Dubnové záplaty Microsoftu: kritické trio s důležitým doplňkem

Diskuze čtenářů k článku

mexičan  |  14. 04. 2004 01:05  | 

To se pak nemůžou divit, možná by se měli na chvilku zastavit a jeden z těch systémů udělat pořádně, myslím, že zákazníci by jim pak klidně na novou verzi počkali i 5let.

Souhlasím  |  Nesouhlasím  |  Odpovědět
mexicanka juanita  |  14. 04. 2004 05:47  | 

Keby len to... ale aj pocet clankov na zive.cz by klesol, tym padom aj honorare autorov a to by bol pruser (po slovensky priekak). Este ze mame MS, aj business frci, aj novinari maju o com pisat...

Souhlasím  |  Nesouhlasím  |  Odpovědět
Karel Kahovec  |  14. 04. 2004 06:56  | 

Aj linuxisti majú o čom pindať...

Souhlasím  |  Nesouhlasím  |  Odpovědět
...  |  14. 04. 2004 08:21  | 

a Kahovec jim tise v koutku zavidet ;))

Souhlasím  |  Nesouhlasím  |  Odpovědět
StreamLine  |  15. 04. 2004 01:11  | 

Nemalo by to po slovensky byť prieser?

Souhlasím  |  Nesouhlasím  |  Odpovědět
hnus  |  14. 04. 2004 10:22  | 

[06.04.2004] DSA-478 tcpdump - denial of service
[06.04.2004] DSA-477 xine-ui - insecure temporary file creation
[06.04.2004] DSA-476 heimdal - cross-realm
[05.04.2004] DSA-475 linux-kernel-2.4.18-hppa - several vulnerabilities
[03.04.2004] DSA-474 squid - ACL bypass
[03.04.2004] DSA-473 oftpd - denial of service
[03.04.2004] DSA-472 fte - several vulnerabilities
[02.04.2004] DSA-471 interchange - missing input sanitising
[01.04.2004] DSA-470 linux-kernel-2.4.17-hppa - several vulnerabilities
[29.03.2004] DSA-469 pam-pgsql - missing input sanitising

Souhlasím  |  Nesouhlasím  |  Odpovědět
clockann  |  14. 04. 2004 10:47  | 

Hmmm...
To jsou vesmes veci, ktere prumerny uzivatel vubec nainstalovany nema
Proste to neokecate...Bezpecnost Windows je o dost horsi.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Wiz.  |  14. 04. 2004 14:59  | 

Opravdu linux-kernel vetsina uyivatelu nainstalovano nema ))))))))))))))))))))))))

Souhlasím  |  Nesouhlasím  |  Odpovědět
Flasi  |  14. 04. 2004 15:22  | 

Mel byste absolvovat nejaky kurs logiky. To, ze vetsinu veci z toho uzivatele nemaji neznamena, ze nekterou z danych veci nema nainstalovanu vetsina uzivatelu. Mimochodem si vsimnete, ze ty dve chyby v kernelu se tykaji kazda jine verze, takze prumerneho uzivatele bude trapit nejvysse jedna z nich. Nebo taky zadna.

