA7855
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to mod_php / php. [Read More]


patched Gentoo update for libpng
Vendor Patch. Secunia Advisory 134 of 142 in 2003. 6,645 views.
Release Date:
2003-01-09
Secunia Advisory ID:
SA7836
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpng. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update to lcdproc
Vendor Patch. Secunia Advisory 135 of 142 in 2003. 7,444 views.
Release Date:
2003-01-08
Secunia Advisory ID:
SA7829
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to lcdproc. lcdproc suffers a buffer overflow allowing execution of arbitrary code. [Read More]


patched Gentoo update to http-fetcher
Vendor Patch. Secunia Advisory 136 of 142 in 2003. 6,443 views.
Release Date:
2003-01-07
Secunia Advisory ID:
SA7823
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to the http-fetcher library. The problem is that certain input is treated correctly, this allows for trivial buffer overflows and execution of arbitrary code. [Read More]


patched Gentoo updates to monopd
Vendor Patch. Secunia Advisory 137 of 142 in 2003. 7,128 views.
Release Date:
2003-01-07
Secunia Advisory ID:
SA7820
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to monopd. A buffer overflow exists in the monopd messaging framework which can be exploited to run arbitrary commands with the privileges of the user running monopd. [Read More]


patched Gentoo updates to libmcrypt
Vendor Patch. Secunia Advisory 138 of 142 in 2003. 6,048 views.
Release Date:
2003-01-06
Secunia Advisory ID:
SA7814
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
[Read More]


patched Gentoo updates to dhcpcd
Vendor Patch. Secunia Advisory 139 of 142 in 2003. 6,889 views.
Release Date:
2003-01-06
Secunia Advisory ID:
SA7813
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages to dhcpcd. [Read More]


patched Gentoo updates to leafnode
Vendor Patch. Secunia Advisory 140 of 142 in 2003. 8,611 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7801
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates to leafnode. leafnode does not handle cross posted newsgroup messages correct, when the group name of one group is also the prefix of the name of another group. [Read More]


patched Gentoo updates to xpdf
Vendor Patch. Secunia Advisory 141 of 142 in 2003. 5,727 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7800
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to xpdf to fix an integer overflow. [Read More]


patched Gentoo updates to CUPS
Vendor Patch. Secunia Advisory 142 of 142 in 2003. 6,952 views.
Release Date:
2003-01-01
Secunia Advisory ID:
SA7794
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates to CUPS to fix multiple vulnerabilities. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+