Linux and Main: The Question Is: Who Stole What From Whom? At the base of it all is SCO's claim that some code it owns found its way into the Linux kernel. Or, to be more specific, that some code to which it may or may not have purchased rights from someone else found its way into the Linux 2.4.x kernels. [Linux Today] 7:37:55 PM ![]() |
[teknoids] Job opening at University of Tulsa College of Law [Teknoids mailing list] Ben finally gets the job Emory and Tulsa begins searching for a replacement. 4:53:37 PM ![]() |
LURHQ Corporation LURHQ Corporation:"CERT Advisory CA-2003-09 describes a buffer overflow in core Microsoft Windows DLL ntdll.dll. The vulnerability was found to be exploitable through the WebDav publishing service of IIS 5.0. Since the release of the advisory, several exploits have surfaced, with varying degrees of effectiveness. While the fact that this exploit requires too much brute-forcing to make an efficient worm, it remains that a dedicated attacker will always be able to penetrate a vulnerable IIS server over a period of time. This paper is intended to catalog the various exploits available and provide Snort signatures to detect each one. If you know of any original WebDav exploits not listed here, send details to Joe Stewart " I don't know how, but this keeps turning up on our Win2k boxes though they are patched up properly. 12:24:03 PM ![]() |