Souhlasím  |  Nesouhlasím  |  Odpovědět
michal  |  14. 04. 2004 16:40  | 

linux-kernel pro PA-RISC skutecne vetsina uzivatelu nainstalovany nema

Souhlasím  |  Nesouhlasím  |  Odpovědět
hnus  |  14. 04. 2004 10:23  | 

[06 Apr 2004] DSA-478 tcpdump - denial of service
[06 Apr 2004] DSA-477 xine-ui - insecure temporary file creation
[06 Apr 2004] DSA-476 heimdal - cross-realm
[05 Apr 2004] DSA-475 linux-kernel-2.4.18-hppa - several vulnerabilities
[03 Apr 2004] DSA-474 squid - ACL bypass
[03 Apr 2004] DSA-473 oftpd - denial of service
[03 Apr 2004] DSA-472 fte - several vulnerabilities
[02 Apr 2004] DSA-471 interchange - missing input sanitising
[01 Apr 2004] DSA-470 linux-kernel-2.4.17-hppa - several vulnerabilities
[29 Mar 2004] DSA-469 pam-pgsql - missing input sanitising
[24 Mar 2004] DSA-468 emil - several vulnerabilities
[23 Mar 2004] DSA-467 ecartis - several vulnerabilities
[18 Mar 2004] DSA-466 linux-kernel-2.2.10-powerpc-apus - failing function and TLB flush
[17 Mar 2004] DSA-465 openssl - several vulnerabilities
[16 Mar 2004] DSA-464 gdk-pixbuf - broken image handling
[12 Mar 2004] DSA-463 samba - privilege escalation
[12 Mar 2004] DSA-462 xitalk - missing privilege release
[11 Mar 2004] DSA-461 calife - buffer overflow
[10 Mar 2004] DSA-460 sysstat - insecure temporary file
[10 Mar 2004] DSA-459 kdelibs - cookie path traversal
[09 Mar 2004] DSA-458 python2.2 - buffer overflow
[08 Mar 2004] DSA-457 wu-ftpd - several vulnerabilities
[06 Mar 2004] DSA-456 linux-kernel-2.2.19-arm - failing function and TLB flush
[03 Mar 2004] DSA-455 libxml - buffer overflows
[02 Mar 2004] DSA-454 linux-kernel-2.2.22-alpha - failing function and TLB flush
[02 Mar 2004] DSA-453 linux-kernel-2.2.20-i386+m68k+powerpc - failing function and TLB flush
[29 Feb 2004] DSA-452 libapache-mod-python - denial of service
[27 Feb 2004] DSA-451 xboing - buffer overflows
[27 Feb 2004] DSA-450 linux-kernel-2.4.19-mips - several vulnerabilities
[24 Feb 2004] DSA-449 metamail - buffer overflow, format string bugs
[22 Feb 2004] DSA-448 pwlib - several vulnerabilities
[22 Feb 2004] DSA-447 hsftp - format string
[21 Feb 2004] DSA-446 synaesthesia - insecure file creation
[21 Feb 2004] DSA-445 lbreakout2 - buffer overflow
[20 Feb 2004] DSA-444 linux-kernel-2.4.17-ia64 - missing function return value check
[19 Feb 2004] DSA-443 xfree86 - several vulnerabilities
[19 Feb 2004] DSA-442 linux-kernel-2.4.17-s390 - several vulnerabilities
[18 Feb 2004] DSA-441 linux-kernel-2.4.17-mips+mipsel - missing function return value check
[18 Feb 2004] DSA-440 linux-kernel-2.4.17-powerpc-apus - several vulnerabilities
[18 Feb 2004] DSA-439 linux-kernel-2.4.16-arm - several vulnerabilities
[18 Feb 2004] DSA-438 linux-kernel-2.4.18-alpha+i386+powerpc - missing function return value check
[11 Feb 2004] DSA-437 cgiemail - open mail relay
[08 Feb 2004] DSA-436 mailman - several vulnerabilities
[06 Feb 2004] DSA-435 mpg123 - heap overflow
[05 Feb 2004] DSA-434 gaim - several vulnerabilities
[04 Feb 2004] DSA-433 kernel-patch-2.4.17-mips - integer overflow
[03 Feb 2004] DSA-432 crawl - buffer overflow
[01 Feb 2004] DSA-431 perl - information leak
[28 Jan 2004] DSA-430 trr19 - missing privilege release
[26 Jan 2004] DSA-429 gnupg - cryptographic weakness
[20 Jan 2004] DSA-428 slocate - buffer overflow
[19 Jan 2004] DSA-427 linux-kernel-2.4.17-mips+mipsel - missing boundary check
[18 Jan 2004] DSA-426 netpbm-free - insecure temporary files
[16 Jan 2004] DSA-425 tcpdump - multiple vulnerabilities
[16 Jan 2004] DSA-424 mc - buffer overflow
[15 Jan 2004] DSA-423 linux-kernel-2.4.17-ia64 - several vulnerabilities
[13 Jan 2004] DSA-422 cvs - remote vulnerability
[12 Jan 2004] DSA-421 mod-auth-shadow - password expiration
[12 Jan 2004] DSA-420 jitterbug - improperly sanitised input
[09 Jan 2004] DSA-419 phpgroupware - missing filename sanitising, SQL injection
[07 Jan 2004] DSA-418 vbox3 - privilege leak
[07 Jan 2004] DSA-417 linux-kernel-2.4.18-powerpc+alpha - missing boundary check
[06 Jan 2004] DSA-416 fsp - buffer overflow, directory traversal
[06 Jan 2004] DSA-415 zebra - denial of service
[06 Jan 2004] DSA-414 jabber - denial of service
[06 Jan 2004] DSA-413 linux-kernel-2.4.18 - missing boundary check
[05 Jan 2004] DSA-412 nd - buffer overflows
[05 Jan 2004] DSA-411 mpg321 - format string vulnerability
[05 Jan 2004] DSA-410 libnids - buffer overflow
[05 Jan 2004] DSA-409 bind - denial of service
[05 Jan 2004] DSA-408 screen - integer overflow
[05 Jan 2004] DSA-407 ethereal - buffer overflows
[05 Jan 2004] DSA-406 lftp - buffer overflow

Souhlasím  |  Nesouhlasím  |  Odpovědět
hnus  |  14. 04. 2004 10:24  | 

[30 Dec 2003] DSA-405 xsok - missing privilege release
[04 Dec 2003] DSA-404 rsync - heap overflow
[01 Dec 2003] DSA-403 kernel-image-2.4.18-1-alpha, kernel-image-2.4.18-1-i386, kernel-source-2.4.18 - local root exploit
[17 Nov 2003] DSA-402 minimalist - unsanitised input
[17 Nov 2003] DSA-401 hylafax - format strings
[11 Nov 2003] DSA-400 omega-rpg - buffer overflow
[10 Nov 2003] DSA-399 epic4 - buffer overflow
[10 Nov 2003] DSA-398 conquest - buffer overflow
[07 Nov 2003] DSA-397 postgresql - buffer overflow
[29 Oct 2003] DSA-396 thttpd - missing input sanitizing, wrong calculation
[15 Oct 2003] DSA-395 tomcat4 - incorrect input handling
[11 Oct 2003] DSA-394 openssl095 - ASN.1 parsing vulnerability
[01 Oct 2003] DSA-393 openssl - denial of service
[29 Sep 2003] DSA-392 webfs - buffer overflows, file and directory exposure
[28 Sep 2003] DSA-391 freesweep - buffer overflow
[26 Sep 2003] DSA-390 marbles - buffer overflow
[20 Sep 2003] DSA-389 ipmasq - insecure packet filtering rules
[19 Sep 2003] DSA-388 kdebase - several vulnerabilities
[18 Sep 2003] DSA-387 gopher - buffer overflows
[18 Sep 2003] DSA-386 libmailtools-perl - input validation bug
[18 Sep 2003] DSA-385 hztty - buffer overflows
[17 Sep 2003] DSA-384 sendmail - buffer overflows
[17 Sep 2003] DSA-383 ssh-krb5 - possible remote vulnerability
[16 Sep 2003] DSA-382 ssh - possible remote vulnerability
[13 Sep 2003] DSA-381 mysql - buffer overflow
[12 Sep 2003] DSA-380 xfree86 - buffer overflows, denial of service
[11 Sep 2003] DSA-379 sane-backends - several vulnerabilities
[07 Sep 2003] DSA-378 mah-jong - buffer overflows, denial of service
[04 Sep 2003] DSA-377 wu-ftpd - insecure program execution
[04 Sep 2003] DSA-376 exim - buffer overflow
[29 Aug 2003] DSA-375 node - buffer overflow, format string
[26 Aug 2003] DSA-374 libpam-smb - buffer overflow
[16 Aug 2003] DSA-373 autorespond - buffer overflow
[16 Aug 2003] DSA-372 netris - buffer overflow
[11 Aug 2003] DSA-371 perl - cross-site scripting
[08 Aug 2003] DSA-370 pam-pgsql - format string
[08 Aug 2003] DSA-369 zblast - buffer overflow
[08 Aug 2003] DSA-368 xpcd - buffer overflow
[08 Aug 2003] DSA-367 xtokkaetama - buffer overflow
[05 Aug 2003] DSA-366 eroaster - insecure temporary file
[05 Aug 2003] DSA-365 phpgroupware - several vulnerabilities
[04 Aug 2003] DSA-364 man-db - buffer overflows, arbitrary command execution
[03 Aug 2003] DSA-363 postfix - denial of service, bounce-scanning
[02 Aug 2003] DSA-362 mindi - insecure temporary file
[01 Aug 2003] DSA-361 kdelibs, kdelibs-crypto - several vulnerabilities
[01 Aug 2003] DSA-360 xfstt - several vulnerabilities
[31 Jul 2003] DSA-359 atari800 - buffer overflows
[31 Jul 2003] DSA-358 linux-kernel-2.4.18 - several vulnerabilities
[31 Jul 2003] DSA-357 wu-ftpd - remote root exploit
[30 Jul 2003] DSA-356 xtokkaetama - buffer overflows
[30 Jul 2003] DSA-355 gallery - cross-site scripting
[29 Jul 2003] DSA-354 xconq - buffer overflows
[29 Jul 2003] DSA-353 sup - insecure temporary file
[22 Jul 2003] DSA-352 fdclone - insecure temporary directory
[16 Jul 2003] DSA-351 php4 - cross-site scripting
[15 Jul 2003] DSA-350 falconseye - buffer overflow
[14 Jul 2003] DSA-349 nfs-utils - buffer overflow
[11 Jul 2003] DSA-348 traceroute-nanog - integer overflow, buffer overflow
[08 Jul 2003] DSA-347 teapop - SQL injection
[08 Jul 2003] DSA-346 phpsysinfo - directory traversal
[08 Jul 2003] DSA-345 xbl - buffer overflow
[08 Jul 2003] DSA-344 unzip - directory traversal
[08 Jul 2003] DSA-343 skk, ddskk - insecure temporary file
[07 Jul 2003] DSA-342 mozart - unsafe mailcap configuration
[07 Jul 2003] DSA-341 liece - insecure temporary file
[06 Jul 2003] DSA-340 x-face-el - insecure temporary file
[06 Jul 2003] DSA-339 semi - insecure temporary file
[29 Jun 2003] DSA-338 proftpd - SQL injection
[29 Jun 2003] DSA-337 gtksee - buffer overflow
[29 Jun 2003] DSA-336 linux-kernel-2.2.20 - several vulnerabilities
[28 Jun 2003] DSA-335 mantis - incorrect permissions
[28 Jun 2003] DSA-334 xgalaga - buffer overflows
[27 Jun 2003] DSA-333 acm - integer overflow
[27 Jun 2003] DSA-332 linux-kernel-2.4.17 - several vulnerabilities
[27 Jun 2003] DSA-331 imagemagick - insecure temporary file
[23 Jun 2003] DSA-330 tcptraceroute - failure to drop root privileges
[20 Jun 2003] DSA-329 osh - buffer overflows
[19 Jun 2003] DSA-328 webfs - buffer overflow
[19 Jun 2003] DSA-327 xbl - buffer overflows
[19 Jun 2003] DSA-326 orville-write - buffer overflows
[19 Jun 2003] DSA-325 eldav - insecure temporary file
[18 Jun 2003] DSA-324 ethereal - several vulnerabilities
[16 Jun 2003] DSA-323 noweb - insecure temporary files
[16 Jun 2003] DSA-322 typespeed - buffer overflow
[13 Jun 2003] DSA-321 radiusd-cistron - buffer overflow
[13 Jun 2003] DSA-320 mikmod - buffer overflow
[12 Jun 2003] DSA-319 webmin - session ID spoofing
[12 Jun 2003] DSA-318 lyskom-server - denial of service
[11 Jun 2003] DSA-317 cupsys - denial of service
[11 Jun 2003] DSA-316 nethack - buffer overflow, incorrect permissions
[11 Jun 2003] DSA-315 gnocatan - buffer overflows, denial of service
[11 Jun 2003] DSA-314 atftp - buffer overflow
[11 Jun 2003] DSA-313 ethereal - buffer overflows, integer overflows
[09 Jun 2003] DSA-312 kernel-patch-2.4.18-powerpc - several vulnerabilities
[08 Jun 2003] DSA-311 linux-kernel-2.4.18 - several vulnerabilities
[08 Jun 2003] DSA-310 xaos - improper setuid-root execution
[06 Jun 2003] DSA-309 eterm - buffer overflow
[06 Jun 2003] DSA-308 gzip - insecure temporary files
[27 May 2003] DSA-307 gps - multiple vulnerabilities
[19 May 2003] DSA-306 ircii-pana - buffer overflows, integer overflow
[15 May 2003] DSA-305 sendmail - insecure temporary files
[15 May 2003] DSA-304 lv - privilege escalation
[15 May 2003] DSA-303 mysql - privilege escalation
[07 May 2003] DSA-302 fuzz - privilege escalation
[07 May 2003] DSA-301 libgtop - buffer overflow
[06 May 2003] DSA-300 balsa - buffer overflow
[06 May 2003] DSA-299 leksbot - improper setuid-root execution
[02 May 2003] DSA-298 epic4 - buffer overflows
[01 May 2003] DSA-297 snort - integer overflow, buffer overflow
[30 Apr 2003] DSA-296 kdebase - insecure execution
[30 Apr 2003] DSA-295 pptpd - buffer overflow
[23 Apr 2003] DSA-294 gkrellm-newsticker - missing quoting, incomplete parser
[23 Apr 2003] DSA-293 kdelibs - insecure execution
[22 Apr 2003] DSA-292 mime-support - insecure temporary file creation
[22 Apr 2003] DSA-291 ircii - buffer overflows
[17 Apr 2003] DSA-290 sendmail-wide - char-to-int conversion
[17 Apr 2003] DSA-289 rinetd - incorrect memory resizing
[17 Apr 2003] DSA-288 openssl - several vulnerabilities
[15 Apr 2003] DSA-287 epic - buffer overflows
[14 Apr 2003] DSA-286 gs-common - insecure temporary file
[14 Apr 2003] DSA-285 lprng - insecure temporary file
[12 Apr 2003] DSA-284 kdegraphics - insecure execution
[11 Apr 2003] DSA-283 xfsdump - insecure file creation
[09 Apr 2003] DSA-282 glibc - integer overflow
[08 Apr 2003] DSA-281 moxftp - buffer overflow
[07 Apr 2003] DSA-280 samba - buffer overflow
[07 Apr 2003] DSA-279 metrics - insecure temporary file creation
[04 Apr 2003] DSA-278 sendmail - char-to-int conversion
[03 Apr 2003] DSA-277 apcupsd - buffer overflows, format string
[03 Apr 2003] DSA-276 linux-kernel-s390 - local privilege escalation
[02 Apr 2003] DSA-275 lpr-ppd - buffer overflow
[28 Mar 2003] DSA-274 mutt - buffer overflow
[28 Mar 2003] DSA-273 krb4 - Cryptographic weakness
[28 Mar 2003] DSA-272 dietlibc - integer overflow
[27 Mar 2003] DSA-271 ecartis - unauthorized password change
[27 Mar 2003] DSA-270 linux-kernel-mips - local privilege escalation
[26 Mar 2003] DSA-269 heimdal - Cryptographic weakness
[25 Mar 2003] DSA-268 mutt - buffer overflow
[24 Mar 2003] DSA-267 lpr - buffer overflow
[24 Mar 2003] DSA-266 krb5 - several vulnerabilities
[21 Mar 2003] DSA-265 bonsai - several vulnerabilities
[19 Mar 2003] DSA-264 lxr - missing filename sanitizing
[17 Mar 2003] DSA-263 netpbm-free - math overflow errors
[15 Mar 2003] DSA-262 samba - remote exploit
[14 Mar 2003] DSA-261 tcpdump - infinite loop
[13 Mar 2003] DSA-260 file - buffer overflow
[12 Mar 2003] DSA-259 qpopper - mail user privilege escalation
[10 Mar 2003] DSA-258 ethereal - format string vulnerability
[04 Mar 2003] DSA-257 sendmail - remote exploit
[28 Feb 2003] DSA-256 mhc - insecure temporary file
[27 Feb 2003] DSA-255 tcpdump - infinite loop
[27 Feb 2003] DSA-254 traceroute-nanog - buffer overflow
[24 Feb 2003] DSA-253 openssl - information leak
[21 Feb 2003] DSA-252 slocate - buffer overflow
[14 Feb 2003] DSA-251 w3m - missing HTML quoting
[12 Feb 2003] DSA-250 w3mmee-ssl - missing HTML quoting
[11 Feb 2003] DSA-249 w3mmee - missing HTML quoting
[31 Jan 2003] DSA-248 hypermail - buffer overflows
[30 Jan 2003] DSA-247 courier-ssl - missing input sanitizing
[29 Jan 2003] DSA-246 tomcat - information exposure, cross site scripting
[28 Jan 2003] DSA-245 dhcp3 - ignored counter boundary
[27 Jan 2003] DSA-244 noffle - buffer overflows
[24 Jan 2003] DSA-243 kdemultimedia - several vulnerabilities
[24 Jan 2003] DSA-242 kdebase - several vulnerabilities
[24 Jan 2003] DSA-241 kdeutils - several vulnerabilities
[23 Jan 2003] DSA-240 kdegames - several vulnerabilities
[23 Jan 2003] DSA-239 kdesdk - several vulnerabilities
[23 Jan 2003] DSA-238 kdepim - several vulnerabilities
[22 Jan 2003] DSA-237 kdenetwork - several vulnerabilities
[22 Jan 2003] DSA-236 kdelibs - several vulnerabilities
[22 Jan 2003] DSA-235 kdegraphics - several vulnerabilities
[22 Jan 2003] DSA-234 kdeadmin - several vulnerabilities
[21 Jan 2003] DSA-233 cvs - doubly freed memory
[20 Jan 2003] DSA-232 cupsys - several vulnerabilities
[17 Jan 2003] DSA-231 dhcp3 - stack overflows
[16 Jan 2003] DSA-230 bugzilla - insecure permissions, spurious backup files
[15 Jan 2003] DSA-229 imp - SQL injection
[14 Jan 2003] DSA-228 libmcrypt - buffer overflows and memory leak
[13 Jan 2003] DSA-227 openldap2 - buffer overflows and other bugs
[10 Jan 2003] DSA-226 xpdf-i - integer overflow
[09 Jan 2003] DSA-225 tomcat4 - source disclosure
[08 Jan 2003] DSA-224 canna - buffer overflow and more
[07 Jan 2003] DSA-223 geneweb - information exposure
[06 Jan 2003] DSA-222 xpdf - integer overflow
[03 Jan 2003] DSA-221 mhonarc - cross site scripting
[02 Jan 2003] DSA-220 squirrelmail - cross site scripting

Souhlasím  |  Nesouhlasím  |  Odpovědět
Formy  |  14. 04. 2004 10:34  | 

Z toho, cos jste tu vypsal, mám nainstalován jen zlomek. Druhá věc je, že příslušné opravy už jsou na světě a u těch novějších chyb budou taky velice rychle přístupné. Pro zajímavost se koukněte na rok uvedení Win98 a ještě dnes pro řadu věcí u nich oprava neexistuje a vlastně už ani existovat nebude.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Venousekh  |  14. 04. 2004 11:41  | 

Když nemáš v Linuxu skoro nic nainstalovanýho , tak co v něm děláš? Píšeš paměti v emacsu ??

Souhlasím  |  Nesouhlasím  |  Odpovědět
s0m3body  |  14. 04. 2004 12:45  | 

trepes hluposti, vies o tom ?

windows ma 14 remote exploitovatelnych dier v operacnom systeme

pred tym nez to zacnes porovnavat s linuxom, skus si tie linuxove sec advisories prestudovat a ponechat len tie ktore su jednak remote exploitovatelne, a potom sa tykaju komponenty ktora ma porovnatelnu obdobu v microsoft windows os

cize sa skus obmedzit na kernel, X server, nejakeho mail klienta, par zakladnych utilit
neviem o tom ze by mal windows standardne dodavany mail server, proxy server alebo tak ...

alebo skus potom k 14 remote exploitovatelnym dieram priratat vsetky diery v ostatnom software pre windows
kedze vacsina programov pre windows absolutne neimplementuje privilege separation a vsetko bezi pod power userom/administratorom, takmer kazda diera vo windows programe znamena okamzite plnu kontrolu nad pocitacom

Souhlasím  |  Nesouhlasím  |  Odpovědět
Honza  |  14. 04. 2004 14:58  | 

Tohle vsechno znamena, ze i Linux ma sve chyby a mouchy; tj. neni to system neprustrelny a tak bozsky dokonaly...

Souhlasím  |  Nesouhlasím  |  Odpovědět
s0m3body  |  14. 04. 2004 15:11  | 

kto tu kedy hovoril o dokonalosti ?
kazdy rozsiahlejsi software ma nejake chyby, otazka je len ake vazne a ako sa k nim autori stavaju, ci sa snazia zahmlievate ako microsoft, alebo objektivne a otvorene o nich hovorit ako v pripade open source

s linuxom ma clovek tu vyhodu ze on sam sa moze rozhodnut co si chce nainstalovat a co nie
microsoft ti nepovoli nenainstalovat internet explorer alebo rozne jeho rpc prasaciny, a tym padom potrebujes firewall alebo nieco podobne aby si ich chranil pred internetom

pokial si na linux nenanistalujes ziadne servery a pouzivas ho len na pristup von; si na tom co sa tyka bezpecnosti ovela lepsie nez s windowsom
ani nehovoriac o tom ze zrovnavat windows a linux firewall je ako porovnavat kolobezku s pretekarskou motorkou

takisto instalovanie linuxovych zaplat prebieha asi tak, ze si nainstalujes novu verziu toho ktoreho programu a nie x megabajtovy patch po ktorom ti dalsich x veci moze prestat fungovat

Souhlasím  |  Nesouhlasím  |  Odpovědět
Honza  |  14. 04. 2004 15:51  | 

Vim, ze nikdo nemluvil o dokonalosti, ale ze vsech tech diskuzi, kde se rozhorel flame mezi Widlaky a Linuxaky, jsem z obrannych, ale take utocnych reakci nabyl presvedceni, ze Linuxaci prave tento svuj system povznaseji na uroven neceho "dokonaleho".
Ciste muj nazor je, at si kazdej pracuje pod jakym operacnim systemem chce, ale at necpe svoji "ideologii" a hlavne nazory nekomu jinemu. Ten druhy je rad ze je rad a urcite mu prace pod tim jeho operacnim system vyhovuje, protoze kdyby ne, ma prece svobodnou vuli a tak ten doticny muze klidne prejit na jiny operacni system...
At si tudis nechaji svuj nazor o "vykonnosti a super bezpecnosti" sveho systemu, pani Linuxaci (ale i Widlaci), pro sebe.

Souhlasím  |  Nesouhlasím  |  Odpovědět
tom  |  15. 04. 2004 18:16  | 

troubo, kdyby MS neco tutlal vubec by jsi se nic nedocetl na Zive... tak jako je tomu prave aktualne v pripade Linuxu...

Souhlasím  |  Nesouhlasím  |  Odpovědět
Formy  |  14. 04. 2004 14:08  | 

2Venousekh: Paměti píšu ve vi V linuxu dělám mnoho věcí, ale k tomu mám nainstalováno jen to, co opravdu potřebuju.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Miroslav Buček  |  14. 04. 2004 12:01  | 

nenu dulezite, za jak dlouho vyjde oprava, ale za jak dlouho ji uzivatel nainstaluje...

Souhlasím  |  Nesouhlasím  |  Odpovědět
Pavel  |  14. 04. 2004 12:38  | 

A co tim chtel basnik rici? To ze vyjde, je snad zakladni predpoklad, aby si ji uzivatel mohl nainstalovat. Vy snad instalujete zaplaty, co nevysly?

Souhlasím  |  Nesouhlasím  |  Odpovědět
Miroslav Buček  |  14. 04. 2004 12:59  | 

ja se zaplatame vubec nezabyvam... viz automaticke Update...

Souhlasím  |  Nesouhlasím  |  Odpovědět
Petr Mach  |  14. 04. 2004 14:28  | 

No jo, jenze to si nemuzete dovolit na produkcnim systemu, protoze takova zaplata take muze windows nebo aplikaci na nem bezici zneprovoznit. A v prvni rade jde o ochranu prave techto produkcnich systemu.

Souhlasím  |  Nesouhlasím  |  Odpovědět
httpd  |  14. 04. 2004 20:24  | 

Neni to tak davno (par mesicu) co nektere masiny (myslim ze WinXP) nesly po aktualizaci vubec spustit a uzivatele to resili reinstalaci . Proste excelentni

Souhlasím  |  Nesouhlasím  |  Odpovědět
Miroslav Buček  |  14. 04. 2004 22:29  | 

tak o tom nevim nic, ze by fama?

Souhlasím  |  Nesouhlasím  |  Odpovědět
turista  |  14. 04. 2004 23:08  | 

Žádná fáma. Že o tom dotyčný brouk Pytlík neví, neznamená, že to neexistuje. Zapnutí automatických aktualizací si můžou dovolit jen amatéři.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Miroslav Buček  |  14. 04. 2004 23:19  | 

to sme se pobavil... automatickou aktualizaci tu mame zaplou na zhruba deseti pocitacich a na zadnem neni problem... jinak nechapu, proc tuhle funkci nekdo vypina, hrabat se porad nekde na webu a divat se, co se to instaluje, tak na tohle tu nemame cas, koupili sme si produkt, tak at se podpora snazi....

Souhlasím  |  Nesouhlasím  |  Odpovědět
Flasi  |  15. 04. 2004 07:54  | 

Uvidime az vam po instalaci nektere zaplaty prestane fungovat nejaka pro vasi firmu klicova aplikace. Napr. specializovane vyvojove prostredi, nebo nejaka databaze a vasi zamestanci nebudou moci pul dne pracovat. Co vam na to asi rekne sef, kolik jste usetril casu? Nestalo se to u nas, ale napriklad vim, ze po SP4 pro w2k byly nejake problemy v autocadu. Myslim, ze nesly otevrit drive ulozene projekty.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Kero  |  24. 04. 2004 13:10  | 

Asi tak. Na svůj systém záplaty už neistaluju, sice mě to dost mrzí, ale probírat se po reinstalaci systemu vsema zaplatama a zjištovat, která z nich způsobuje, že XP mi zaprznou od 30minut do 1hodiny po po spuštění kompu se mi vážně nechce, i když bych možná měl. Zatím spoléhám na firewall a AVG a programy jine nez napr Outlook expres nebo IE. Zatim mi to vicemene vychazi, ale dockejme casu.

Souhlasím  |  Nesouhlasím  |  Odpovědět
httpd  |  16. 04. 2004 12:42  | 

10pc . Ono se to dela trochu jinak (jsou i jine, lepsi nastroje), ale s 10-ti PC vas to nemusi zajimat .

Souhlasím  |  Nesouhlasím  |  Odpovědět
deda.jabko  |  14. 04. 2004 11:31  | 

fakt pekne, kolik lidi ma nainstalovanou bugzilu a podobne aplikace, nehlede na to, ze treba o moznosti zneuziti integer overflow v xpdf se da uspesne polemizovat.

Souhlasím  |  Nesouhlasím  |  Odpovědět
sweetux  |  14. 04. 2004 11:55  | 

Kdyz tak rad kopirujes, tak Ti taky neco pastnu
Apr 13 2004 Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
Apr 13 2004 Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
Apr 13 2004 Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
Apr 13 2004 Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
Apr 6 2004 Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
Mar 24 2004 Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
Feb 23 2004 Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
Feb 18 2004 Windows XP Kernel NtSystemDebugControl() Flaws Let Local Users With SeDebugPrivilege Execute Arbitrary Code in Kernel Mode
Feb 10 2004 Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
Feb 10 2004 Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
Jan 25 2004 Windows XP Explorer Executes Arbitrary Code in Folders
Jan 13 2004 Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
Nov 11 2003 Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
Oct 15 2003 Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
Oct 15 2003 Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
Oct 15 2003 Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
Oct 15 2003 Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
Oct 15 2003 Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
Oct 14 2003 Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service
Oct 3 2003 Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
Sep 10 2003 Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
Sep 3 2003 Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
Aug 12 2003 (Vendor Issues Worm Alert) Re: Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
Jul 25 2003 (Exploit is Available) Re: Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
Jul 25 2003 (Microsoft Warns Admins to Patch Immediately) Re: Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
Jul 23 2003 Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
Jul 16 2003 Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
Jul 16 2003 Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
Jul 9 2003 Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
Jul 9 2003 (Microsoft Issues Fix) Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
Jul 9 2003 Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
Jul 3 2003 Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
Jun 9 2003 Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
May 21 2003 Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
Apr 22 2003 (NTLMv2 Corrects the Flaw) Re: Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
Apr 20 2003 Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
Apr 20 2003 Windows XP Service Control Manager Timing Flaw in Service Shutdown May Disclose Sensitive Information to Local Users
Apr 18 2003 Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
Apr 16 2003 Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
Apr 15 2003 Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
Apr 9 2003 Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
Apr 2 2003 Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
Mar 26 2003 (Microsoft Issues Fix) Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
Mar 21 2003 (Other Windows 2000 Applications Are Affected) Re: Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
Mar 19 2003 Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
Mar 14 2003 Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
Feb 26 2003 Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
Feb 17 2003 Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
Feb 5 2003 Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
Jan 24 2003 Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
Jan 22 2003 Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
Dec 27 2002 Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
Dec 26 2002 Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
Dec 18 2002 Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
Dec 12 2002 Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
Dec 12 2002 (Microsoft Issues Fix for Java VM) Re: Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
Dec 12 2002 Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
Dec 5 2002 Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
Oct 31 2002 (Microsoft Issues Fix) Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
Oct 31 2002 (Microsoft Issues Fix Instructions) Windows 2000 Operating System Default Permissions for the System Partition Lets Local Users Bypass Individual File Permissions and Replace Key System Files
Oct 18 2002 Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
Oct 17 2002 (Microsoft Issues Fix) Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
Oct 3 2002 (Microsoft Issues Fix) Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
Oct 3 2002 Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
Oct 3 2002 Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
Oct 3 2002 Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
Oct 2 2002 Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
Sep 26 2002 Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
Sep 19 2002 (Microsoft Issues Fix) Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
Sep 19 2002 (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
Sep 19 2002 Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
Sep 18 2002 Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
Sep 18 2002 Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
Sep 11 2002 (Microsoft Issues Windows 2000 Patch) Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
Sep 6 2002 (Microsoft Issues Additional Fixes) Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
Sep 5 2002 (Microsoft Issues Fix) Re: Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
Aug 29 2002 Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
Aug 22 2002 Microsoft Operating System SMB Protocol Implementation in the Network
Aug 16 2002 Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
Aug 15 2002 Microsoft Network Connection Manager Could Give a Local User System Level Privileges
Aug 15 2002 Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
Aug 4 2002 Windows 2000 Operating System Default Permissions for the System Partition Lets Local Users Bypass Individual File Permissions and Replace Key System Files
Jun 13 2002 Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
Jun 3 2002 Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
May 22 2002 Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
Apr 19 2002 Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
Apr 17 2002 Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
Apr 11 2002 Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
Apr 5 2002 (Microsoft Issues Fix) Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
Apr 5 2002 (Microsoft Issues Fix) Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
Apr 4 2002 Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
Apr 2 2002 Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
Mar 15 2002 Windows NT and 2000 Session Manager Debug Hole Lets Local Users Obtain Handles to Any Process or Thread to Obtain Elevated Privileges on the System
Mar 13 2002 Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
Mar 8 2002 Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
Feb 28 2002 Microsoft Windows 2000 SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
Feb 22 2002 Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
Feb 19 2002 Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
Feb 19 2002 Windows XP Networking Port May Allow Remote Users to Deny Service By Sending a Stream of TCP SYN Packets
Jan 31 2002 Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
Jan 28 2002 Windows 2000 TCP Stack Bug Lets Remote Users Cause All Memory to Be Consumed on the Server
Jan 21 2002 Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
Jan 21 2002 Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
Jan 16 2002 Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
Jan 5 2002 Microsoft Windows XP Task Manager Will Not Kill Certain Processes
Dec 23 2001 Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
Dec 21 2001 Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
Dec 20 2001 Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
Dec 18 2001 Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
Dec 14 2001 Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
Dec 11 2001 (Vendor Cannot Reproduce Claim) Re: Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
Dec 11 2001 (The Vendor Questions The Risk Due to this Vulnerability) Re: Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
Dec 10 2001 (Vendor Confirms) Re: Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
Dec 8 2001 Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
Nov 14 2001 Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
Nov 13 2001 Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
Nov 13 2001 Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
Nov 13 2001 Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
Oct 23 2001 Macintosh Cients Using Windows 2000 NTFS Volumes May Modify Directory Permissions in Certain Cases
Oct 19 2001 Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
Aug 22 2001 (Microsoft Issues Fix) Windows 2000 IrDA Infrared Device Driver Lets Infrared Users Crash the System
Aug 22 2001 Windows 2000 IrDA Infrared Device Driver Lets Infrared Users Crash the System
Aug 15 2001 Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
Aug 1 2001 Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
Jul 28 2001 Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
Jul 19 2001 Windows 2000 May Disclose Descriptive Information To Local Users Attempting Password Guessing with the NetUserChangePassword API
Jul 13 2001 Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
Jun 27 2001 (CIAC Issues Advisory L-101) Re: Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
Jun 26 2001 (Official Vendor Bulletin) Re: Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
Jun 26 2001 Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
May 24 2001 Microsoft Windows 2000 Allows Local Users to Elevate Privileges
May 15 2001 (CIAC Issues Bulletin) Re: Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
May 15 2001 (CIAC Issues Bulletin) Re: Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
May 15 2001 (CIAC Issues Bulletin) Re: Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
May 11 2001 Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
May 11 2001 Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
May 9 2001 (Defcom Labs Advisory) Re: Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
May 9 2001 Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
Mar 28 2001 Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
Mar 26 2001 Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
Mar 16 2001 A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
Feb 16 2001 Windows 2000's WINMM.DLL Can Locally Crash WINLOGIN.EXE
Jan 15 2001 Internet Explorer, Outlook, and Other HTML-based Applications May Crash Due to Error in MSHTML.DLL HTML Parser

Souhlasím  |  Nesouhlasím  |  Odpovědět
DDD  |  14. 04. 2004 13:03  | 

  Za rovnake obdobie /od jan. 2003/ je to podstatne menej.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Petr Mach  |  14. 04. 2004 14:30  | 

Vsak to jsou take jenom chyby v OS, ne v aplikacich, narozdil od seznamu chyb v Linuxu, ktery je kompletni. Kdyz v seznamu chyb Linuxu muze byt xpdf, proc do chyb MS platformy nezaradit chyby MS Office, nebo treba i aplikaci Adobe, ze?

Souhlasím  |  Nesouhlasím  |  Odpovědět
michal  |  14. 04. 2004 16:49  | 

A chyby v kernelu Windows vynasobit poctem debianich architektur http://www.debian.org/ports/

Souhlasím  |  Nesouhlasím  |  Odpovědět
httpd  |  14. 04. 2004 20:34  | 

DSA je zalezitost tykajici se pouze Debian GNU/Linuxu ktery beha na X-architekturach (o kterych se Win-BFU ani nezda). Pro zacatek to zredukujte na bugy tykajici se pouze i386 a vysktrejte serverove sluzby a budeme blize k pravde . Samozrejme ze na vsechny jsou dostupne prislusne patche ve forme balicku, ktere muzete (pokud chcete) instalovat i plne automaticky a to bez restartu, coz se o windows zaplatach rict neda.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Kero  |  24. 04. 2004 13:14  | 

profesor, co nás učí UN*X říká. No na počítači přece nemůžete dělat něco důležitého, to by jste si tam nedali wokna. Změnil jsi IP adresu, no tak to se přece musí restartovat. Hmm tuím, že teďka už ne. Nainstaloval jsi aplikaci, restart, uživatel stejně nedělá nic důležitého, až na ten výpočet, co trvá 14 dní.

Souhlasím  |  Nesouhlasím  |  Odpovědět
l0s0s  |  06. 05. 2004 18:50  | 

heh a co takto 2 service pack pre XP???? ved prvy ma cez 100Mb a stale ostava cez 6000 chyb!!!!!!!!!!!!§


a netreba sa cudovat ze po instalacii 2 service packu moze prist nemile prekvapenie


 

Souhlasím  |  Nesouhlasím  |  Odpovědět
Dan  |  14. 04. 2004 10:58  | 

Pokud mate ve WAB adresari narozeniny a vyroci, pak vezte, ze oprava pro Outlook Express SP1 zpusobi nasledujici zertik: v editaci jsou sice data stale spravne, ale zobrazeni v seznamu bude vzdy 1. leden. Coz potazmo znamena, ze i externi programy pro cteni udaju z adresare budou ukazovat tuto blbost.
Takze slavny Mrkvosoft neco opravi jen za predpokladu, ze neco jineho zdrbe. Takze tuto "opravu" odinstalovavam.

Souhlasím  |  Nesouhlasím  |  Odpovědět
.:sytx:.  |  14. 04. 2004 14:35  | 

Kdo ešte dnes zaznamenal problémy so službou



"Windows Update"? Dnes mi to niekoľko krát spadlo a rýchlosť bola veľmi nízka. V súčasnosti to už ide o niečo lepšie, ale aj tak nechápem.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Flasi  |  14. 04. 2004 15:26  | 

To asi znamena, ze vic a vic lidi ma zapnutou automatickou aktualizaci.

Souhlasím  |  Nesouhlasím  |  Odpovědět
PavelZ  |  14. 04. 2004 15:08  | 

U českých  Win2000 SP4 se změnily u okna Přidat nebo odebrat programy, Přidat nové programy a Nastavit přístup a výchozí hodnoty programu některé popisy z češtiny na angličtinu. Protože jsem záplaty instaloval všechny najednou, nevím po které z nich se to stalo. Samozřejmě, že to není žádná katastrofa, jen to signalizuje, že něco není na zmíněných opravách v pořádku.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Flasi  |  14. 04. 2004 15:29  | 

V praci mam stejny system a mam to tam ted taky anglicky . Snad je to jediny bug.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Ron Jeremy  |  14. 04. 2004 16:27  | 

Po instalaci záplaty KB835732 se stala na některých počítačích nemilá věc - nenabootují, zůstanou viset před loginem. Pomůže nabootovat v nouzovém režimu a záplatu odstranit.
Poangličtění českých windows pozoruji také, ale to je vada spíše kosmetická. Nakonec, v SP3 pro Office 2000 je dialog služby LDAP polsky... Utkvělo mi v paměti "vyszukawanie".

Souhlasím  |  Nesouhlasím  |  Odpovědět
Chris  |  05. 05. 2004 08:02  | 

Ahoj, nevis prosim Te co s tim da delat, mam stjeny problem s tim KB835752

Díky

 

Chris

 

Souhlasím  |  Nesouhlasím  |  Odpovědět
Fena  |  16. 04. 2004 17:24  | 

Tak problem s nemoznosti se zalogovat do W2k CZ po aplikaci patche KB835732 na HPXe3 byl,
zda se, odhalen a vyresen. Je chyba v ovladaci graficke karty Intel 82830M (v nekterych modelech
Xe3 je gr. karta S3 a proto se to u nekoho na "stejnem notebooku" neprojevilo) U nas je verze 13.x
 a Intel vydal v 14.x se kterou uz vse funguje OK.

Souhlasím  |  Nesouhlasím  |  Odpovědět
MF  |  17. 04. 2004 11:06  | 

Zdravim
Po nainstalovani zaplat dochazi, na stroji s Win2k a s deskou /ECS - K7SOM+ ; WD 20GB ; Duron 750 /,  k automatickemu restartu jeste pred prihlasovacim oknem do Win. Pred samotnym restartem dojde k vypisu fyzicke pameti na disk v modre obrazovce. Deska ma cipset Sis 650. V nouzovem rezimu, i po spusteni posledni zname funkcni konfigurace, se to chova uplne stejne a tak nejsem schopen zaplatu odinstalovat.
Zajimalo by me zdali se daji odebrat tyto zaplaty z disku po jeho pripojeni napr. k jinemu PC ???

Diky zdravi MF

Souhlasím  |  Nesouhlasím  |  Odpovědět
Jarda  |  20. 04. 2004 10:19  | 

Taky jsem v sobotu updatoval z mrkvosovtu (W2K CZ). Po restartu PC to v 3/4 náběhu Windows spadlo do bluescreen s výpisem chyba paměti na modulu x?x?x?. Nakonec mě HDD odešel do věčných lovišť - poškozený MBR, ještě jsem před tím stihl přelejt data na 2.HDD. Bachy na autoupdate od Billa !!! Raději počkat na CD nebo DVD verzi, kde je již vše ověřeno (mělo by být).

Souhlasím  |  Nesouhlasím  |  Odpovědět
Platonix  |  05. 05. 2004 00:59  | 

MBR si muzes v klidu opravit, ne? staci nabootovat s instal. CD, potom vybrat moznost opravit, bez zachanne diskety pomoci konzoly, tam si dej pak prikaz help a hledej primaz MBRFIX, podivej se na syntaxi a pouzij ho.

Souhlasím  |  Nesouhlasím  |  Odpovědět
Platonix  |  05. 05. 2004 00:54  | 

Pokud ti jde nabootovat v nouzovem rezimu, tak tam uz by nemel byt problem zaplaty odebrat. Jinak podobna vec se objevila u notebooku HP Xe3. Tam to bylo starsim driverem ke grafarne. Tak zkus aktualizovat ovladace (pokud teda nabootujes) :))

Souhlasím  |  Nesouhlasím  |  Odpovědět
maverix  |  11. 05. 2004 20:55  | 

omg, kokoz ja som sa stym neska 4 hodiny mrdal... mam nervy... presne toto iste robilo, restart a mrd! modra obrazovka alebo restart, potom sa to rozbehlo, ... :), nastastie doma mam linux :)

Souhlasím  |  Nesouhlasím  |  Odpovědět
Radoslav Helán  |  05. 05. 2004 15:00  | 

Záplatu KB835732 nemohu nainstalovat pod W2k protože: "Nelze ověřit integritu souboru Update.inf. Ujistěte se, zda je v počítači spuštěna služba šifrování." Poraďte prosím, co tím.

Souhlasím  |  Nesouhlasím  |  Odpovědět
a  |  17. 06. 2004 12:11  | 

  

Souhlasím  |  Nesouhlasím  |  Odpovědět
Zasílat názory e-mailem: Zasílat názory Můj názor
Aktuální číslo časopisu Computer

Megatest televizí do 25 000 Kč

Nejlepší herní klávesnice

Srovnání správců hesel

Jak upravit fotky pro tisk